diff --git a/2018/21xxx/CVE-2018-21234.json b/2018/21xxx/CVE-2018-21234.json index 4c3d46f9eef..0dc9c917cc0 100644 --- a/2018/21xxx/CVE-2018-21234.json +++ b/2018/21xxx/CVE-2018-21234.json @@ -111,6 +111,11 @@ "refsource": "MLIST", "name": "[hive-gitbox] 20210521 [GitHub] [hive] jcamachor merged pull request #2217: HIVE:25054 Upgrade `jodd-core` dependency to get rid of CVE-2018-21234", "url": "https://lists.apache.org/thread.html/rc85b650b4ad2c77d7c39c69824488e40dce6d0ebbb4204777d094375@%3Cgitbox.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210524 [jira] [Commented] (HIVE-25054) Upgrade jodd-core due to CVE-2018-21234", + "url": "https://lists.apache.org/thread.html/rd575d9877424a2d8776f5c2ff33bf3dc3382cd83f031d483f29c11ab@%3Cissues.hive.apache.org%3E" } ] } diff --git a/2020/36xxx/CVE-2020-36221.json b/2020/36xxx/CVE-2020-36221.json index 260176efd89..5d99baf6285 100644 --- a/2020/36xxx/CVE-2020-36221.json +++ b/2020/36xxx/CVE-2020-36221.json @@ -91,6 +91,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212529", + "url": "https://support.apple.com/kb/HT212529" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212531", + "url": "https://support.apple.com/kb/HT212531" } ] } diff --git a/2020/36xxx/CVE-2020-36222.json b/2020/36xxx/CVE-2020-36222.json index 08e944aa93e..9a30a5c8d4c 100644 --- a/2020/36xxx/CVE-2020-36222.json +++ b/2020/36xxx/CVE-2020-36222.json @@ -96,6 +96,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212529", + "url": "https://support.apple.com/kb/HT212529" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212531", + "url": "https://support.apple.com/kb/HT212531" } ] } diff --git a/2020/36xxx/CVE-2020-36223.json b/2020/36xxx/CVE-2020-36223.json index 95dd6393a1e..6a4ab0b51b7 100644 --- a/2020/36xxx/CVE-2020-36223.json +++ b/2020/36xxx/CVE-2020-36223.json @@ -81,6 +81,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212529", + "url": "https://support.apple.com/kb/HT212529" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212531", + "url": "https://support.apple.com/kb/HT212531" } ] } diff --git a/2020/36xxx/CVE-2020-36224.json b/2020/36xxx/CVE-2020-36224.json index e115893d602..2b69e08dc28 100644 --- a/2020/36xxx/CVE-2020-36224.json +++ b/2020/36xxx/CVE-2020-36224.json @@ -96,6 +96,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212529", + "url": "https://support.apple.com/kb/HT212529" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212531", + "url": "https://support.apple.com/kb/HT212531" } ] } diff --git a/2020/36xxx/CVE-2020-36225.json b/2020/36xxx/CVE-2020-36225.json index 67418171178..ad7e796f9e9 100644 --- a/2020/36xxx/CVE-2020-36225.json +++ b/2020/36xxx/CVE-2020-36225.json @@ -96,6 +96,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212529", + "url": "https://support.apple.com/kb/HT212529" } ] } diff --git a/2020/36xxx/CVE-2020-36226.json b/2020/36xxx/CVE-2020-36226.json index 88b411b9f14..53d75ac6ea1 100644 --- a/2020/36xxx/CVE-2020-36226.json +++ b/2020/36xxx/CVE-2020-36226.json @@ -96,6 +96,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212529", + "url": "https://support.apple.com/kb/HT212529" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212531", + "url": "https://support.apple.com/kb/HT212531" } ] } diff --git a/2020/36xxx/CVE-2020-36227.json b/2020/36xxx/CVE-2020-36227.json index 0548e0a6616..b7672deb3ba 100644 --- a/2020/36xxx/CVE-2020-36227.json +++ b/2020/36xxx/CVE-2020-36227.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212529", + "url": "https://support.apple.com/kb/HT212529" } ] } diff --git a/2020/36xxx/CVE-2020-36228.json b/2020/36xxx/CVE-2020-36228.json index 0e60de0048f..5dc47123e2d 100644 --- a/2020/36xxx/CVE-2020-36228.json +++ b/2020/36xxx/CVE-2020-36228.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212529", + "url": "https://support.apple.com/kb/HT212529" } ] } diff --git a/2020/36xxx/CVE-2020-36229.json b/2020/36xxx/CVE-2020-36229.json index a4fe67a645a..72d1d8077cb 100644 --- a/2020/36xxx/CVE-2020-36229.json +++ b/2020/36xxx/CVE-2020-36229.