From d805344bf0435498dbecb3724e6b202ad4579bf2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 13 Nov 2020 20:02:30 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/0xxx/CVE-2020-0599.json | 62 ++++++++++++++++++++++++++++++++++ 2020/10xxx/CVE-2020-10546.json | 5 +++ 2020/10xxx/CVE-2020-10547.json | 5 +++ 2020/10xxx/CVE-2020-10548.json | 5 +++ 2020/10xxx/CVE-2020-10549.json | 5 +++ 2020/12xxx/CVE-2020-12313.json | 50 +++++++++++++++++++++++++-- 2020/12xxx/CVE-2020-12338.json | 50 +++++++++++++++++++++++++-- 2020/13xxx/CVE-2020-13638.json | 56 ++++++++++++++++++++++++++---- 2020/28xxx/CVE-2020-28620.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28621.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28622.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28623.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28624.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28625.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28626.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28627.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28628.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28629.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28630.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28631.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28632.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28633.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28634.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28635.json | 18 ++++++++++ 2020/28xxx/CVE-2020-28636.json | 18 ++++++++++ 2020/5xxx/CVE-2020-5796.json | 50 +++++++++++++++++++++++++-- 2021/1xxx/CVE-2021-1126.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1127.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1128.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1129.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1130.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1131.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1132.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1133.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1134.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1135.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1136.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1137.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1138.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1139.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1140.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1141.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1142.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1143.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1144.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1359.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1360.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1361.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1362.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1363.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1364.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1365.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1366.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1367.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1368.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1369.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1370.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1371.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1372.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1373.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1374.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1375.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1376.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1377.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1378.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1379.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1380.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1381.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1382.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1383.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1384.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1385.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1386.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1387.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1388.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1389.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1390.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1391.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1392.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1393.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1394.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1395.