From 89e15c612c1b587d5acab2d01a6bc61c75adcb16 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 8 Dec 2020 22:01:50 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/26xxx/CVE-2020-26256.json | 2 +- 2020/27xxx/CVE-2020-27821.json | 50 ++++++++++++++++++++++++++++++++-- 2020/28xxx/CVE-2020-28274.json | 50 ++++++++++++++++++++++++++++++++-- 2021/1xxx/CVE-2021-1806.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1807.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1808.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1809.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1810.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1811.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1812.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1813.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1814.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1815.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1816.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1817.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1818.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1819.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1820.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1821.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1822.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1823.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1824.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1825.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1826.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1827.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1828.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1829.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1830.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1831.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1832.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1833.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1834.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1835.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1836.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1837.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1838.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1839.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1840.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1841.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1842.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1843.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1844.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1845.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1846.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1847.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1848.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1849.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1850.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1851.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1852.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1853.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1854.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1855.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1856.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1857.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1858.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1859.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1860.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1861.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1862.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1863.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1864.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1865.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1866.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1867.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1868.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1869.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1870.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1871.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1872.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1873.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1874.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1875.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1876.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1877.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1878.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1879.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1880.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1881.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1882.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1883.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1884.json | 18 ++++++++++++ 2021/1xxx/CVE-2021-1885.json | 18 ++++++++++++ 83 files changed, 1535 insertions(+), 7 deletions(-) create mode 100644 2021/1xxx/CVE-2021-1806.json create mode 100644 2021/1xxx/CVE-2021-1807.json create mode 100644 2021/1xxx/CVE-2021-1808.json create mode 100644 2021/1xxx/CVE-2021-1809.json create mode 100644 2021/1xxx/CVE-2021-1810.json create mode 100644 2021/1xxx/CVE-2021-1811.json create mode 100644 2021/1xxx/CVE-2021-1812.json create mode 100644 2021/1xxx/CVE-2021-1813.json create mode 100644 2021/1xxx/CVE-2021-1814.json create mode 100644 2021/1xxx/CVE-2021-1815.json create mode 100644 2021/1xxx/CVE-2021-1816.json create mode 100644 2021/1xxx/CVE-2021-1817.json create mode 100644 2021/1xxx/CVE-2021-1818.json create mode 100644 2021/1xxx/CVE-2021-1819.json create mode 100644 2021/1xxx/CVE-2021-1820.json create mode 100644 2021/1xxx/CVE-2021-1821.json create mode 100644 2021/1xxx/CVE-2021-1822.json create mode 100644 2021/1xxx/CVE-2021-1823.json create mode 100644 2021/1xxx/CVE-2021-1824.json create mode 100644 2021/1xxx/CVE-2021-1825.json create mode 100644 2021/1xxx/CVE-2021-1826.json create mode 100644 2021/1xxx/CVE-2021-1827.json create mode 100644 2021/1xxx/CVE-2021-1828.json create mode 100644 2021/1xxx/CVE-2021-1829.json create mode 100644 2021/1xxx/CVE-2021-1830.json create mode 100644 2021/1xxx/CVE-2021-1831.json create mode 100644 2021/1xxx/CVE-2021-1832.json create mode 100644 2021/1xxx/CVE-2021-1833.json create mode 100644 2021/1xxx/CVE-2021-1834.json create mode 100644 2021/1xxx/CVE-2021-1835.json create mode 100644 2021/1xxx/CVE-2021-1836.json create mode 100644 2021/1xxx/CVE-2021-1837.json create mode 100644 2021/1xxx/CVE-2021-1838.json create mode 100644 2021/1xxx/CVE-2021-1839.json create mode 100644 2021/1xxx/CVE-2021-1840.json create mode 100644 2021/1xxx/CVE-2021-1841.json create mode 100644 2021/1xxx/CVE-2021-1842.json create mode 100644 2021/1xxx/CVE-2021-1843.json create mode 100644 2021/1xxx/CVE-2021-1844.json create mode 100644 2021/1xxx/CVE-2021-1845.json create mode 100644 2021/1xxx/CVE-2021-1846.json create mode 100644 2021/1xxx/CVE-2021-1847.json create mode 100644 2021/1xxx/CVE-2021-1848.json create mode 100644 2021/1xxx/CVE-2021-1849.json create mode 100644 2021/1xxx/CVE-2021-1850.json create mode 100644 2021/1xxx/CVE-2021-1851.json create mode 100644 2021/1xxx/CVE-2021-1852.json create mode 100644 2021/1xxx/CVE-2021-1853.json create mode 100644 2021/1xxx/CVE-2021-1854.json create mode 100644 2021/1xxx/CVE-2021-1855.json create mode 100644 2021/1xxx/CVE-2021-1856.json create mode 100644 2021/1xxx/CVE-2021-1857.json create mode 100644 2021/1xxx/CVE-2021-1858.json create mode 100644 2021/1xxx/CVE-2021-1859.json create mode 100644 2021/1xxx/CVE-2021-1860.json create mode 100644 2021/1xxx/CVE-2021-1861.json create mode 100644 2021/1xxx/CVE-2021-1862.json create mode 100644 2021/1xxx/CVE-2021-1863.json create mode 100644 2021/1xxx/CVE-2021-1864.json create mode 100644 2021/1xxx/CVE-2021-1865.json create mode 100644 2021/1xxx/CVE-2021-1866.json create mode 100644 2021/1xxx/CVE-2021-1867.json create mode 100644 2021/1xxx/CVE-2021-1868.json create mode 100644 2021/1xxx/CVE-2021-1869.json create mode 100644 2021/1xxx/CVE-2021-1870.json create mode 100644 2021/1xxx/CVE-2021-1871.json create mode 100644 2021/1xxx/CVE-2021-1872.json create mode 100644 2021/1xxx/CVE-2021-1873.json create mode 100644 2021/1xxx/CVE-2021-1874.json create mode 100644 2021/1xxx/CVE-2021-1875.json create mode 100644 2021/1xxx/CVE-2021-1876.json create mode 100644 2021/1xxx/CVE-2021-1877.json create mode 100644 2021/1xxx/CVE-2021-1878.json create mode 100644 2021/1xxx/CVE-2021-1879.json create mode 100644 2021/1xxx/CVE-2021-1880.json create mode 100644 2021/1xxx/CVE-2021-1881.json create mode 100644 2021/1xxx/CVE-2021-1882.json create mode 100644 2021/1xxx/CVE-2021-1883.json create mode 100644 2021/1xxx/CVE-2021-1884.json create mode 100644 2021/1xxx/CVE-2021-1885.json diff --git a/2020/26xxx/CVE-2020-26256.json b/2020/26xxx/CVE-2020-26256.json index 1b45c9d246e..97fb6d2b62e 100644 --- a/2020/26xxx/CVE-2020-26256.json +++ b/2020/26xxx/CVE-2020-26256.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Fast-csv is an npm package for parsing and formatting CSVs or any other delimited value file in node. In fast-cvs before version 4.3.6 there is a possible ReDoS vulnerability (Regular Expression Denial of Service) when using ignoreEmpty option when parsing.\n\nThis has been patched in `v4.3.6`\n\nYou will only be affected by this if you use the `ignoreEmpty` parsing option. If you do use this option it is recommended that you upgrade to the latest version `v4.3.6`\n\nThis vulnerability was found using a CodeQL query which identified `EMPTY_ROW_REGEXP` regular expression as vulnerable." + "value": "Fast-csv is an npm package for parsing and formatting CSVs or any other delimited value file in node. In fast-cvs before version 4.3.6 there is a possible ReDoS vulnerability (Regular Expression Denial of Service) when using ignoreEmpty option when parsing. This has been patched in `v4.3.6` You will only be affected by this if you use the `ignoreEmpty` parsing option. If you do use this option it is recommended that you upgrade to the latest version `v4.3.6` This vulnerability was found using a CodeQL query which identified `EMPTY_ROW_REGEXP` regular expression as vulnerable." } ] }, diff --git a/2020/27xxx/CVE-2020-27821.json b/2020/27xxx/CVE-2020-27821.json index c7fe08f4df1..3afa23f2e3f 100644 --- a/2020/27xxx/CVE-2020-27821.json +++ b/2020/27xxx/CVE-2020-27821.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27821", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "QEMU", + "version": { + "version_data": [ + { + "version_value": "prior to 5.2.