From 85d0f782999e42fa0e98642589ee51040e2cfcfb Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 7 Jan 2021 00:03:15 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/26xxx/CVE-2020-26085.json | 4 +-- 2020/36xxx/CVE-2020-36179.json | 61 ++++++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36180.json | 61 ++++++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36182.json | 61 ++++++++++++++++++++++++++++++---- 2020/36xxx/CVE-2020-36183.json | 61 ++++++++++++++++++++++++++++++---- 2021/23xxx/CVE-2021-23115.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23116.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23117.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23118.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23119.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23120.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23121.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23122.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23123.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23124.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23125.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23126.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23127.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23128.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23129.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23130.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23131.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23132.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23133.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23134.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23135.json | 18 ++++++++++ 2021/23xxx/CVE-2021-23234.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3031.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3032.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3033.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3034.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3035.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3036.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3037.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3038.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3039.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3040.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3041.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3042.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3043.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3044.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3045.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3046.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3047.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3048.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3049.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3050.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3051.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3052.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3053.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3054.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3055.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3056.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3057.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3058.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3059.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3060.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3061.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3062.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3063.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3064.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3065.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3066.json | 18 ++++++++++ 63 files changed, 1266 insertions(+), 26 deletions(-) create mode 100644 2021/23xxx/CVE-2021-23115.json create mode 100644 2021/23xxx/CVE-2021-23116.json create mode 100644 2021/23xxx/CVE-2021-23117.json create mode 100644 2021/23xxx/CVE-2021-23118.json create mode 100644 2021/23xxx/CVE-2021-23119.json create mode 100644 2021/23xxx/CVE-2021-23120.json create mode 100644 2021/23xxx/CVE-2021-23121.json create mode 100644 2021/23xxx/CVE-2021-23122.json create mode 100644 2021/23xxx/CVE-2021-23123.json create mode 100644 2021/23xxx/CVE-2021-23124.json create mode 100644 2021/23xxx/CVE-2021-23125.json create mode 100644 2021/23xxx/CVE-2021-23126.json create mode 100644 2021/23xxx/CVE-2021-23127.json create mode 100644 2021/23xxx/CVE-2021-23128.json create mode 100644 2021/23xxx/CVE-2021-23129.json create mode 100644 2021/23xxx/CVE-2021-23130.json create mode 100644 2021/23xxx/CVE-2021-23131.json create mode 100644 2021/23xxx/CVE-2021-23132.json create mode 100644 2021/23xxx/CVE-2021-23133.json