From 53b4ef8ed053a7585272a8a5057e0026989738f9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 7 Apr 2021 19:00:41 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/21xxx/CVE-2021-21425.json | 12 ++++++------ 2021/30xxx/CVE-2021-30198.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30199.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30200.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30201.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30202.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30203.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30204.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30205.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30206.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30207.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30208.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30209.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30210.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30211.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30212.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30213.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30214.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30215.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30216.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30217.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30218.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30219.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30220.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30221.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30222.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30223.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30224.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30225.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30226.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30227.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30228.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30229.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30230.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30231.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30232.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30233.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30234.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30235.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30236.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30237.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30238.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30239.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30240.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30241.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30242.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30243.json | 18 ++++++++++++++++++ 2021/30xxx/CVE-2021-30244.json | 18 ++++++++++++++++++ 48 files changed, 852 insertions(+), 6 deletions(-) create mode 100644 2021/30xxx/CVE-2021-30198.json create mode 100644 2021/30xxx/CVE-2021-30199.json create mode 100644 2021/30xxx/CVE-2021-30200.json create mode 100644 2021/30xxx/CVE-2021-30201.json create mode 100644 2021/30xxx/CVE-2021-30202.json create mode 100644 2021/30xxx/CVE-2021-30203.json create mode 100644 2021/30xxx/CVE-2021-30204.json create mode 100644 2021/30xxx/CVE-2021-30205.json create mode 100644 2021/30xxx/CVE-2021-30206.json create mode 100644 2021/30xxx/CVE-2021-30207.json create mode 100644 2021/30xxx/CVE-2021-30208.json create mode 100644 2021/30xxx/CVE-2021-30209.json create mode 100644 2021/30xxx/CVE-2021-30210.json create mode 100644 2021/30xxx/CVE-2021-30211.json create mode 100644 2021/30xxx/CVE-2021-30212.json create mode 100644 2021/30xxx/CVE-2021-30213.json create mode 100644 2021/30xxx/CVE-2021-30214.json create mode 100644 2021/30xxx/CVE-2021-30215.json create mode 100644 2021/30xxx/CVE-2021-30216.json create mode 100644 2021/30xxx/CVE-2021-30217.json create mode 100644 2021/30xxx/CVE-2021-30218.json create mode 100644 2021/30xxx/CVE-2021-30219.json create mode 100644 2021/30xxx/CVE-2021-30220.json create mode 100644 2021/30xxx/CVE-2021-30221.json create mode 100644 2021/30xxx/CVE-2021-30222.json create mode 100644 2021/30xxx/CVE-2021-30223.json create mode 100644 2021/30xxx/CVE-2021-30224.json create mode 100644 2021/30xxx/CVE-2021-30225.json create mode 100644 2021/30xxx/CVE-2021-30226.json create mode 100644 2021/30xxx/CVE-2021-30227.json create mode 100644 2021/30xxx/CVE-2021-30228.json create mode 100644 2021/30xxx/CVE-2021-30229.json create mode 100644 2021/30xxx/CVE-2021-30230.json create mode 100644 2021/30xxx/CVE-2021-30231.json create mode 100644 2021/30xxx/CVE-2021-30232.json create mode 100644 2021/30xxx/CVE-2021-30233.json create mode 100644 2021/30xxx/CVE-2021-30234.json create mode 100644 2021/30xxx/CVE-2021-30235.json create mode 100644 2021/30xxx/CVE-2021-30236.json create mode 100644 2021/30xxx/CVE-2021-30237.json create mode 100644 2021/30xxx/CVE-2021-30238.json create mode 100644 2021/30xxx/CVE-2021-30239.json create mode 100644 2021/30xxx/CVE-2021-30240.json create mode 100644 2021/30xxx/CVE-2021-30241.json create mode 100644 2021/30xxx/CVE-2021-30242.json create mode 100644 2021/30xxx/CVE-2021-30243.json create mode 100644 2021/30xxx/CVE-2021-30244.json diff --git a/2021/21xxx/CVE-2021-21425.json b/2021/21xxx/CVE-2021-21425.json index 46cb8d057d0..928aee55b33 100644 --- a/2021/21xxx/CVE-2021-21425.json +++ b/2021/21xxx/CVE-2021-21425.