"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-01-26 18:06:43 +00:00
parent ea495a9a38
commit 5513dfc2e2
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
99 changed files with 1175 additions and 60 deletions

View File

@ -61,6 +61,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20191008 [SECURITY] [DLA 1950-1] openjpeg2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00009.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-29",
"url": "https://security.gentoo.org/glsa/202101-29"
}
]
}

View File

@ -62,6 +62,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-3c1aed2aa9",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K46I2MFPCEOGC5LLDXZSWPB3EBPON3KA/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-24",
"url": "https://security.gentoo.org/glsa/202101-24"
}
]
}

View File

@ -57,6 +57,11 @@
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0530",
"refsource": "MISC",
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0530"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-24",
"url": "https://security.gentoo.org/glsa/202101-24"
}
]
}

View File

@ -62,6 +62,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-3c1aed2aa9",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K46I2MFPCEOGC5LLDXZSWPB3EBPON3KA/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-24",
"url": "https://security.gentoo.org/glsa/202101-24"
}
]
}

View File

@ -62,6 +62,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-3c1aed2aa9",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K46I2MFPCEOGC5LLDXZSWPB3EBPON3KA/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-24",
"url": "https://security.gentoo.org/glsa/202101-24"
}
]
}

View File

@ -86,6 +86,11 @@
"url": "https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3",
"refsource": "MISC",
"name": "https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-29",
"url": "https://security.gentoo.org/glsa/202101-29"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2550",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-28",
"url": "https://security.gentoo.org/glsa/202101-28"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2550",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-28",
"url": "https://security.gentoo.org/glsa/202101-28"
}
]
}

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1860069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860069"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-22",
"url": "https://security.gentoo.org/glsa/202101-22"
}
]
},

View File

@ -71,6 +71,11 @@
"refsource": "MISC",
"name": "https://pastebin.com/4sDKQ7U8",
"url": "https://pastebin.com/4sDKQ7U8"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-29",
"url": "https://security.gentoo.org/glsa/202101-29"
}
]
}

View File

@ -89,6 +89,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -99,6 +99,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -99,6 +99,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -99,6 +99,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -99,6 +99,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -99,6 +99,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-23447",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-23447",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "newbee-mall 1.0 is affected by cross-site scripting in shop-cart/settle. Users only need to write xss payload in their address information when buying goods, which is triggered when viewing the \"View Recipient Information\" of this order in \"Order Management Office\"."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/newbee-ltd/newbee-mall/issues/33",
"refsource": "MISC",
"name": "https://github.com/newbee-ltd/newbee-mall/issues/33"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-23448",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-23448",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "newbee-mall all versions are affected by incorrect access control to remotely gain privileges through AdminLoginInterceptor.java. The authentication logic of the system's background /admin is in code AdminLoginInterceptor, which can be bypassed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/newbee-ltd/newbee-mall/issues/34",
"refsource": "MISC",
"name": "https://github.com/newbee-ltd/newbee-mall/issues/34"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-23449",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-23449",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "newbee-mall all versions are affected by incorrect access control to remotely gain privileges through NewBeeMallIndexConfigServiceImpl.java. Unauthorized changes can be made to any user information through the userID."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/newbee-ltd/newbee-mall/issues/35",
"refsource": "MISC",
"name": "https://github.com/newbee-ltd/newbee-mall/issues/35"
}
]
}

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://github.com/uclouvain/openjpeg/issues/1283",
"url": "https://github.com/uclouvain/openjpeg/issues/1283"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-29",
"url": "https://security.gentoo.org/glsa/202101-29"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-d32853a28d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-29",
"url": "https://security.gentoo.org/glsa/202101-29"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-d32853a28d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-29",
"url": "https://security.gentoo.org/glsa/202101-29"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-d32853a28d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-29",
"url": "https://security.gentoo.org/glsa/202101-29"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1907521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907521"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-29",
"url": "https://security.gentoo.org/glsa/202101-29"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-d32853a28d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-29",
"url": "https://security.gentoo.org/glsa/202101-29"
}
]
},