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1396.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1397.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1398.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1399.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1400.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1615.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1616.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1617.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1618.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1619.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1620.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1621.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1622.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1623.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1624.json | 18 ++++++++++ 2021/1xxx/CVE-2021-1625.json | 18 ++++++++++ 98 files changed, 1875 insertions(+), 15 deletions(-) create mode 100644 2020/0xxx/CVE-2020-0599.json create mode 100644 2020/28xxx/CVE-2020-28620.json create mode 100644 2020/28xxx/CVE-2020-28621.json create mode 100644 2020/28xxx/CVE-2020-28622.json create mode 100644 2020/28xxx/CVE-2020-28623.json create mode 100644 2020/28xxx/CVE-2020-28624.json create mode 100644 2020/28xxx/CVE-2020-28625.json create mode 100644 2020/28xxx/CVE-2020-28626.json create mode 100644 2020/28xxx/CVE-2020-28627.json create mode 100644 2020/28xxx/CVE-2020-28628.json create mode 100644 2020/28xxx/CVE-2020-28629.json create mode 100644 2020/28xxx/CVE-2020-28630.json create mode 100644 2020/28xxx/CVE-2020-28631.json create mode 100644 2020/28xxx/CVE-2020-28632.json create mode 100644 2020/28xxx/CVE-2020-28633.json create mode 100644 2020/28xxx/CVE-2020-28634.json create mode 100644 2020/28xxx/CVE-2020-28635.json create mode 100644 2020/28xxx/CVE-2020-28636.json create mode 100644 2021/1xxx/CVE-2021-1126.json create mode 100644 2021/1xxx/CVE-2021-1127.json create mode 100644 2021/1xxx/CVE-2021-1128.json create mode 100644 2021/1xxx/CVE-2021-1129.json create mode 100644 2021/1xxx/CVE-2021-1130.json create mode 100644 2021/1xxx/CVE-2021-1131.json create mode 100644 2021/1xxx/CVE-2021-1132.json create mode 100644 2021/1xxx/CVE-2021-1133.json create mode 100644 2021/1xxx/CVE-2021-1134.json create mode 100644 2021/1xxx/CVE-2021-1135.json create mode 100644 2021/1xxx/CVE-2021-1136.json create mode 100644 2021/1xxx/CVE-2021-1137.json create mode 100644 2021/1xxx/CVE-2021-1138.json create mode 100644 2021/1xxx/CVE-2021-1139.json create mode 100644 2021/1xxx/CVE-2021-1140.json create mode 100644 2021/1xxx/CVE-2021-1141.json create mode 100644 2021/1xxx/CVE-2021-1142.json create mode 100644 2021/1xxx/CVE-2021-1143.json create mode 100644 2021/1xxx/CVE-2021-1144.json create mode 100644 2021/1xxx/CVE-2021-1359.json create mode 100644 2021/1xxx/CVE-2021-1360.json create mode 100644 2021/1xxx/CVE-2021-1361.json create mode 100644 2021/1xxx/CVE-2021-1362.json create mode 100644 2021/1xxx/CVE-2021-1363.json create mode 100644 2021/1xxx/CVE-2021-1364.json create mode 100644 2021/1xxx/CVE-2021-1365.json create mode 100644 2021/1xxx/CVE-2021-1366.json create mode 100644 2021/1xxx/CVE-2021-1367.json create mode 100644 2021/1xxx/CVE-2021-1368.json create mode 100644 2021/1xxx/CVE-2021-1369.json create mode 100644 2021/1xxx/CVE-2021-1370.json create mode 100644 2021/1xxx/CVE-2021-1371.json create mode 100644 2021/1xxx/CVE-2021-1372.json create mode 100644 2021/1xxx/CVE-2021-1373.json create mode 100644 2021/1xxx/CVE-2021-1374.json create mode 100644 2021/1xxx/CVE-2021-1375.json create mode 100644 2021/1xxx/CVE-2021-1376.json create mode 100644 2021/1xxx/CVE-2021-1377.json create mode 100644 2021/1xxx/CVE-2021-1378.json create mode 100644 2021/1xxx/CVE-2021-1379.json create mode 100644 2021/1xxx/CVE-2021-1380.json create mode 100644 2021/1xxx/CVE-2021-1381.json create mode 100644 2021/1xxx/CVE-2021-1382.json create mode 100644 2021/1xxx/CVE-2021-1383.json create mode 100644 2021/1xxx/CVE-2021-1384.json create mode 100644 2021/1xxx/CVE-2021-1385.json create mode 100644 2021/1xxx/CVE-2021-1386.json create mode 100644 2021/1xxx/CVE-2021-1387.json create mode 100644 2021/1xxx/CVE-2021-1388.json create mode 100644 2021/1xxx/CVE-2021-1389.json create mode 100644 2021/1xxx/CVE-2021-1390.json create mode 100644 2021/1xxx/CVE-2021-1391.json create mode 100644 2021/1xxx/CVE-2021-1392.json create mode 100644 2021/1xxx/CVE-2021-1393.json create mode 100644 2021/1xxx/CVE-2021-1394.json create mode 100644 2021/1xxx/CVE-2021-1395.json create mode 100644 2021/1xxx/CVE-2021-1396.json create mode 100644 2021/1xxx/CVE-2021-1397.json create mode 100644 2021/1xxx/CVE-2021-1398.json create mode 100644 2021/1xxx/CVE-2021-1399.json create mode 100644 2021/1xxx/CVE-2021-1400.json create mode 100644 2021/1xxx/CVE-2021-1615.json create mode 100644 2021/1xxx/CVE-2021-1616.json create mode 100644 2021/1xxx/CVE-2021-1617.json create mode 100644 2021/1xxx/CVE-2021-1618.json create mode 100644 2021/1xxx/CVE-2021-1619.json create mode 100644 2021/1xxx/CVE-2021-1620.json create mode 100644 2021/1xxx/CVE-2021-1621.json create mode 100644 2021/1xxx/CVE-2021-1622.json create mode 100644 2021/1xxx/CVE-2021-1623.json create mode 100644 2021/1xxx/CVE-2021-1624.json create mode 100644 2021/1xxx/CVE-2021-1625.json diff --git a/2020/0xxx/CVE-2020-0599.json b/2020/0xxx/CVE-2020-0599.json new file mode 100644 index 00000000000..34face5626b --- /dev/null +++ b/2020/0xxx/CVE-2020-0599.