From bd86cbfd1b3b71f2ef0ea14a728e1c762edc7acb Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 1 Sep 2021 22:00:53 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/20xxx/CVE-2020-20343.json | 56 +++++++++++++++++++++++++---- 2020/20xxx/CVE-2020-20344.json | 56 +++++++++++++++++++++++++---- 2020/20xxx/CVE-2020-20345.json | 66 ++++++++++++++++++++++++++++++---- 2020/20xxx/CVE-2020-20347.json | 56 +++++++++++++++++++++++++---- 2020/20xxx/CVE-2020-20348.json | 56 +++++++++++++++++++++++++---- 2020/20xxx/CVE-2020-20349.json | 56 +++++++++++++++++++++++++---- 2021/40xxx/CVE-2021-40388.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40389.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40390.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40391.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40392.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40393.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40394.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40395.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40396.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40397.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40398.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40399.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40400.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40401.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40402.json | 18 ++++++++++ 2021/40xxx/CVE-2021-40403.json | 18 ++++++++++ 22 files changed, 598 insertions(+), 36 deletions(-) create mode 100644 2021/40xxx/CVE-2021-40388.json create mode 100644 2021/40xxx/CVE-2021-40389.json create mode 100644 2021/40xxx/CVE-2021-40390.json create mode 100644 2021/40xxx/CVE-2021-40391.json create mode 100644 2021/40xxx/CVE-2021-40392.json create mode 100644 2021/40xxx/CVE-2021-40393.json create mode 100644 2021/40xxx/CVE-2021-40394.json create mode 100644 2021/40xxx/CVE-2021-40395.json create mode 100644 2021/40xxx/CVE-2021-40396.json create mode 100644 2021/40xxx/CVE-2021-40397.json create mode 100644 2021/40xxx/CVE-2021-40398.json create mode 100644 2021/40xxx/CVE-2021-40399.json create mode 100644 2021/40xxx/CVE-2021-40400.json create mode 100644 2021/40xxx/CVE-2021-40401.json create mode 100644 2021/40xxx/CVE-2021-40402.json create mode 100644 2021/40xxx/CVE-2021-40403.json diff --git a/2020/20xxx/CVE-2020-20343.json b/2020/20xxx/CVE-2020-20343.json index 47f81926ffe..23fffd947c0 100644 --- a/2020/20xxx/CVE-2020-20343.json +++ b/2020/20xxx/CVE-2020-20343.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20343", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20343", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WTCMS 1.0 contains a cross-site request forgery (CSRF) vulnerability in the index.php?g=admin&m=nav&a=add_post component that allows attackers to arbitrarily add articles in the administrator background." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/taosir/wtcms/issues/8", + "refsource": "MISC", + "name": "https://github.com/taosir/wtcms/issues/8" } ] } diff --git a/2020/20xxx/CVE-2020-20344.json b/2020/20xxx/CVE-2020-20344.json index 3ec8710672f..a2809c002ce 100644 --- a/2020/20xxx/CVE-2020-20344.json +++ b/2020/20xxx/CVE-2020-20344.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20344", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20344", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WTCMS 1.0 contains a reflective cross-site scripting (XSS) vulnerability in the keyword search function under the background articles module." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/taosir/wtcms/issues/9", + "refsource": "MISC", + "name": "https://github.com/taosir/wtcms/issues/9" } ] } diff --git a/2020/20xxx/CVE-2020-20345.json b/2020/20xxx/CVE-2020-20345.json index 421c6cffab1..c4e097a82b0 100644 --- a/2020/20xxx/CVE-2020-20345.json +++ b/2020/20xxx/CVE-2020-20345.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20345", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20345", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WTCMS 1.0 contains a reflective cross-site scripting (XSS) vulnerability in the page management background which allows attackers to obtain cookies via a crafted payload entered into the search box." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://wtcms.com", + "refsource": "MISC", + "name": "http://wtcms.com" + }, + { + "url": "https://github.com/taosir/wtcms", + "refsource": "MISC", + "name": "https://github.com/taosir/wtcms" + }, + { + "url": "https://github.com/taosir/wtcms/issues/10", + "refsource": "MISC", + "name": "https://github.com/taosir/wtcms/issues/10" } ] } diff --git a/2020/20xxx/CVE-2020-20347.json b/2020/20xxx/CVE-2020-20347.json index ad4fb24a727..8137bd26520 100644 --- a/2020/20xxx/CVE-2020-20347.json +++ b/2020/20xxx/CVE-2020-20347.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20347", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20347", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WTCMS 1.0 contains a stored cross-site scripting (XSS) vulnerability in the source field under the article management module." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/taosir/wtcms/issues/11", + "refsource": "MISC", + "name": "https://github.com/taosir/wtcms/issues/11" } ] } diff --git a/2020/20xxx/CVE-2020-20348.json b/2020/20xxx/CVE-2020-20348.json index 476cf89f1b7..e1700e0a92d 100644 --- a/2020/20xxx/CVE-2020-20348.json +++ b/2020/20xxx/CVE-2020-20348.