create mode 100644 2021/23xxx/CVE-2021-23134.json create mode 100644 2021/23xxx/CVE-2021-23135.json create mode 100644 2021/23xxx/CVE-2021-23234.json create mode 100644 2021/3xxx/CVE-2021-3031.json create mode 100644 2021/3xxx/CVE-2021-3032.json create mode 100644 2021/3xxx/CVE-2021-3033.json create mode 100644 2021/3xxx/CVE-2021-3034.json create mode 100644 2021/3xxx/CVE-2021-3035.json create mode 100644 2021/3xxx/CVE-2021-3036.json create mode 100644 2021/3xxx/CVE-2021-3037.json create mode 100644 2021/3xxx/CVE-2021-3038.json create mode 100644 2021/3xxx/CVE-2021-3039.json create mode 100644 2021/3xxx/CVE-2021-3040.json create mode 100644 2021/3xxx/CVE-2021-3041.json create mode 100644 2021/3xxx/CVE-2021-3042.json create mode 100644 2021/3xxx/CVE-2021-3043.json create mode 100644 2021/3xxx/CVE-2021-3044.json create mode 100644 2021/3xxx/CVE-2021-3045.json create mode 100644 2021/3xxx/CVE-2021-3046.json create mode 100644 2021/3xxx/CVE-2021-3047.json create mode 100644 2021/3xxx/CVE-2021-3048.json create mode 100644 2021/3xxx/CVE-2021-3049.json create mode 100644 2021/3xxx/CVE-2021-3050.json create mode 100644 2021/3xxx/CVE-2021-3051.json create mode 100644 2021/3xxx/CVE-2021-3052.json create mode 100644 2021/3xxx/CVE-2021-3053.json create mode 100644 2021/3xxx/CVE-2021-3054.json create mode 100644 2021/3xxx/CVE-2021-3055.json create mode 100644 2021/3xxx/CVE-2021-3056.json create mode 100644 2021/3xxx/CVE-2021-3057.json create mode 100644 2021/3xxx/CVE-2021-3058.json create mode 100644 2021/3xxx/CVE-2021-3059.json create mode 100644 2021/3xxx/CVE-2021-3060.json create mode 100644 2021/3xxx/CVE-2021-3061.json create mode 100644 2021/3xxx/CVE-2021-3062.json create mode 100644 2021/3xxx/CVE-2021-3063.json create mode 100644 2021/3xxx/CVE-2021-3064.json create mode 100644 2021/3xxx/CVE-2021-3065.json create mode 100644 2021/3xxx/CVE-2021-3066.json diff --git a/2020/26xxx/CVE-2020-26085.json b/2020/26xxx/CVE-2020-26085.json index eb709a51aba..cda501867db 100644 --- a/2020/26xxx/CVE-2020-26085.json +++ b/2020/26xxx/CVE-2020-26085.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory. " + "value": "Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory." } ] }, @@ -87,4 +87,4 @@ ], "discovery": "INTERNAL" } -} +} \ No newline at end of file diff --git a/2020/36xxx/CVE-2020-36179.json b/2020/36xxx/CVE-2020-36179.json index 5a1e1c6062d..da26a3b7171 100644 --- a/2020/36xxx/CVE-2020-36179.json +++ b/2020/36xxx/CVE-2020-36179.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36179", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36179", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", + "refsource": "MISC", + "name": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" + }, + { + "url": "https://github.com/FasterXML/jackson-databind/issues/3004", + "refsource": "MISC", + "name": "https://github.com/FasterXML/jackson-databind/issues/3004" } ] } diff --git a/2020/36xxx/CVE-2020-36180.json b/2020/36xxx/CVE-2020-36180.json index bdb7742e51b..14ee37df15e 100644 --- a/2020/36xxx/CVE-2020-36180.json +++ b/2020/36xxx/CVE-2020-36180.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36180", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36180", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", + "refsource": "MISC", + "name": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" + }, + { + "url": "https://github.com/FasterXML/jackson-databind/issues/3004", + "refsource": "MISC", + "name": "https://github.com/FasterXML/jackson-databind/issues/3004" } ] } diff --git a/2020/36xxx/CVE-2020-36182.json b/2020/36xxx/CVE-2020-36182.json index ecbcf2e1cc8..eea14ea2f10 100644 --- a/2020/36xxx/CVE-2020-36182.json +++ b/2020/36xxx/CVE-2020-36182.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36182", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36182", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", + "refsource": "MISC", + "name": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" + }, + { + "url": "https://github.com/FasterXML/jackson-databind/issues/3004", + "refsource": "MISC", + "name": "https://github.com/FasterXML/jackson-databind/issues/3004" } ] } diff --git a/2020/36xxx/CVE-2020-36183.json b/2020/36xxx/CVE-2020-36183.json index 942bf3f9899..4a367ef79bb 100644 --- a/2020/36xxx/CVE-2020-36183.json +++ b/2020/36xxx/CVE-2020-36183.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-36183", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-36183", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062", + "refsource": "MISC", + "name": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" + }, + { + "url": "https://github.com/FasterXML/jackson-databind/issues/3003", + "refsource": "MISC", + "name": "https://github.com/FasterXML/jackson-databind/issues/3003" } ] } diff --git a/2021/23xxx/CVE-2021-23115.json b/2021/23xxx/CVE-2021-23115.json new file mode 100644 index 00000000000..257305a6bd3 --- /dev/null +++ b/2021/23xxx/CVE-2021-23115.