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-0599", + "ASSIGNER": "secure@intel.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Intel(R) Processors", + "version": { + "version_data": [ + { + "version_value": "See references" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "escalation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360", + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Improper access control in the PMC for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." + } + ] + } +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10546.json b/2020/10xxx/CVE-2020-10546.json index e1680d47d7e..6426b27059e 100644 --- a/2020/10xxx/CVE-2020-10546.json +++ b/2020/10xxx/CVE-2020-10546.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/theguly/exploits/blob/master/CVE-2020-10546.py", "url": "https://github.com/theguly/exploits/blob/master/CVE-2020-10546.py" + }, + { + "refsource": "MISC", + "name": "https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/", + "url": "https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/" } ] } diff --git a/2020/10xxx/CVE-2020-10547.json b/2020/10xxx/CVE-2020-10547.json index c3d9e35f368..e7c5200bc54 100644 --- a/2020/10xxx/CVE-2020-10547.json +++ b/2020/10xxx/CVE-2020-10547.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/theguly/exploits/blob/master/CVE-2020-10547.py", "url": "https://github.com/theguly/exploits/blob/master/CVE-2020-10547.py" + }, + { + "refsource": "MISC", + "name": "https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/", + "url": "https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/" } ] } diff --git a/2020/10xxx/CVE-2020-10548.json b/2020/10xxx/CVE-2020-10548.json index e1cffab7bf1..71da0ae7fb9 100644 --- a/2020/10xxx/CVE-2020-10548.json +++ b/2020/10xxx/CVE-2020-10548.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/theguly/exploits/blob/master/CVE-2020-10548.py", "url": "https://github.com/theguly/exploits/blob/master/CVE-2020-10548.py" + }, + { + "refsource": "MISC", + "name": "https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/", + "url": "https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/" } ] } diff --git a/2020/10xxx/CVE-2020-10549.json b/2020/10xxx/CVE-2020-10549.json index fbffdbad841..af6fe06b25e 100644 --- a/2020/10xxx/CVE-2020-10549.json +++ b/2020/10xxx/CVE-2020-10549.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/theguly/exploits/blob/master/CVE-2020-10549.py", "url": "https://github.com/theguly/exploits/blob/master/CVE-2020-10549.py" + }, + { + "refsource": "MISC", + "name": "https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/", + "url": "https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/" } ] } diff --git a/2020/12xxx/CVE-2020-12313.json b/2020/12xxx/CVE-2020-12313.json index 2311d9768b8..90563551c14 100644 --- a/2020/12xxx/CVE-2020-12313.json +++ b/2020/12xxx/CVE-2020-12313.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-12313", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@intel.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Intel(R) PROSet/Wireless WiFi", + "version": { + "version_data": [ + { + "version_value": "before version 21.110" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "escalation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402", + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access." } ] } diff --git a/2020/12xxx/CVE-2020-12338.json b/2020/12xxx/CVE-2020-12338.json index 23a170f692c..0f50b08830e 100644 --- a/2020/12xxx/CVE-2020-12338.json +++ b/2020/12xxx/CVE-2020-12338.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-12338", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@intel.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Open WebRTC Toolkit", + "version": { + "version_data": [ + { + "version_value": "before version 4.3.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "escalation of privilege" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00424", + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00424" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient control flow management in the Open WebRTC Toolkit before version 4.3.1 may allow an unauthenticated user to potentially enable escalation of privilege via network access." } ] } diff --git a/2020/13xxx/CVE-2020-13638.json b/2020/13xxx/CVE-2020-13638.json index a5874df3d69..ccca9e3a1d1 100644 --- a/2020/13xxx/CVE-2020-13638.json +++ b/2020/13xxx/CVE-2020-13638.