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20348", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20348", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WTCMS 1.0 contains a stored cross-site scripting (XSS) vulnerability in the link field under the background menu management module." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/taosir/wtcms/issues/11", + "refsource": "MISC", + "name": "https://github.com/taosir/wtcms/issues/11" } ] } diff --git a/2020/20xxx/CVE-2020-20349.json b/2020/20xxx/CVE-2020-20349.json index 28ec8377120..222a84c7b0e 100644 --- a/2020/20xxx/CVE-2020-20349.json +++ b/2020/20xxx/CVE-2020-20349.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-20349", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-20349", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WTCMS 1.0 contains a stored cross-site scripting (XSS) vulnerability in the link address field under the background links module." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/taosir/wtcms/issues/11", + "refsource": "MISC", + "name": "https://github.com/taosir/wtcms/issues/11" } ] } diff --git a/2021/40xxx/CVE-2021-40388.json b/2021/40xxx/CVE-2021-40388.json new file mode 100644 index 00000000000..dff24de9cd3 --- /dev/null +++ b/2021/40xxx/CVE-2021-40388.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40388", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40389.json b/2021/40xxx/CVE-2021-40389.json new file mode 100644 index 00000000000..39193e27ea9 --- /dev/null +++ b/2021/40xxx/CVE-2021-40389.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40389", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40390.json b/2021/40xxx/CVE-2021-40390.json new file mode 100644 index 00000000000..b2492b6dd1c --- /dev/null +++ b/2021/40xxx/CVE-2021-40390.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40390", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40391.json b/2021/40xxx/CVE-2021-40391.json new file mode 100644 index 00000000000..cd2f58348f2 --- /dev/null +++ b/2021/40xxx/CVE-2021-40391.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40391", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40392.json b/2021/40xxx/CVE-2021-40392.json new file mode 100644 index 00000000000..08ce29da39d --- /dev/null +++ b/2021/40xxx/CVE-2021-40392.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40392", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40393.json b/2021/40xxx/CVE-2021-40393.json new file mode 100644 index 00000000000..ee5d99ea844 --- /dev/null +++ b/2021/40xxx/CVE-2021-40393.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40393", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40394.json b/2021/40xxx/CVE-2021-40394.json new file mode 100644 index 00000000000..6922d8acabd --- /dev/null +++ b/2021/40xxx/CVE-2021-40394.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40394", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40395.json b/2021/40xxx/CVE-2021-40395.json new file mode 100644 index 00000000000..164619209ef --- /dev/null +++ b/2021/40xxx/CVE-2021-40395.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40395", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40396.json b/2021/40xxx/CVE-2021-40396.json new file mode 100644 index 00000000000..989f0144924 --- /dev/null +++ b/2021/40xxx/CVE-2021-40396.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40396", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40397.json b/2021/40xxx/CVE-2021-40397.json new file mode 100644 index 00000000000..203ba52ad78 --- /dev/null +++ b/2021/40xxx/CVE-2021-40397.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40397", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40398.json b/2021/40xxx/CVE-2021-40398.json new file mode 100644 index 00000000000..929da7c899f --- /dev/null +++ b/2021/40xxx/CVE-2021-40398.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40398", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40399.json b/2021/40xxx/CVE-2021-40399.json new file mode 100644 index 00000000000..2d2649b2e52 --- /dev/null +++ b/2021/40xxx/CVE-2021-40399.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40399", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40400.json b/2021/40xxx/CVE-2021-40400.json new file mode 100644 index 00000000000..701c8f340c1 --- /dev/null +++ b/2021/40xxx/CVE-2021-40400.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40400", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40401.json b/2021/40xxx/CVE-2021-40401.json new file mode 100644 index 00000000000..07151d76aa0 --- /dev/null +++ b/2021/40xxx/CVE-2021-40401.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40401", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40402.json b/2021/40xxx/CVE-2021-40402.json new file mode 100644 index 00000000000..46697779062 --- /dev/null +++ b/2021/40xxx/CVE-2021-40402.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40402", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40403.json b/2021/40xxx/CVE-2021-40403.json new file mode 100644 index 00000000000..7de49b209e5 --- /dev/null +++ b/2021/40xxx/CVE-2021-40403.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40403", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file