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Grav Admin Plugin is an HTML user interface that provides a way to configure Grav and create and modify pages. In versions 1.10.7 and earlier, an unauthenticated user can execute some methods of administrator controller without needing any credentials. Particular method execution will result in arbitrary YAML file creation or content change of existing YAML files on the system. Successfully exploitation of that vulnerability results in configuration changes, such as general site information change, custom scheduler job definition, etc. Due to the nature of the vulnerability, an adversary can change some part of the webpage, or hijack an administrator account, or execute operating system command under the context of the web-server user. This vulnerability is fixed in version 1.10.8. Blocking access to the `/admin` path from untrusted sources can be applied as a workaround.\n" + "value": "Grav Admin Plugin is an HTML user interface that provides a way to configure Grav and create and modify pages. In versions 1.10.7 and earlier, an unauthenticated user can execute some methods of administrator controller without needing any credentials. Particular method execution will result in arbitrary YAML file creation or content change of existing YAML files on the system. Successfully exploitation of that vulnerability results in configuration changes, such as general site information change, custom scheduler job definition, etc. Due to the nature of the vulnerability, an adversary can change some part of the webpage, or hijack an administrator account, or execute operating system command under the context of the web-server user. This vulnerability is fixed in version 1.10.8. Blocking access to the `/admin` path from untrusted sources can be applied as a workaround." } ] }, @@ -69,15 +69,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/getgrav/grav-plugin-admin/security/advisories/GHSA-6f53-6qgv-39pj", - "refsource": "CONFIRM", - "url": "https://github.com/getgrav/grav-plugin-admin/security/advisories/GHSA-6f53-6qgv-39pj" - }, { "name": "https://pentest.blog/unexpected-journey-7-gravcms-unauthenticated-arbitrary-yaml-write-update-leads-to-code-execution/", "refsource": "MISC", "url": "https://pentest.blog/unexpected-journey-7-gravcms-unauthenticated-arbitrary-yaml-write-update-leads-to-code-execution/" + }, + { + "name": "https://github.com/getgrav/grav-plugin-admin/security/advisories/GHSA-6f53-6qgv-39pj", + "refsource": "CONFIRM", + "url": "https://github.com/getgrav/grav-plugin-admin/security/advisories/GHSA-6f53-6qgv-39pj" } ] }, diff --git a/2021/30xxx/CVE-2021-30198.json b/2021/30xxx/CVE-2021-30198.json new file mode 100644 index 00000000000..21e1ff85eb3 --- /dev/null +++ b/2021/30xxx/CVE-2021-30198.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30198", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30199.json b/2021/30xxx/CVE-2021-30199.json new file mode 100644 index 00000000000..229f425c5a9 --- /dev/null +++ b/2021/30xxx/CVE-2021-30199.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30199", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30200.json b/2021/30xxx/CVE-2021-30200.json new file mode 100644 index 00000000000..0214141e416 --- /dev/null +++ b/2021/30xxx/CVE-2021-30200.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30200", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30201.json b/2021/30xxx/CVE-2021-30201.json new file mode 100644 index 00000000000..daea90d858d --- /dev/null +++ b/2021/30xxx/CVE-2021-30201.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30201", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30202.json b/2021/30xxx/CVE-2021-30202.json new file mode 100644 index 00000000000..63b3dc8ecd2 --- /dev/null +++ b/2021/30xxx/CVE-2021-30202.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30202", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30203.json b/2021/30xxx/CVE-2021-30203.json new file mode 100644 index 00000000000..67f659933de --- /dev/null +++ b/2021/30xxx/CVE-2021-30203.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30203", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30204.json b/2021/30xxx/CVE-2021-30204.json new file mode 100644 index 00000000000..66faac3fb6e --- /dev/null +++ b/2021/30xxx/CVE-2021-30204.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30204", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30205.json b/2021/30xxx/CVE-2021-30205.json new file mode 100644 index 00000000000..8d9c4e906c7 --- /dev/null +++ b/2021/30xxx/CVE-2021-30205.