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-13638", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-13638", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "lib/crud/userprocess.php in rConfig 3.9.x before 3.9.7 has an authentication bypass, leading to administrator account creation. This issue has been fixed in 3.9.7." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/", + "url": "https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/" } ] } diff --git a/2020/28xxx/CVE-2020-28620.json b/2020/28xxx/CVE-2020-28620.json new file mode 100644 index 00000000000..f824083b799 --- /dev/null +++ b/2020/28xxx/CVE-2020-28620.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28620", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28621.json b/2020/28xxx/CVE-2020-28621.json new file mode 100644 index 00000000000..7310a470100 --- /dev/null +++ b/2020/28xxx/CVE-2020-28621.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28621", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28622.json b/2020/28xxx/CVE-2020-28622.json new file mode 100644 index 00000000000..5746c37cd7e --- /dev/null +++ b/2020/28xxx/CVE-2020-28622.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28622", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28623.json b/2020/28xxx/CVE-2020-28623.json new file mode 100644 index 00000000000..0d3cdb23f67 --- /dev/null +++ b/2020/28xxx/CVE-2020-28623.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28623", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28624.json b/2020/28xxx/CVE-2020-28624.json new file mode 100644 index 00000000000..02d6b40df4e --- /dev/null +++ b/2020/28xxx/CVE-2020-28624.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28624", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28625.json b/2020/28xxx/CVE-2020-28625.json new file mode 100644 index 00000000000..8d6cc485f5f --- /dev/null +++ b/2020/28xxx/CVE-2020-28625.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28625", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28626.json b/2020/28xxx/CVE-2020-28626.json new file mode 100644 index 00000000000..b40401a23a2 --- /dev/null +++ b/2020/28xxx/CVE-2020-28626.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28626", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28627.json b/2020/28xxx/CVE-2020-28627.json new file mode 100644 index 00000000000..657c88ca5b9 --- /dev/null +++ b/2020/28xxx/CVE-2020-28627.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28627", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28628.json b/2020/28xxx/CVE-2020-28628.json new file mode 100644 index 00000000000..822630808bb --- /dev/null +++ b/2020/28xxx/CVE-2020-28628.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28628", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28629.json b/2020/28xxx/CVE-2020-28629.json new file mode 100644 index 00000000000..0c6cfec9b36 --- /dev/null +++ b/2020/28xxx/CVE-2020-28629.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28629", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28630.json b/2020/28xxx/CVE-2020-28630.json new file mode 100644 index 00000000000..2f82531f5b7 --- /dev/null +++ b/2020/28xxx/CVE-2020-28630.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28630", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28631.json b/2020/28xxx/CVE-2020-28631.json new file mode 100644 index 00000000000..7d4c47cd5c8 --- /dev/null +++ b/2020/28xxx/CVE-2020-28631.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28631", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28632.json b/2020/28xxx/CVE-2020-28632.json new file mode 100644 index 00000000000..ba5fba1d7fe --- /dev/null +++ b/2020/28xxx/CVE-2020-28632.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28632", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28633.json b/2020/28xxx/CVE-2020-28633.json new file mode 100644 index 00000000000..f2bf7b75e35 --- /dev/null +++ b/2020/28xxx/CVE-2020-28633.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28633", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28634.json b/2020/28xxx/CVE-2020-28634.json new file mode 100644 index 00000000000..4b13125e118 --- /dev/null +++ b/2020/28xxx/CVE-2020-28634.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28634", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28635.json b/2020/28xxx/CVE-2020-28635.json new file mode 100644 index 00000000000..551986e8a52 --- /dev/null +++ b/2020/28xxx/CVE-2020-28635.