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787->CWE-122" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1902651", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902651" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0." } ] } diff --git a/2020/28xxx/CVE-2020-28274.json b/2020/28xxx/CVE-2020-28274.json index aad475bd770..05f4309a490 100644 --- a/2020/28xxx/CVE-2020-28274.json +++ b/2020/28xxx/CVE-2020-28274.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-28274", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnerabilitylab@whitesourcesoftware.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "deepref", + "version": { + "version_data": [ + { + "version_value": "1.1.1, 1.1.2, 1.2.0, 1.2.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Prototype Pollution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28274,https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2", + "url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28274,https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Prototype pollution vulnerability in 'deepref' versions 1.1.1 through 1.2.1 allows attacker to cause a denial of service and may lead to remote code execution." } ] } diff --git a/2021/1xxx/CVE-2021-1806.json b/2021/1xxx/CVE-2021-1806.json new file mode 100644 index 00000000000..1539335b119 --- /dev/null +++ b/2021/1xxx/CVE-2021-1806.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1806", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1807.json b/2021/1xxx/CVE-2021-1807.json new file mode 100644 index 00000000000..b10df4dc87a --- /dev/null +++ b/2021/1xxx/CVE-2021-1807.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1807", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1808.json b/2021/1xxx/CVE-2021-1808.json new file mode 100644 index 00000000000..d7a03014003 --- /dev/null +++ b/2021/1xxx/CVE-2021-1808.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1808", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1809.json b/2021/1xxx/CVE-2021-1809.json new file mode 100644 index 00000000000..d036dc79f3e --- /dev/null +++ b/2021/1xxx/CVE-2021-1809.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1809", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1810.json b/2021/1xxx/CVE-2021-1810.json new file mode 100644 index 00000000000..f88049bc8e7 --- /dev/null +++ b/2021/1xxx/CVE-2021-1810.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1810", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1811.json b/2021/1xxx/CVE-2021-1811.json new file mode 100644 index 00000000000..6490f777815 --- /dev/null +++ b/2021/1xxx/CVE-2021-1811.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1811", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1812.json b/2021/1xxx/CVE-2021-1812.json new file mode 100644 index 00000000000..bf31683f62b --- /dev/null +++ b/2021/1xxx/CVE-2021-1812.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1812", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1813.json b/2021/1xxx/CVE-2021-1813.json new file mode 100644 index 00000000000..df31a929f11 --- /dev/null +++ b/2021/1xxx/CVE-2021-1813.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1813", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1814.json b/2021/1xxx/CVE-2021-1814.json new file mode 100644 index 00000000000..68a8ec63c0f --- /dev/null +++ b/2021/1xxx/CVE-2021-1814.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1814", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1815.json b/2021/1xxx/CVE-2021-1815.json new file mode 100644 index 00000000000..15ac5ac00a0 --- /dev/null +++ b/2021/1xxx/CVE-2021-1815.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1815", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1816.json b/2021/1xxx/CVE-2021-1816.json new file mode 100644 index 00000000000..fd8295445b4 --- /dev/null +++ b/2021/1xxx/CVE-2021-1816.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1816", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1817.json b/2021/1xxx/CVE-2021-1817.json new file mode 100644 index 00000000000..32d8a96509f --- /dev/null +++ b/2021/1xxx/CVE-2021-1817.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1817", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1818.json b/2021/1xxx/CVE-2021-1818.json new file mode 100644 index 00000000000..9b8f1cab91c --- /dev/null +++ b/2021/1xxx/CVE-2021-1818.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1818", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1819.json b/2021/1xxx/CVE-2021-1819.json new file mode 100644 index 00000000000..c21b08d3461 --- /dev/null +++ b/2021/1xxx/CVE-2021-1819.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1819", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1820.json b/2021/1xxx/CVE-2021-1820.json new file mode 100644 index 00000000000..49e0375d11a --- /dev/null +++ b/2021/1xxx/CVE-2021-1820.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1820", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1821.json b/2021/1xxx/CVE-2021-1821.json new file mode 100644 index 00000000000..2051076241f --- /dev/null +++ b/2021/1xxx/CVE-2021-1821.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1821", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1822.json b/2021/1xxx/CVE-2021-1822.json new file mode 100644 index 00000000000..7736e03425c --- /dev/null +++ b/2021/1xxx/CVE-2021-1822.