From aee3c1dbd82ed56d7c8e7ad2605f8eeb4b05f1c8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 17 Dec 2020 20:04:12 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/14xxx/CVE-2020-14871.json | 5 +++ 2020/26xxx/CVE-2020-26276.json | 2 +- 2020/35xxx/CVE-2020-35416.json | 5 +++ 2020/35xxx/CVE-2020-35545.json | 62 ++++++++++++++++++++++++++++++++++ 2021/20xxx/CVE-2021-20336.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20337.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20338.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20560.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20561.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20562.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20563.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20564.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20565.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20566.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20567.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20568.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20569.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20570.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20571.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20572.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20573.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20574.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20575.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20576.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20577.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20578.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20579.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20580.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20581.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20582.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20583.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20584.json | 18 ++++++++++ 2021/20xxx/CVE-2021-20585.json | 18 ++++++++++ 33 files changed, 595 insertions(+), 1 deletion(-) create mode 100644 2020/35xxx/CVE-2020-35545.json create mode 100644 2021/20xxx/CVE-2021-20336.json create mode 100644 2021/20xxx/CVE-2021-20337.json create mode 100644 2021/20xxx/CVE-2021-20338.json create mode 100644 2021/20xxx/CVE-2021-20560.json create mode 100644 2021/20xxx/CVE-2021-20561.json create mode 100644 2021/20xxx/CVE-2021-20562.json create mode 100644 2021/20xxx/CVE-2021-20563.json create mode 100644 2021/20xxx/CVE-2021-20564.json create mode 100644 2021/20xxx/CVE-2021-20565.json create mode 100644 2021/20xxx/CVE-2021-20566.json create mode 100644 2021/20xxx/CVE-2021-20567.json create mode 100644 2021/20xxx/CVE-2021-20568.json create mode 100644 2021/20xxx/CVE-2021-20569.json create mode 100644 2021/20xxx/CVE-2021-20570.json create mode 100644 2021/20xxx/CVE-2021-20571.json create mode 100644 2021/20xxx/CVE-2021-20572.json create mode 100644 2021/20xxx/CVE-2021-20573.json create mode 100644 2021/20xxx/CVE-2021-20574.json create mode 100644 2021/20xxx/CVE-2021-20575.json create mode 100644 2021/20xxx/CVE-2021-20576.json create mode 100644 2021/20xxx/CVE-2021-20577.json create mode 100644 2021/20xxx/CVE-2021-20578.json create mode 100644 2021/20xxx/CVE-2021-20579.json create mode 100644 2021/20xxx/CVE-2021-20580.json create mode 100644 2021/20xxx/CVE-2021-20581.json create mode 100644 2021/20xxx/CVE-2021-20582.json create mode 100644 2021/20xxx/CVE-2021-20583.json create mode 100644 2021/20xxx/CVE-2021-20584.json create mode 100644 2021/20xxx/CVE-2021-20585.json diff --git a/2020/14xxx/CVE-2020-14871.json b/2020/14xxx/CVE-2020-14871.json index 2e002c359a9..c3421d969ec 100644 --- a/2020/14xxx/CVE-2020-14871.json +++ b/2020/14xxx/CVE-2020-14871.json @@ -78,6 +78,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/160510/Solaris-SunSSH-11.0-x86-libpam-Remote-Root.html", "url": "http://packetstormsecurity.com/files/160510/Solaris-SunSSH-11.0-x86-libpam-Remote-Root.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html", + "url": "http://packetstormsecurity.com/files/160609/Oracle-Solaris-SunSSH-PAM-parse_user_name-Buffer-Overflow.html" } ] } diff --git a/2020/26xxx/CVE-2020-26276.json b/2020/26xxx/CVE-2020-26276.json index 0daefc96c3e..dc654537862 100644 --- a/2020/26xxx/CVE-2020-26276.json +++ b/2020/26xxx/CVE-2020-26276.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Fleet is an open source osquery manager. In Fleet before version 3.5.1, due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP.\n\nUsers that configure Fleet with SSO login may be vulnerable to this issue.