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23115", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23116.json b/2021/23xxx/CVE-2021-23116.json new file mode 100644 index 00000000000..e98a6238fe6 --- /dev/null +++ b/2021/23xxx/CVE-2021-23116.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23116", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23117.json b/2021/23xxx/CVE-2021-23117.json new file mode 100644 index 00000000000..b8dc6be55d4 --- /dev/null +++ b/2021/23xxx/CVE-2021-23117.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23117", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23118.json b/2021/23xxx/CVE-2021-23118.json new file mode 100644 index 00000000000..6900409f8a9 --- /dev/null +++ b/2021/23xxx/CVE-2021-23118.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23118", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23119.json b/2021/23xxx/CVE-2021-23119.json new file mode 100644 index 00000000000..cfdca6163eb --- /dev/null +++ b/2021/23xxx/CVE-2021-23119.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23119", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23120.json b/2021/23xxx/CVE-2021-23120.json new file mode 100644 index 00000000000..7176e15f858 --- /dev/null +++ b/2021/23xxx/CVE-2021-23120.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23120", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23121.json b/2021/23xxx/CVE-2021-23121.json new file mode 100644 index 00000000000..962b0da93e2 --- /dev/null +++ b/2021/23xxx/CVE-2021-23121.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23121", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23122.json b/2021/23xxx/CVE-2021-23122.json new file mode 100644 index 00000000000..7b7579bd286 --- /dev/null +++ b/2021/23xxx/CVE-2021-23122.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23122", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23123.json b/2021/23xxx/CVE-2021-23123.json new file mode 100644 index 00000000000..a31ce802166 --- /dev/null +++ b/2021/23xxx/CVE-2021-23123.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23123", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23124.json b/2021/23xxx/CVE-2021-23124.json new file mode 100644 index 00000000000..ba52b690d2f --- /dev/null +++ b/2021/23xxx/CVE-2021-23124.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23124", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23125.json b/2021/23xxx/CVE-2021-23125.json new file mode 100644 index 00000000000..7a09a1d8a56 --- /dev/null +++ b/2021/23xxx/CVE-2021-23125.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23125", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23126.json b/2021/23xxx/CVE-2021-23126.json new file mode 100644 index 00000000000..abfc9f6f683 --- /dev/null +++ b/2021/23xxx/CVE-2021-23126.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23126", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23127.json b/2021/23xxx/CVE-2021-23127.json new file mode 100644 index 00000000000..bc666fb9ac9 --- /dev/null +++ b/2021/23xxx/CVE-2021-23127.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23127", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23128.json b/2021/23xxx/CVE-2021-23128.json new file mode 100644 index 00000000000..eb799c48923 --- /dev/null +++ b/2021/23xxx/CVE-2021-23128.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23128", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23129.json b/2021/23xxx/CVE-2021-23129.json new file mode 100644 index 00000000000..a5b28a7256d --- /dev/null +++ b/2021/23xxx/CVE-2021-23129.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23129", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23130.json b/2021/23xxx/CVE-2021-23130.json new file mode 100644 index 00000000000..fba3a693675 --- /dev/null +++ b/2021/23xxx/CVE-2021-23130.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23130", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23131.json b/2021/23xxx/CVE-2021-23131.json new file mode 100644 index 00000000000..2dd21287efb --- /dev/null +++ b/2021/23xxx/CVE-2021-23131.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23131", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23132.json b/2021/23xxx/CVE-2021-23132.json new file mode 100644 index 00000000000..3943d904b17 --- /dev/null +++ b/2021/23xxx/CVE-2021-23132.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23132", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23133.json b/2021/23xxx/CVE-2021-23133.json new file mode 100644 index 00000000000..049eeab7b16 --- /dev/null +++ b/2021/23xxx/CVE-2021-23133.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23133", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23134.json b/2021/23xxx/CVE-2021-23134.json new file mode 100644 index 00000000000..40da923306c --- /dev/null +++ b/2021/23xxx/CVE-2021-23134.