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1822", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1823.json b/2021/1xxx/CVE-2021-1823.json new file mode 100644 index 00000000000..dcd4d8c6e5d --- /dev/null +++ b/2021/1xxx/CVE-2021-1823.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1823", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1824.json b/2021/1xxx/CVE-2021-1824.json new file mode 100644 index 00000000000..34eace1b64f --- /dev/null +++ b/2021/1xxx/CVE-2021-1824.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1824", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1825.json b/2021/1xxx/CVE-2021-1825.json new file mode 100644 index 00000000000..d8f3955acbe --- /dev/null +++ b/2021/1xxx/CVE-2021-1825.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1825", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1826.json b/2021/1xxx/CVE-2021-1826.json new file mode 100644 index 00000000000..5d1e1497845 --- /dev/null +++ b/2021/1xxx/CVE-2021-1826.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1826", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1827.json b/2021/1xxx/CVE-2021-1827.json new file mode 100644 index 00000000000..c999df768b6 --- /dev/null +++ b/2021/1xxx/CVE-2021-1827.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1827", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1828.json b/2021/1xxx/CVE-2021-1828.json new file mode 100644 index 00000000000..a5e21e52832 --- /dev/null +++ b/2021/1xxx/CVE-2021-1828.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1828", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1829.json b/2021/1xxx/CVE-2021-1829.json new file mode 100644 index 00000000000..d58d06a71e4 --- /dev/null +++ b/2021/1xxx/CVE-2021-1829.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1829", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1830.json b/2021/1xxx/CVE-2021-1830.json new file mode 100644 index 00000000000..98f9e45df9e --- /dev/null +++ b/2021/1xxx/CVE-2021-1830.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1830", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1831.json b/2021/1xxx/CVE-2021-1831.json new file mode 100644 index 00000000000..8995a6e56d8 --- /dev/null +++ b/2021/1xxx/CVE-2021-1831.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1831", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1832.json b/2021/1xxx/CVE-2021-1832.json new file mode 100644 index 00000000000..22d94e982bb --- /dev/null +++ b/2021/1xxx/CVE-2021-1832.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1832", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1833.json b/2021/1xxx/CVE-2021-1833.json new file mode 100644 index 00000000000..86eb2e460f0 --- /dev/null +++ b/2021/1xxx/CVE-2021-1833.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1833", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1834.json b/2021/1xxx/CVE-2021-1834.json new file mode 100644 index 00000000000..786641cc20c --- /dev/null +++ b/2021/1xxx/CVE-2021-1834.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1834", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1835.json b/2021/1xxx/CVE-2021-1835.json new file mode 100644 index 00000000000..aece4b8d4ad --- /dev/null +++ b/2021/1xxx/CVE-2021-1835.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1835", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1836.json b/2021/1xxx/CVE-2021-1836.json new file mode 100644 index 00000000000..c8f27693b62 --- /dev/null +++ b/2021/1xxx/CVE-2021-1836.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1836", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1837.json b/2021/1xxx/CVE-2021-1837.json new file mode 100644 index 00000000000..444fa4974e6 --- /dev/null +++ b/2021/1xxx/CVE-2021-1837.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1837", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1838.json b/2021/1xxx/CVE-2021-1838.json new file mode 100644 index 00000000000..4d7209a09a7 --- /dev/null +++ b/2021/1xxx/CVE-2021-1838.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1838", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1839.json b/2021/1xxx/CVE-2021-1839.json new file mode 100644 index 00000000000..20b7afebe98 --- /dev/null +++ b/2021/1xxx/CVE-2021-1839.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1839", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1840.json b/2021/1xxx/CVE-2021-1840.json new file mode 100644 index 00000000000..9e18fb774f9 --- /dev/null +++ b/2021/1xxx/CVE-2021-1840.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1840", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1841.json b/2021/1xxx/CVE-2021-1841.json new file mode 100644 index 00000000000..44f727b57b8 --- /dev/null +++ b/2021/1xxx/CVE-2021-1841.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1841", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1842.json b/2021/1xxx/CVE-2021-1842.json new file mode 100644 index 00000000000..1e3c29b174d --- /dev/null +++ b/2021/1xxx/CVE-2021-1842.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1842", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1843.json b/2021/1xxx/CVE-2021-1843.json new file mode 100644 index 00000000000..6379c547126 --- /dev/null +++ b/2021/1xxx/CVE-2021-1843.