\n\nThis issue is patched in 3.5.1. The fix was made using https://github.com/mattermost/xml-roundtrip-validator\n\nIf upgrade to 3.5.1 is not possible, users should disable SSO authentication in Fleet." + "value": "Fleet is an open source osquery manager. In Fleet before version 3.5.1, due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP. Users that configure Fleet with SSO login may be vulnerable to this issue. This issue is patched in 3.5.1. The fix was made using https://github.com/mattermost/xml-roundtrip-validator If upgrade to 3.5.1 is not possible, users should disable SSO authentication in Fleet." } ] }, diff --git a/2020/35xxx/CVE-2020-35416.json b/2020/35xxx/CVE-2020-35416.json index 8a427e4871d..3ce3638871d 100644 --- a/2020/35xxx/CVE-2020-35416.json +++ b/2020/35xxx/CVE-2020-35416.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/160502/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html", "url": "http://packetstormsecurity.com/files/160502/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/160600/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/160600/PHPJabbers-Appointment-Scheduler-2.3-Cross-Site-Scripting.html" } ] } diff --git a/2020/35xxx/CVE-2020-35545.json b/2020/35xxx/CVE-2020-35545.json new file mode 100644 index 00000000000..44fa9205dee --- /dev/null +++ b/2020/35xxx/CVE-2020-35545.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-35545", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Time-based SQL injection exists in Spotweb 1.4.9 via the query string." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/spotweb/spotweb/issues/629", + "refsource": "MISC", + "name": "https://github.com/spotweb/spotweb/issues/629" + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20336.json b/2021/20xxx/CVE-2021-20336.json new file mode 100644 index 00000000000..07e3b46f518 --- /dev/null +++ b/2021/20xxx/CVE-2021-20336.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20336", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20337.json b/2021/20xxx/CVE-2021-20337.json new file mode 100644 index 00000000000..9f6f77fd216 --- /dev/null +++ b/2021/20xxx/CVE-2021-20337.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20337", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20338.json b/2021/20xxx/CVE-2021-20338.json new file mode 100644 index 00000000000..1bd9d578350 --- /dev/null +++ b/2021/20xxx/CVE-2021-20338.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20338", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20560.json b/2021/20xxx/CVE-2021-20560.json new file mode 100644 index 00000000000..9a604c478a7 --- /dev/null +++ b/2021/20xxx/CVE-2021-20560.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20560", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20561.json b/2021/20xxx/CVE-2021-20561.json new file mode 100644 index 00000000000..398d1d620a6 --- /dev/null +++ b/2021/20xxx/CVE-2021-20561.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20561", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20562.json b/2021/20xxx/CVE-2021-20562.json new file mode 100644 index 00000000000..a0eb65b76e1 --- /dev/null +++ b/2021/20xxx/CVE-2021-20562.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20562", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20563.json b/2021/20xxx/CVE-2021-20563.json new file mode 100644 index 00000000000..0c0d04e7a8d --- /dev/null +++ b/2021/20xxx/CVE-2021-20563.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20563", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20564.json b/2021/20xxx/CVE-2021-20564.json new file mode 100644 index 00000000000..faf31f7188f --- /dev/null +++ b/2021/20xxx/CVE-2021-20564.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20564", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20565.json b/2021/20xxx/CVE-2021-20565.json new file mode 100644 index 00000000000..c0a819c77ba --- /dev/null +++ b/2021/20xxx/CVE-2021-20565.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20565", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20566.json b/2021/20xxx/CVE-2021-20566.json new file mode 100644 index 00000000000..402f16916fe --- /dev/null +++ b/2021/20xxx/CVE-2021-20566.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20566", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20567.json b/2021/20xxx/CVE-2021-20567.json new file mode 100644 index 00000000000..6a1add9a8e0 --- /dev/null +++ b/2021/20xxx/CVE-2021-20567.