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23134", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23135.json b/2021/23xxx/CVE-2021-23135.json new file mode 100644 index 00000000000..b47ca8c0dab --- /dev/null +++ b/2021/23xxx/CVE-2021-23135.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23135", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/23xxx/CVE-2021-23234.json b/2021/23xxx/CVE-2021-23234.json new file mode 100644 index 00000000000..5a734aad9a9 --- /dev/null +++ b/2021/23xxx/CVE-2021-23234.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-23234", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3031.json b/2021/3xxx/CVE-2021-3031.json new file mode 100644 index 00000000000..250a79f1232 --- /dev/null +++ b/2021/3xxx/CVE-2021-3031.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3031", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3032.json b/2021/3xxx/CVE-2021-3032.json new file mode 100644 index 00000000000..4d3a4090cc0 --- /dev/null +++ b/2021/3xxx/CVE-2021-3032.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3032", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3033.json b/2021/3xxx/CVE-2021-3033.json new file mode 100644 index 00000000000..9f6794a3a55 --- /dev/null +++ b/2021/3xxx/CVE-2021-3033.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3033", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3034.json b/2021/3xxx/CVE-2021-3034.json new file mode 100644 index 00000000000..ae2b7ab55ef --- /dev/null +++ b/2021/3xxx/CVE-2021-3034.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3034", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3035.json b/2021/3xxx/CVE-2021-3035.json new file mode 100644 index 00000000000..05b5292319a --- /dev/null +++ b/2021/3xxx/CVE-2021-3035.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3035", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3036.json b/2021/3xxx/CVE-2021-3036.json new file mode 100644 index 00000000000..80e9bf86a6c --- /dev/null +++ b/2021/3xxx/CVE-2021-3036.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3036", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3037.json b/2021/3xxx/CVE-2021-3037.json new file mode 100644 index 00000000000..58451143774 --- /dev/null +++ b/2021/3xxx/CVE-2021-3037.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3037", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3038.json b/2021/3xxx/CVE-2021-3038.json new file mode 100644 index 00000000000..0becdb4dde0 --- /dev/null +++ b/2021/3xxx/CVE-2021-3038.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3038", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3039.json b/2021/3xxx/CVE-2021-3039.json new file mode 100644 index 00000000000..b665bda712b --- /dev/null +++ b/2021/3xxx/CVE-2021-3039.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3039", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3040.json b/2021/3xxx/CVE-2021-3040.json new file mode 100644 index 00000000000..d13116fe8bf --- /dev/null +++ b/2021/3xxx/CVE-2021-3040.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3040", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3041.json b/2021/3xxx/CVE-2021-3041.json new file mode 100644 index 00000000000..f0465d915b8 --- /dev/null +++ b/2021/3xxx/CVE-2021-3041.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3041", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3042.json b/2021/3xxx/CVE-2021-3042.json new file mode 100644 index 00000000000..fa764a2d582 --- /dev/null +++ b/2021/3xxx/CVE-2021-3042.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3042", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3043.json b/2021/3xxx/CVE-2021-3043.json new file mode 100644 index 00000000000..c741e24a754 --- /dev/null +++ b/2021/3xxx/CVE-2021-3043.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3043", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3044.json b/2021/3xxx/CVE-2021-3044.json new file mode 100644 index 00000000000..90f5e924bb1 --- /dev/null +++ b/2021/3xxx/CVE-2021-3044.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3044", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3045.json b/2021/3xxx/CVE-2021-3045.json new file mode 100644 index 00000000000..a9eab8f6dca --- /dev/null +++ b/2021/3xxx/CVE-2021-3045.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3045", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3046.json b/2021/3xxx/CVE-2021-3046.json new file mode 100644 index 00000000000..92e26977d25 --- /dev/null +++ b/2021/3xxx/CVE-2021-3046.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3046", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3047.json b/2021/3xxx/CVE-2021-3047.json new file mode 100644 index 00000000000..55937a7b738 --- /dev/null +++ b/2021/3xxx/CVE-2021-3047.