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30205", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30206.json b/2021/30xxx/CVE-2021-30206.json new file mode 100644 index 00000000000..2c60cad8d84 --- /dev/null +++ b/2021/30xxx/CVE-2021-30206.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30206", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30207.json b/2021/30xxx/CVE-2021-30207.json new file mode 100644 index 00000000000..3fd33af463c --- /dev/null +++ b/2021/30xxx/CVE-2021-30207.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30207", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30208.json b/2021/30xxx/CVE-2021-30208.json new file mode 100644 index 00000000000..7827fff7518 --- /dev/null +++ b/2021/30xxx/CVE-2021-30208.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30208", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30209.json b/2021/30xxx/CVE-2021-30209.json new file mode 100644 index 00000000000..05192d2deea --- /dev/null +++ b/2021/30xxx/CVE-2021-30209.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30209", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30210.json b/2021/30xxx/CVE-2021-30210.json new file mode 100644 index 00000000000..d0f5425a83f --- /dev/null +++ b/2021/30xxx/CVE-2021-30210.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30210", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30211.json b/2021/30xxx/CVE-2021-30211.json new file mode 100644 index 00000000000..87b0f11781e --- /dev/null +++ b/2021/30xxx/CVE-2021-30211.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30211", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30212.json b/2021/30xxx/CVE-2021-30212.json new file mode 100644 index 00000000000..ddc8b103afd --- /dev/null +++ b/2021/30xxx/CVE-2021-30212.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30212", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30213.json b/2021/30xxx/CVE-2021-30213.json new file mode 100644 index 00000000000..4a80c80047a --- /dev/null +++ b/2021/30xxx/CVE-2021-30213.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30213", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30214.json b/2021/30xxx/CVE-2021-30214.json new file mode 100644 index 00000000000..a6907cb729c --- /dev/null +++ b/2021/30xxx/CVE-2021-30214.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30214", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30215.json b/2021/30xxx/CVE-2021-30215.json new file mode 100644 index 00000000000..84d0035c84a --- /dev/null +++ b/2021/30xxx/CVE-2021-30215.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30215", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30216.json b/2021/30xxx/CVE-2021-30216.json new file mode 100644 index 00000000000..5ca96d6f498 --- /dev/null +++ b/2021/30xxx/CVE-2021-30216.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30216", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30217.json b/2021/30xxx/CVE-2021-30217.json new file mode 100644 index 00000000000..193ebfe77b0 --- /dev/null +++ b/2021/30xxx/CVE-2021-30217.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30217", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30218.json b/2021/30xxx/CVE-2021-30218.json new file mode 100644 index 00000000000..65919976696 --- /dev/null +++ b/2021/30xxx/CVE-2021-30218.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30218", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30219.json b/2021/30xxx/CVE-2021-30219.json new file mode 100644 index 00000000000..264739e532c --- /dev/null +++ b/2021/30xxx/CVE-2021-30219.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30219", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30220.json b/2021/30xxx/CVE-2021-30220.json new file mode 100644 index 00000000000..bab0397f8d6 --- /dev/null +++ b/2021/30xxx/CVE-2021-30220.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30220", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30221.json b/2021/30xxx/CVE-2021-30221.json new file mode 100644 index 00000000000..399937b339d --- /dev/null +++ b/2021/30xxx/CVE-2021-30221.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30221", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30222.json b/2021/30xxx/CVE-2021-30222.json new file mode 100644 index 00000000000..235e68abcd0 --- /dev/null +++ b/2021/30xxx/CVE-2021-30222.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30222", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30223.json b/2021/30xxx/CVE-2021-30223.json new file mode 100644 index 00000000000..abc1a1cf96c --- /dev/null +++ b/2021/30xxx/CVE-2021-30223.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30223", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30224.json b/2021/30xxx/CVE-2021-30224.json new file mode 100644 index 00000000000..070e834fa04 --- /dev/null +++ b/2021/30xxx/CVE-2021-30224.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30224", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30225.json b/2021/30xxx/CVE-2021-30225.json new file mode 100644 index 00000000000..7f17fea927c --- /dev/null +++ b/2021/30xxx/CVE-2021-30225.