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212529", + "url": "https://support.apple.com/kb/HT212529" } ] } diff --git a/2020/36xxx/CVE-2020-36230.json b/2020/36xxx/CVE-2020-36230.json index c36f7defa7f..f334965a383 100644 --- a/2020/36xxx/CVE-2020-36230.json +++ b/2020/36xxx/CVE-2020-36230.json @@ -81,6 +81,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212529", + "url": "https://support.apple.com/kb/HT212529" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212531", + "url": "https://support.apple.com/kb/HT212531" } ] } diff --git a/2021/23xxx/CVE-2021-23841.json b/2021/23xxx/CVE-2021-23841.json index 4d1e7a5707f..aa8a33d8ec7 100644 --- a/2021/23xxx/CVE-2021-23841.json +++ b/2021/23xxx/CVE-2021-23841.json @@ -114,6 +114,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210513-0002/", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212529", + "url": "https://support.apple.com/kb/HT212529" } ] } diff --git a/2021/33xxx/CVE-2021-33526.json b/2021/33xxx/CVE-2021-33526.json new file mode 100644 index 00000000000..40e6d4638ea --- /dev/null +++ b/2021/33xxx/CVE-2021-33526.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33526", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33527.json b/2021/33xxx/CVE-2021-33527.json new file mode 100644 index 00000000000..5476dc767bf --- /dev/null +++ b/2021/33xxx/CVE-2021-33527.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33527", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33528.json b/2021/33xxx/CVE-2021-33528.json new file mode 100644 index 00000000000..f6477386056 --- /dev/null +++ b/2021/33xxx/CVE-2021-33528.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33528", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33529.json b/2021/33xxx/CVE-2021-33529.json new file mode 100644 index 00000000000..355ab27cf36 --- /dev/null +++ b/2021/33xxx/CVE-2021-33529.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33529", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33530.json b/2021/33xxx/CVE-2021-33530.json new file mode 100644 index 00000000000..8db0fcca47c --- /dev/null +++ b/2021/33xxx/CVE-2021-33530.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33530", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33531.json b/2021/33xxx/CVE-2021-33531.json new file mode 100644 index 00000000000..590454e88d2 --- /dev/null +++ b/2021/33xxx/CVE-2021-33531.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33531", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33532.json b/2021/33xxx/CVE-2021-33532.json new file mode 100644 index 00000000000..80e606207de --- /dev/null +++ b/2021/33xxx/CVE-2021-33532.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33532", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33533.json b/2021/33xxx/CVE-2021-33533.json new file mode 100644 index 00000000000..8cbc67ea94a --- /dev/null +++ b/2021/33xxx/CVE-2021-33533.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33533", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33534.json b/2021/33xxx/CVE-2021-33534.json new file mode 100644 index 00000000000..a93eccbccf2 --- /dev/null +++ b/2021/33xxx/CVE-2021-33534.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33534", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33535.json b/2021/33xxx/CVE-2021-33535.json new file mode 100644 index 00000000000..f6d3149ef97 --- /dev/null +++ b/2021/33xxx/CVE-2021-33535.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33535", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33536.json b/2021/33xxx/CVE-2021-33536.json new file mode 100644 index 00000000000..0e3916835e6 --- /dev/null +++ b/2021/33xxx/CVE-2021-33536.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33536", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33537.json b/2021/33xxx/CVE-2021-33537.json new file mode 100644 index 00000000000..b219f9d8a44 --- /dev/null +++ b/2021/33xxx/CVE-2021-33537.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33537", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33538.json b/2021/33xxx/CVE-2021-33538.json new file mode 100644 index 00000000000..daa81fc98da --- /dev/null +++ b/2021/33xxx/CVE-2021-33538.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33538", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33539.json b/2021/33xxx/CVE-2021-33539.json new file mode 100644 index 00000000000..9156b9ca59a --- /dev/null +++ b/2021/33xxx/CVE-2021-33539.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33539", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33540.json b/2021/33xxx/CVE-2021-33540.json new file mode 100644 index 00000000000..e9b0a546d91 --- /dev/null +++ b/2021/33xxx/CVE-2021-33540.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33540", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33541.json b/2021/33xxx/CVE-2021-33541.json new file mode 100644 index 00000000000..2539fdce8e2 --- /dev/null +++ b/2021/33xxx/CVE-2021-33541.