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3047", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3048.json b/2021/3xxx/CVE-2021-3048.json new file mode 100644 index 00000000000..8ea03ba970b --- /dev/null +++ b/2021/3xxx/CVE-2021-3048.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3048", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3049.json b/2021/3xxx/CVE-2021-3049.json new file mode 100644 index 00000000000..205df58d546 --- /dev/null +++ b/2021/3xxx/CVE-2021-3049.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3049", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3050.json b/2021/3xxx/CVE-2021-3050.json new file mode 100644 index 00000000000..d11ec00b997 --- /dev/null +++ b/2021/3xxx/CVE-2021-3050.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3050", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3051.json b/2021/3xxx/CVE-2021-3051.json new file mode 100644 index 00000000000..427a0b53b79 --- /dev/null +++ b/2021/3xxx/CVE-2021-3051.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3051", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3052.json b/2021/3xxx/CVE-2021-3052.json new file mode 100644 index 00000000000..8a6845030cf --- /dev/null +++ b/2021/3xxx/CVE-2021-3052.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3052", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3053.json b/2021/3xxx/CVE-2021-3053.json new file mode 100644 index 00000000000..e3d5e4aa443 --- /dev/null +++ b/2021/3xxx/CVE-2021-3053.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3053", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3054.json b/2021/3xxx/CVE-2021-3054.json new file mode 100644 index 00000000000..606d929c1a2 --- /dev/null +++ b/2021/3xxx/CVE-2021-3054.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3054", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3055.json b/2021/3xxx/CVE-2021-3055.json new file mode 100644 index 00000000000..52c50bb29b2 --- /dev/null +++ b/2021/3xxx/CVE-2021-3055.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3055", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3056.json b/2021/3xxx/CVE-2021-3056.json new file mode 100644 index 00000000000..ece307d3c94 --- /dev/null +++ b/2021/3xxx/CVE-2021-3056.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3056", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3057.json b/2021/3xxx/CVE-2021-3057.json new file mode 100644 index 00000000000..f4b1708db24 --- /dev/null +++ b/2021/3xxx/CVE-2021-3057.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3057", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3058.json b/2021/3xxx/CVE-2021-3058.json new file mode 100644 index 00000000000..2240623803f --- /dev/null +++ b/2021/3xxx/CVE-2021-3058.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3058", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3059.json b/2021/3xxx/CVE-2021-3059.json new file mode 100644 index 00000000000..d1ea1bb9d09 --- /dev/null +++ b/2021/3xxx/CVE-2021-3059.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3059", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3060.json b/2021/3xxx/CVE-2021-3060.json new file mode 100644 index 00000000000..e45e75a4aae --- /dev/null +++ b/2021/3xxx/CVE-2021-3060.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3060", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3061.json b/2021/3xxx/CVE-2021-3061.json new file mode 100644 index 00000000000..800566f2506 --- /dev/null +++ b/2021/3xxx/CVE-2021-3061.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3061", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3062.json b/2021/3xxx/CVE-2021-3062.json new file mode 100644 index 00000000000..6a0855e9de3 --- /dev/null +++ b/2021/3xxx/CVE-2021-3062.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3062", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3063.json b/2021/3xxx/CVE-2021-3063.json new file mode 100644 index 00000000000..5063e580aef --- /dev/null +++ b/2021/3xxx/CVE-2021-3063.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3063", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3064.json b/2021/3xxx/CVE-2021-3064.json new file mode 100644 index 00000000000..9bd7f09b7e4 --- /dev/null +++ b/2021/3xxx/CVE-2021-3064.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3064", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3065.json b/2021/3xxx/CVE-2021-3065.json new file mode 100644 index 00000000000..5643864195c --- /dev/null +++ b/2021/3xxx/CVE-2021-3065.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3065", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3066.json b/2021/3xxx/CVE-2021-3066.json new file mode 100644 index 00000000000..906784096c6 --- /dev/null +++ b/2021/3xxx/CVE-2021-3066.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3066", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file