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30225", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30226.json b/2021/30xxx/CVE-2021-30226.json new file mode 100644 index 00000000000..8c745311721 --- /dev/null +++ b/2021/30xxx/CVE-2021-30226.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30226", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30227.json b/2021/30xxx/CVE-2021-30227.json new file mode 100644 index 00000000000..53229d087d7 --- /dev/null +++ b/2021/30xxx/CVE-2021-30227.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30227", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30228.json b/2021/30xxx/CVE-2021-30228.json new file mode 100644 index 00000000000..11348f61bc3 --- /dev/null +++ b/2021/30xxx/CVE-2021-30228.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30228", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30229.json b/2021/30xxx/CVE-2021-30229.json new file mode 100644 index 00000000000..8bf44d929b9 --- /dev/null +++ b/2021/30xxx/CVE-2021-30229.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30229", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30230.json b/2021/30xxx/CVE-2021-30230.json new file mode 100644 index 00000000000..0f0d57f6cf7 --- /dev/null +++ b/2021/30xxx/CVE-2021-30230.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30230", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30231.json b/2021/30xxx/CVE-2021-30231.json new file mode 100644 index 00000000000..802894898a6 --- /dev/null +++ b/2021/30xxx/CVE-2021-30231.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30231", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30232.json b/2021/30xxx/CVE-2021-30232.json new file mode 100644 index 00000000000..c5b832e1720 --- /dev/null +++ b/2021/30xxx/CVE-2021-30232.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30232", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30233.json b/2021/30xxx/CVE-2021-30233.json new file mode 100644 index 00000000000..46ad09d0eca --- /dev/null +++ b/2021/30xxx/CVE-2021-30233.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30233", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30234.json b/2021/30xxx/CVE-2021-30234.json new file mode 100644 index 00000000000..6082bb40b82 --- /dev/null +++ b/2021/30xxx/CVE-2021-30234.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30234", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30235.json b/2021/30xxx/CVE-2021-30235.json new file mode 100644 index 00000000000..3ef6c89a0d7 --- /dev/null +++ b/2021/30xxx/CVE-2021-30235.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30235", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30236.json b/2021/30xxx/CVE-2021-30236.json new file mode 100644 index 00000000000..b5ef3604d47 --- /dev/null +++ b/2021/30xxx/CVE-2021-30236.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30236", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30237.json b/2021/30xxx/CVE-2021-30237.json new file mode 100644 index 00000000000..d6364c61f16 --- /dev/null +++ b/2021/30xxx/CVE-2021-30237.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30237", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30238.json b/2021/30xxx/CVE-2021-30238.json new file mode 100644 index 00000000000..bb61d8138b0 --- /dev/null +++ b/2021/30xxx/CVE-2021-30238.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30238", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30239.json b/2021/30xxx/CVE-2021-30239.json new file mode 100644 index 00000000000..9df5fad6e94 --- /dev/null +++ b/2021/30xxx/CVE-2021-30239.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30239", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30240.json b/2021/30xxx/CVE-2021-30240.json new file mode 100644 index 00000000000..93dc1cb666d --- /dev/null +++ b/2021/30xxx/CVE-2021-30240.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30240", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30241.json b/2021/30xxx/CVE-2021-30241.json new file mode 100644 index 00000000000..b451dce4239 --- /dev/null +++ b/2021/30xxx/CVE-2021-30241.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30241", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30242.json b/2021/30xxx/CVE-2021-30242.json new file mode 100644 index 00000000000..da8a3ed8928 --- /dev/null +++ b/2021/30xxx/CVE-2021-30242.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30242", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30243.json b/2021/30xxx/CVE-2021-30243.json new file mode 100644 index 00000000000..10d1b4e67d2 --- /dev/null +++ b/2021/30xxx/CVE-2021-30243.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30243", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30244.json b/2021/30xxx/CVE-2021-30244.json new file mode 100644 index 00000000000..08e5d0a6068 --- /dev/null +++ b/2021/30xxx/CVE-2021-30244.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30244", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file