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1843", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1844.json b/2021/1xxx/CVE-2021-1844.json new file mode 100644 index 00000000000..b9891238055 --- /dev/null +++ b/2021/1xxx/CVE-2021-1844.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1844", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1845.json b/2021/1xxx/CVE-2021-1845.json new file mode 100644 index 00000000000..a68571c504d --- /dev/null +++ b/2021/1xxx/CVE-2021-1845.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1845", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1846.json b/2021/1xxx/CVE-2021-1846.json new file mode 100644 index 00000000000..88f3d98bed8 --- /dev/null +++ b/2021/1xxx/CVE-2021-1846.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1846", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1847.json b/2021/1xxx/CVE-2021-1847.json new file mode 100644 index 00000000000..9d337c41bf6 --- /dev/null +++ b/2021/1xxx/CVE-2021-1847.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1847", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1848.json b/2021/1xxx/CVE-2021-1848.json new file mode 100644 index 00000000000..0a7dfcf524d --- /dev/null +++ b/2021/1xxx/CVE-2021-1848.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1848", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1849.json b/2021/1xxx/CVE-2021-1849.json new file mode 100644 index 00000000000..30962bcc107 --- /dev/null +++ b/2021/1xxx/CVE-2021-1849.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1849", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1850.json b/2021/1xxx/CVE-2021-1850.json new file mode 100644 index 00000000000..6ccee4e546a --- /dev/null +++ b/2021/1xxx/CVE-2021-1850.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1850", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1851.json b/2021/1xxx/CVE-2021-1851.json new file mode 100644 index 00000000000..9214a81f890 --- /dev/null +++ b/2021/1xxx/CVE-2021-1851.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1851", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1852.json b/2021/1xxx/CVE-2021-1852.json new file mode 100644 index 00000000000..8de8ebe0cc2 --- /dev/null +++ b/2021/1xxx/CVE-2021-1852.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1852", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1853.json b/2021/1xxx/CVE-2021-1853.json new file mode 100644 index 00000000000..8de5f17a510 --- /dev/null +++ b/2021/1xxx/CVE-2021-1853.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1853", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1854.json b/2021/1xxx/CVE-2021-1854.json new file mode 100644 index 00000000000..61055a3f79b --- /dev/null +++ b/2021/1xxx/CVE-2021-1854.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1854", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1855.json b/2021/1xxx/CVE-2021-1855.json new file mode 100644 index 00000000000..674bce1b797 --- /dev/null +++ b/2021/1xxx/CVE-2021-1855.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1855", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1856.json b/2021/1xxx/CVE-2021-1856.json new file mode 100644 index 00000000000..1c0c371a6b4 --- /dev/null +++ b/2021/1xxx/CVE-2021-1856.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1856", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1857.json b/2021/1xxx/CVE-2021-1857.json new file mode 100644 index 00000000000..4addc13193b --- /dev/null +++ b/2021/1xxx/CVE-2021-1857.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1857", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1858.json b/2021/1xxx/CVE-2021-1858.json new file mode 100644 index 00000000000..66909dd106f --- /dev/null +++ b/2021/1xxx/CVE-2021-1858.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1858", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1859.json b/2021/1xxx/CVE-2021-1859.json new file mode 100644 index 00000000000..694dc108f80 --- /dev/null +++ b/2021/1xxx/CVE-2021-1859.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1859", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1860.json b/2021/1xxx/CVE-2021-1860.json new file mode 100644 index 00000000000..3297579802b --- /dev/null +++ b/2021/1xxx/CVE-2021-1860.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1860", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1861.json b/2021/1xxx/CVE-2021-1861.json new file mode 100644 index 00000000000..c39bfff803b --- /dev/null +++ b/2021/1xxx/CVE-2021-1861.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1861", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1862.json b/2021/1xxx/CVE-2021-1862.json new file mode 100644 index 00000000000..b662035b1b7 --- /dev/null +++ b/2021/1xxx/CVE-2021-1862.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1862", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1863.json b/2021/1xxx/CVE-2021-1863.json new file mode 100644 index 00000000000..4e905330fa0 --- /dev/null +++ b/2021/1xxx/CVE-2021-1863.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1863", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1864.json b/2021/1xxx/CVE-2021-1864.json new file mode 100644 index 00000000000..352e8877f3d --- /dev/null +++ b/2021/1xxx/CVE-2021-1864.