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20567", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20568.json b/2021/20xxx/CVE-2021-20568.json new file mode 100644 index 00000000000..fdf231e9656 --- /dev/null +++ b/2021/20xxx/CVE-2021-20568.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20568", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20569.json b/2021/20xxx/CVE-2021-20569.json new file mode 100644 index 00000000000..b4b990d0d1a --- /dev/null +++ b/2021/20xxx/CVE-2021-20569.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20569", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20570.json b/2021/20xxx/CVE-2021-20570.json new file mode 100644 index 00000000000..c717fa09158 --- /dev/null +++ b/2021/20xxx/CVE-2021-20570.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20570", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20571.json b/2021/20xxx/CVE-2021-20571.json new file mode 100644 index 00000000000..654808a5a29 --- /dev/null +++ b/2021/20xxx/CVE-2021-20571.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20571", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20572.json b/2021/20xxx/CVE-2021-20572.json new file mode 100644 index 00000000000..c9ae96f13c6 --- /dev/null +++ b/2021/20xxx/CVE-2021-20572.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20572", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20573.json b/2021/20xxx/CVE-2021-20573.json new file mode 100644 index 00000000000..c2b4faa4571 --- /dev/null +++ b/2021/20xxx/CVE-2021-20573.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20573", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20574.json b/2021/20xxx/CVE-2021-20574.json new file mode 100644 index 00000000000..92c24c98553 --- /dev/null +++ b/2021/20xxx/CVE-2021-20574.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20574", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20575.json b/2021/20xxx/CVE-2021-20575.json new file mode 100644 index 00000000000..cd5f3088bbe --- /dev/null +++ b/2021/20xxx/CVE-2021-20575.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20575", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20576.json b/2021/20xxx/CVE-2021-20576.json new file mode 100644 index 00000000000..0abe8d9534c --- /dev/null +++ b/2021/20xxx/CVE-2021-20576.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20576", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20577.json b/2021/20xxx/CVE-2021-20577.json new file mode 100644 index 00000000000..ceebdce6907 --- /dev/null +++ b/2021/20xxx/CVE-2021-20577.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20577", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20578.json b/2021/20xxx/CVE-2021-20578.json new file mode 100644 index 00000000000..7bd9d19be04 --- /dev/null +++ b/2021/20xxx/CVE-2021-20578.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20578", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20579.json b/2021/20xxx/CVE-2021-20579.json new file mode 100644 index 00000000000..00103daf24e --- /dev/null +++ b/2021/20xxx/CVE-2021-20579.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20579", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20580.json b/2021/20xxx/CVE-2021-20580.json new file mode 100644 index 00000000000..3d8328094c0 --- /dev/null +++ b/2021/20xxx/CVE-2021-20580.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20580", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20581.json b/2021/20xxx/CVE-2021-20581.json new file mode 100644 index 00000000000..5a39ff31cd5 --- /dev/null +++ b/2021/20xxx/CVE-2021-20581.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20581", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20582.json b/2021/20xxx/CVE-2021-20582.json new file mode 100644 index 00000000000..7fff18bb833 --- /dev/null +++ b/2021/20xxx/CVE-2021-20582.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20582", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20583.json b/2021/20xxx/CVE-2021-20583.json new file mode 100644 index 00000000000..e9b058ca5b5 --- /dev/null +++ b/2021/20xxx/CVE-2021-20583.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20583", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20584.json b/2021/20xxx/CVE-2021-20584.json new file mode 100644 index 00000000000..ff8182be7dd --- /dev/null +++ b/2021/20xxx/CVE-2021-20584.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20584", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20585.json b/2021/20xxx/CVE-2021-20585.json new file mode 100644 index 00000000000..7b22ecc21b2 --- /dev/null +++ b/2021/20xxx/CVE-2021-20585.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-20585", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file