View File

@ -48,12 +48,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-PYTHON-JINJA2-1012994"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-PYTHON-JINJA2-1012994",
"name": "https://snyk.io/vuln/SNYK-PYTHON-JINJA2-1012994"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/pallets/jinja/blob/ab81fd9c277900c85da0c322a2ff9d68a235b2e6/src/jinja2/utils.py%23L20"
"refsource": "MISC",
"url": "https://github.com/pallets/jinja/blob/ab81fd9c277900c85da0c322a2ff9d68a235b2e6/src/jinja2/utils.py%23L20",
"name": "https://github.com/pallets/jinja/blob/ab81fd9c277900c85da0c322a2ff9d68a235b2e6/src/jinja2/utils.py%23L20"
}
]
},
@ -61,7 +63,7 @@
"description_data": [
{
"lang": "eng",
"value": "This affects the package jinja2 from 0.0.0.\n The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9._-]+.[a-zA-Z0-9._-]+\r\n\r\n"
"value": "This affects the package jinja2 from 0.0.0. The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9._-]+.[a-zA-Z0-9._-]+"
}
]
},

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-28998",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-28998",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered on Geeni GNC-CW013 doorbell 1.8.1 devices. A vulnerability exists in the Telnet service that allows a remote attacker to take full control of the device with a high-privileged account. The vulnerability exists because a system account has a default and static password."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.mygeeni.com/hc/en-us",
"refsource": "MISC",
"name": "https://support.mygeeni.com/hc/en-us"
},
{
"refsource": "MISC",
"name": "https://gist.github.com/tj-oconnor/e21adcf9c0539a12ad2841102928cbd5",
"url": "https://gist.github.com/tj-oconnor/e21adcf9c0539a12ad2841102928cbd5"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-28999",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-28999",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Apexis Streaming Video Web Application on Geeni GNC-CW013 doorbell 1.8.1 devices. A remote attacker can take full control of the camera with a high-privileged account. The vulnerability exists because a static username and password are compiled into a shared library (libhipcam.so) used to provide the streaming camera service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.mygeeni.com/hc/en-us",
"refsource": "MISC",
"name": "https://support.mygeeni.com/hc/en-us"
},
{
"refsource": "MISC",
"name": "https://gist.github.com/tj-oconnor/74f9ebbad668f3a7ce31a968452190d7",
"url": "https://gist.github.com/tj-oconnor/74f9ebbad668f3a7ce31a968452190d7"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-29000",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-29000",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered on Geeni GNC-CW013 doorbell 1.8.1 devices. A vulnerability exists in the RTSP service that allows a remote attacker to take full control of the device with a high-privileged account. By sending a crafted message, an attacker is able to remotely deliver a telnet session. Any attacker that has the ability to control DNS can exploit this vulnerability to remotely login to the device and gain access to the camera system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.mygeeni.com/hc/en-us",
"refsource": "MISC",
"name": "https://support.mygeeni.com/hc/en-us"
},
{
"refsource": "MISC",
"name": "https://gist.github.com/tj-oconnor/d081f5f116a4865f888be81e2466d831",
"url": "https://gist.github.com/tj-oconnor/d081f5f116a4865f888be81e2466d831"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-29001",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-29001",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered on Geeni GNC-CW028 Camera 2.7.2, Geeni GNC-CW025 Doorbell 2.9.5, Merkury MI-CW024 Doorbell 2.9.6, and Merkury MI-CW017 Camera 2.9.6 devices. A vulnerability exists in the RESTful Services API that allows a remote attacker to take full control of the camera with a high-privileged account. The vulnerability exists because a static username and password are compiled into the ppsapp RESTful application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.mygeeni.com/hc/en-us",
"refsource": "MISC",
"name": "https://support.mygeeni.com/hc/en-us"
},
{
"refsource": "MISC",
"name": "https://gist.github.com/tj-oconnor/371d34342c0cc2be015cc89d6dc2bc66",
"url": "https://gist.github.com/tj-oconnor/371d34342c0cc2be015cc89d6dc2bc66"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-35263",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-35263",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "EgavilanMedia User Registration & Login System 1.0 is affected by SQL injection to the admin panel, which may allow arbitrary code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.exploit-db.com/exploits/49058",
"refsource": "MISC",
"name": "https://www.exploit-db.com/exploits/49058"
}
]
}