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1864", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1865.json b/2021/1xxx/CVE-2021-1865.json new file mode 100644 index 00000000000..d80731affde --- /dev/null +++ b/2021/1xxx/CVE-2021-1865.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1865", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1866.json b/2021/1xxx/CVE-2021-1866.json new file mode 100644 index 00000000000..be991840be5 --- /dev/null +++ b/2021/1xxx/CVE-2021-1866.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1866", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1867.json b/2021/1xxx/CVE-2021-1867.json new file mode 100644 index 00000000000..c31be03dc11 --- /dev/null +++ b/2021/1xxx/CVE-2021-1867.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1867", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1868.json b/2021/1xxx/CVE-2021-1868.json new file mode 100644 index 00000000000..cb3db637355 --- /dev/null +++ b/2021/1xxx/CVE-2021-1868.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1868", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1869.json b/2021/1xxx/CVE-2021-1869.json new file mode 100644 index 00000000000..231b3d94674 --- /dev/null +++ b/2021/1xxx/CVE-2021-1869.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1869", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1870.json b/2021/1xxx/CVE-2021-1870.json new file mode 100644 index 00000000000..fe3df60d2fc --- /dev/null +++ b/2021/1xxx/CVE-2021-1870.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1870", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1871.json b/2021/1xxx/CVE-2021-1871.json new file mode 100644 index 00000000000..d13cc5a8b49 --- /dev/null +++ b/2021/1xxx/CVE-2021-1871.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1871", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1872.json b/2021/1xxx/CVE-2021-1872.json new file mode 100644 index 00000000000..79f4a184520 --- /dev/null +++ b/2021/1xxx/CVE-2021-1872.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1872", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1873.json b/2021/1xxx/CVE-2021-1873.json new file mode 100644 index 00000000000..1a14c7984c2 --- /dev/null +++ b/2021/1xxx/CVE-2021-1873.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1873", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1874.json b/2021/1xxx/CVE-2021-1874.json new file mode 100644 index 00000000000..5b6eb242d87 --- /dev/null +++ b/2021/1xxx/CVE-2021-1874.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1874", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1875.json b/2021/1xxx/CVE-2021-1875.json new file mode 100644 index 00000000000..9ea18aead3f --- /dev/null +++ b/2021/1xxx/CVE-2021-1875.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1875", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1876.json b/2021/1xxx/CVE-2021-1876.json new file mode 100644 index 00000000000..7cd8db07808 --- /dev/null +++ b/2021/1xxx/CVE-2021-1876.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1876", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1877.json b/2021/1xxx/CVE-2021-1877.json new file mode 100644 index 00000000000..e3268b560f9 --- /dev/null +++ b/2021/1xxx/CVE-2021-1877.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1877", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1878.json b/2021/1xxx/CVE-2021-1878.json new file mode 100644 index 00000000000..2ff878c77cb --- /dev/null +++ b/2021/1xxx/CVE-2021-1878.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1878", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1879.json b/2021/1xxx/CVE-2021-1879.json new file mode 100644 index 00000000000..6f37a2e5648 --- /dev/null +++ b/2021/1xxx/CVE-2021-1879.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1879", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1880.json b/2021/1xxx/CVE-2021-1880.json new file mode 100644 index 00000000000..7b190aa2913 --- /dev/null +++ b/2021/1xxx/CVE-2021-1880.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1880", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1881.json b/2021/1xxx/CVE-2021-1881.json new file mode 100644 index 00000000000..8bfffb1a76a --- /dev/null +++ b/2021/1xxx/CVE-2021-1881.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1881", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1882.json b/2021/1xxx/CVE-2021-1882.json new file mode 100644 index 00000000000..b26164f8ca2 --- /dev/null +++ b/2021/1xxx/CVE-2021-1882.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1882", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1883.json b/2021/1xxx/CVE-2021-1883.json new file mode 100644 index 00000000000..dee88f159fc --- /dev/null +++ b/2021/1xxx/CVE-2021-1883.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1883", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1884.json b/2021/1xxx/CVE-2021-1884.json new file mode 100644 index 00000000000..d6b6f95f0a1 --- /dev/null +++ b/2021/1xxx/CVE-2021-1884.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1884", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1885.json b/2021/1xxx/CVE-2021-1885.json new file mode 100644 index 00000000000..6a33858d3c4 --- /dev/null +++ b/2021/1xxx/CVE-2021-1885.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1885", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file