From a6a1201e0c0e0f53a4027714eb441f94350dd9bf Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 21 Sep 2021 13:00:58 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/0xxx/CVE-2021-0869.json | 50 ++++++++++++++++++++++++++-- 2021/28xxx/CVE-2021-28960.json | 61 ++++++++++++++++++++++++++++++---- 2021/37xxx/CVE-2021-37419.json | 61 ++++++++++++++++++++++++++++++---- 2021/37xxx/CVE-2021-37420.json | 61 ++++++++++++++++++++++++++++++---- 2021/37xxx/CVE-2021-37424.json | 61 ++++++++++++++++++++++++++++++---- 2021/37xxx/CVE-2021-37741.json | 61 ++++++++++++++++++++++++++++++---- 2021/41xxx/CVE-2021-41533.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41534.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41535.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41536.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41537.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41538.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41539.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41540.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41541.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41542.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41543.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41544.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41545.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41546.json | 18 ++++++++++ 2021/41xxx/CVE-2021-41547.json | 18 ++++++++++ 21 files changed, 592 insertions(+), 33 deletions(-) create mode 100644 2021/41xxx/CVE-2021-41533.json create mode 100644 2021/41xxx/CVE-2021-41534.json create mode 100644 2021/41xxx/CVE-2021-41535.json create mode 100644 2021/41xxx/CVE-2021-41536.json create mode 100644 2021/41xxx/CVE-2021-41537.json create mode 100644 2021/41xxx/CVE-2021-41538.json create mode 100644 2021/41xxx/CVE-2021-41539.json create mode 100644 2021/41xxx/CVE-2021-41540.json create mode 100644 2021/41xxx/CVE-2021-41541.json create mode 100644 2021/41xxx/CVE-2021-41542.json create mode 100644 2021/41xxx/CVE-2021-41543.json create mode 100644 2021/41xxx/CVE-2021-41544.json create mode 100644 2021/41xxx/CVE-2021-41545.json create mode 100644 2021/41xxx/CVE-2021-41546.json create mode 100644 2021/41xxx/CVE-2021-41547.json diff --git a/2021/0xxx/CVE-2021-0869.json b/2021/0xxx/CVE-2021-0869.json index 520f1f3d0d2..243d1d068ce 100644 --- a/2021/0xxx/CVE-2021-0869.json +++ b/2021/0xxx/CVE-2021-0869.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-0869", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@android.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Android", + "version": { + "version_data": [ + { + "version_value": "Android kernel" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Remote code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://source.android.com/security/bulletin/pixel/2021-09-01", + "url": "https://source.android.com/security/bulletin/pixel/2021-09-01" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In GetTimeStampAndPkt of DumpstateDevice.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-179620905 References: N/A" } ] } diff --git a/2021/28xxx/CVE-2021-28960.json b/2021/28xxx/CVE-2021-28960.json index d426957e88d..844cbc4cfe6 100644 --- a/2021/28xxx/CVE-2021-28960.json +++ b/2021/28xxx/CVE-2021-28960.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28960", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28960", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ManageEngine Desktop Central before build 10.0.683 allows Unauthenticated Remote Code Execution during communication with Notification Server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/desktop-central/unauthenticated-command-injection-vulnerability.html", + "url": "https://www.manageengine.com/products/desktop-central/unauthenticated-command-injection-vulnerability.html" } ] } diff --git a/2021/37xxx/CVE-2021-37419.json b/2021/37xxx/CVE-2021-37419.json index a1c3501844b..c0214944ac3 100644 --- a/2021/37xxx/CVE-2021-37419.json +++ b/2021/37xxx/CVE-2021-37419.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37419", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37419", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ManageEngine ADSelfService Plus before 6112 is vulnerable to SSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6112-hotfix-release", + "url": "https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6112-hotfix-release" } ] } diff --git a/2021/37xxx/CVE-2021-37420.json b/2021/37xxx/CVE-2021-37420.json index 873b2b12ae1..bbfad41a2c7 100644 --- a/2021/37xxx/CVE-2021-37420.json +++ b/2021/37xxx/CVE-2021-37420.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37420", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37420", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ManageEngine ADSelfService Plus before 6112 is vulnerable to mail spoofing." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6112-hotfix-release", + "url": "https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6112-hotfix-release" } ] } diff --git a/2021/37xxx/CVE-2021-37424.json b/2021/37xxx/CVE-2021-37424.json index 02ce621c411..561503d527d 100644 --- a/2021/37xxx/CVE-2021-37424.json +++ b/2021/37xxx/CVE-2021-37424.