View File

@ -55,7 +55,7 @@
"description_data": [
{
"lang": "eng",
"value": "Check Point SmartConsole before R80.20 Build 119, R80.30 before Build 94, R80.40 before Build 415, and R81 before Build 548 were vulnerable to a possible local privilege escalation due to running executables from a directory with write access to all authenticated users."
"value": "Check Point SmartConsole before R80.10 Build 185, R80.20 Build 119, R80.30 before Build 94, R80.40 before Build 415, and R81 before Build 548 were vulnerable to a possible local privilege escalation due to running executables from a directory with write access to all authenticated users."
}
]
}

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1046",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1046"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-26",
"url": "https://security.gentoo.org/glsa/202101-26"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1047",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1047"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-26",
"url": "https://security.gentoo.org/glsa/202101-26"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1048",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1048"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-26",
"url": "https://security.gentoo.org/glsa/202101-26"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1049",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1049"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-26",
"url": "https://security.gentoo.org/glsa/202101-26"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1050",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1050"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-26",
"url": "https://security.gentoo.org/glsa/202101-26"
}
]
},

View File

@ -84,6 +84,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-77f89ab772",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -84,6 +84,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-77f89ab772",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -84,6 +84,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-77f89ab772",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -84,6 +84,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-77f89ab772",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -84,6 +84,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-77f89ab772",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -84,6 +84,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-77f89ab772",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -84,6 +84,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-77f89ab772",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -84,6 +84,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-77f89ab772",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -84,6 +84,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-77f89ab772",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -84,6 +84,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-77f89ab772",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -84,6 +84,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-77f89ab772",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -174,6 +174,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -64,6 +64,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -94,6 +94,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -64,6 +64,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -69,6 +69,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -64,6 +64,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -64,6 +64,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -69,6 +69,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -69,6 +69,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -89,6 +89,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -89,6 +89,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -89,6 +89,11 @@
"refsource": "DEBIAN",
"name": "DSA-4824",
"url": "https://www.debian.org/security/2021/dsa-4824"
},
{
"refsource": "GENTOO",
"name": "GLSA-202101-30",
"url": "https://security.gentoo.org/glsa/202101-30"
}
]
},

View File

@ -4,14 +4,63 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-8293",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Nextcloud Server",
"version": {
"version_data": [
{
"version_value": "Fixed in 20.0.2, 19.0.5, 18.0.11"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service (CWE-400)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/1018146",
"url": "https://hackerone.com/reports/1018146"
},
{
"refsource": "MISC",
"name": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-001",
"url": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-001"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A missing input validation in Nextcloud Server before 20.0.2, 19.0.5, 18.0.11 allows users to store unlimited data in workflow rules causing load and potential DDoS on later interactions and usage with those rules."
}
]
}

View File

@ -4,14 +4,63 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-8295",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Nextcloud Server",
"version": {
"version_data": [
{
"version_value": "Fixed in 20.0.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service (CWE-400)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackerone.com/reports/812754",
"url": "https://hackerone.com/reports/812754"
},
{
"refsource": "MISC",
"name": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-003",
"url": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-003"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A wrong check in Nextcloud Server 19 and prior allowed to perform a denial of service attack when resetting the password for a user."
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26091",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26092",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26093",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26094",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26095",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26096",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26097",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26098",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26208",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26209",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26210",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26211",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26212",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-26213",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-3293",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-3294",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}