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33541", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33542.json b/2021/33xxx/CVE-2021-33542.json new file mode 100644 index 00000000000..38b283f5627 --- /dev/null +++ b/2021/33xxx/CVE-2021-33542.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33542", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33543.json b/2021/33xxx/CVE-2021-33543.json new file mode 100644 index 00000000000..cd50e46d0a6 --- /dev/null +++ b/2021/33xxx/CVE-2021-33543.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33543", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33544.json b/2021/33xxx/CVE-2021-33544.json new file mode 100644 index 00000000000..bc9b2cf2fc2 --- /dev/null +++ b/2021/33xxx/CVE-2021-33544.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33544", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33545.json b/2021/33xxx/CVE-2021-33545.json new file mode 100644 index 00000000000..9807481f3ec --- /dev/null +++ b/2021/33xxx/CVE-2021-33545.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33545", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33546.json b/2021/33xxx/CVE-2021-33546.json new file mode 100644 index 00000000000..b6c4b096792 --- /dev/null +++ b/2021/33xxx/CVE-2021-33546.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33546", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33547.json b/2021/33xxx/CVE-2021-33547.json new file mode 100644 index 00000000000..c4983045180 --- /dev/null +++ b/2021/33xxx/CVE-2021-33547.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33547", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33548.json b/2021/33xxx/CVE-2021-33548.json new file mode 100644 index 00000000000..e936f6095a1 --- /dev/null +++ b/2021/33xxx/CVE-2021-33548.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33548", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33549.json b/2021/33xxx/CVE-2021-33549.json new file mode 100644 index 00000000000..eaad08f34c4 --- /dev/null +++ b/2021/33xxx/CVE-2021-33549.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33549", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33550.json b/2021/33xxx/CVE-2021-33550.json new file mode 100644 index 00000000000..b85c1c58867 --- /dev/null +++ b/2021/33xxx/CVE-2021-33550.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33550", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33551.json b/2021/33xxx/CVE-2021-33551.json new file mode 100644 index 00000000000..6b7e4a8aa9b --- /dev/null +++ b/2021/33xxx/CVE-2021-33551.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33551", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33552.json b/2021/33xxx/CVE-2021-33552.json new file mode 100644 index 00000000000..fb912a1d8bf --- /dev/null +++ b/2021/33xxx/CVE-2021-33552.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33552", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33553.json b/2021/33xxx/CVE-2021-33553.json new file mode 100644 index 00000000000..2e51774c6a3 --- /dev/null +++ b/2021/33xxx/CVE-2021-33553.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33553", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33554.json b/2021/33xxx/CVE-2021-33554.json new file mode 100644 index 00000000000..616333e5e0f --- /dev/null +++ b/2021/33xxx/CVE-2021-33554.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33554", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/33xxx/CVE-2021-33555.json b/2021/33xxx/CVE-2021-33555.json new file mode 100644 index 00000000000..794dabdd4fc --- /dev/null +++ b/2021/33xxx/CVE-2021-33555.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-33555", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3012.json b/2021/3xxx/CVE-2021-3012.json index 4af10807ae3..04a1840fd86 100644 --- a/2021/3xxx/CVE-2021-3012.json +++ b/2021/3xxx/CVE-2021-3012.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "A cross-site scripting (XSS) vulnerability in the Document Link of documents in ESRI ArcGIS Online before 10.9 and Enterprise before 10.9 allows remote authenticated users to inject arbitrary JavaScript code via a malicious HTML attribute such as onerror (in the URL field of the Parameters tab)." + "value": "A cross-site scripting (XSS) vulnerability in the Document Link of documents in ESRI Enterprise before 10.9 allows remote authenticated users to inject arbitrary JavaScript code via a malicious HTML attribute such as onerror (in the URL field of the Parameters tab)." } ] },