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37424", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37424", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ManageEngine ADSelfService Plus before 6112 is vulnerable to domain user account takeover." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6112-hotfix-release", + "url": "https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6112-hotfix-release" } ] } diff --git a/2021/37xxx/CVE-2021-37741.json b/2021/37xxx/CVE-2021-37741.json index 53a8dbd96ab..f4c6fdc715a 100644 --- a/2021/37xxx/CVE-2021-37741.json +++ b/2021/37xxx/CVE-2021-37741.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37741", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37741", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ManageEngine ADManager Plus before 7111 has Pre-authentication RCE vulnerabilities." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com", + "refsource": "MISC", + "name": "https://www.manageengine.com" + }, + { + "refsource": "MISC", + "name": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111", + "url": "https://www.manageengine.com/products/ad-manager/release-notes.html#7111" } ] } diff --git a/2021/41xxx/CVE-2021-41533.json b/2021/41xxx/CVE-2021-41533.json new file mode 100644 index 00000000000..5088e6534be --- /dev/null +++ b/2021/41xxx/CVE-2021-41533.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41533", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41534.json b/2021/41xxx/CVE-2021-41534.json new file mode 100644 index 00000000000..8f2b35818af --- /dev/null +++ b/2021/41xxx/CVE-2021-41534.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41534", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41535.json b/2021/41xxx/CVE-2021-41535.json new file mode 100644 index 00000000000..9c711f3c731 --- /dev/null +++ b/2021/41xxx/CVE-2021-41535.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41535", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41536.json b/2021/41xxx/CVE-2021-41536.json new file mode 100644 index 00000000000..264970a3773 --- /dev/null +++ b/2021/41xxx/CVE-2021-41536.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41536", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41537.json b/2021/41xxx/CVE-2021-41537.json new file mode 100644 index 00000000000..b037ed539ea --- /dev/null +++ b/2021/41xxx/CVE-2021-41537.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41537", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41538.json b/2021/41xxx/CVE-2021-41538.json new file mode 100644 index 00000000000..ad5926c3a91 --- /dev/null +++ b/2021/41xxx/CVE-2021-41538.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41538", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41539.json b/2021/41xxx/CVE-2021-41539.json new file mode 100644 index 00000000000..c46bf68f323 --- /dev/null +++ b/2021/41xxx/CVE-2021-41539.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41539", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41540.json b/2021/41xxx/CVE-2021-41540.json new file mode 100644 index 00000000000..2940942339c --- /dev/null +++ b/2021/41xxx/CVE-2021-41540.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41540", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41541.json b/2021/41xxx/CVE-2021-41541.json new file mode 100644 index 00000000000..06a3263d415 --- /dev/null +++ b/2021/41xxx/CVE-2021-41541.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41541", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41542.json b/2021/41xxx/CVE-2021-41542.json new file mode 100644 index 00000000000..03edeb98bcd --- /dev/null +++ b/2021/41xxx/CVE-2021-41542.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41542", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41543.json b/2021/41xxx/CVE-2021-41543.json new file mode 100644 index 00000000000..627b653c5a7 --- /dev/null +++ b/2021/41xxx/CVE-2021-41543.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41543", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41544.json b/2021/41xxx/CVE-2021-41544.json new file mode 100644 index 00000000000..46724ec743a --- /dev/null +++ b/2021/41xxx/CVE-2021-41544.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41544", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41545.json b/2021/41xxx/CVE-2021-41545.json new file mode 100644 index 00000000000..e4226cbe399 --- /dev/null +++ b/2021/41xxx/CVE-2021-41545.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41545", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41546.json b/2021/41xxx/CVE-2021-41546.json new file mode 100644 index 00000000000..885d9e21b6f --- /dev/null +++ b/2021/41xxx/CVE-2021-41546.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41546", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/41xxx/CVE-2021-41547.json b/2021/41xxx/CVE-2021-41547.json new file mode 100644 index 00000000000..0e3b3093dd3 --- /dev/null +++ b/2021/41xxx/CVE-2021-41547.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-41547", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file