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28635", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/28xxx/CVE-2020-28636.json b/2020/28xxx/CVE-2020-28636.json new file mode 100644 index 00000000000..4cdbf5daa86 --- /dev/null +++ b/2020/28xxx/CVE-2020-28636.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-28636", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/5xxx/CVE-2020-5796.json b/2020/5xxx/CVE-2020-5796.json index 48e2fd110b3..893d9cf8c37 100644 --- a/2020/5xxx/CVE-2020-5796.json +++ b/2020/5xxx/CVE-2020-5796.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5796", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vulnreport@tenable.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Nagios XI", + "version": { + "version_data": [ + { + "version_value": "5.7.4" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Local Privilege Escalation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.tenable.com/security/research/tra-2020-61", + "url": "https://www.tenable.com/security/research/tra-2020-61" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper preservation of permissions in Nagios XI 5.7.4 allows a local, low-privileged, authenticated user to weaken the permissions of files, resulting in low-privileged users being able to write to and execute arbitrary PHP code with root privileges." } ] } diff --git a/2021/1xxx/CVE-2021-1126.json b/2021/1xxx/CVE-2021-1126.json new file mode 100644 index 00000000000..4b49ef8ef08 --- /dev/null +++ b/2021/1xxx/CVE-2021-1126.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1126", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1127.json b/2021/1xxx/CVE-2021-1127.json new file mode 100644 index 00000000000..c5eea51c917 --- /dev/null +++ b/2021/1xxx/CVE-2021-1127.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1127", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1128.json b/2021/1xxx/CVE-2021-1128.json new file mode 100644 index 00000000000..2eccd9bc388 --- /dev/null +++ b/2021/1xxx/CVE-2021-1128.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1128", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1129.json b/2021/1xxx/CVE-2021-1129.json new file mode 100644 index 00000000000..9abac76a52d --- /dev/null +++ b/2021/1xxx/CVE-2021-1129.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1129", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1130.json b/2021/1xxx/CVE-2021-1130.json new file mode 100644 index 00000000000..e4a274d3643 --- /dev/null +++ b/2021/1xxx/CVE-2021-1130.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1130", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1131.json b/2021/1xxx/CVE-2021-1131.json new file mode 100644 index 00000000000..425836d9b20 --- /dev/null +++ b/2021/1xxx/CVE-2021-1131.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1131", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1132.json b/2021/1xxx/CVE-2021-1132.json new file mode 100644 index 00000000000..d401aaef695 --- /dev/null +++ b/2021/1xxx/CVE-2021-1132.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1132", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1133.json b/2021/1xxx/CVE-2021-1133.json new file mode 100644 index 00000000000..23767781199 --- /dev/null +++ b/2021/1xxx/CVE-2021-1133.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1133", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1134.json b/2021/1xxx/CVE-2021-1134.json new file mode 100644 index 00000000000..9cc73fad9ab --- /dev/null +++ b/2021/1xxx/CVE-2021-1134.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1134", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1135.json b/2021/1xxx/CVE-2021-1135.json new file mode 100644 index 00000000000..7a4e26c96a8 --- /dev/null +++ b/2021/1xxx/CVE-2021-1135.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1135", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1136.json b/2021/1xxx/CVE-2021-1136.json new file mode 100644 index 00000000000..21cb597d45f --- /dev/null +++ b/2021/1xxx/CVE-2021-1136.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1136", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1137.json b/2021/1xxx/CVE-2021-1137.json new file mode 100644 index 00000000000..bd0006d9a8d --- /dev/null +++ b/2021/1xxx/CVE-2021-1137.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1137", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1138.json b/2021/1xxx/CVE-2021-1138.json new file mode 100644 index 00000000000..eaa7b960512 --- /dev/null +++ b/2021/1xxx/CVE-2021-1138.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1138", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1139.json b/2021/1xxx/CVE-2021-1139.json new file mode 100644 index 00000000000..09357a3fee7 --- /dev/null +++ b/2021/1xxx/CVE-2021-1139.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1139", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1140.json b/2021/1xxx/CVE-2021-1140.json new file mode 100644 index 00000000000..07db7bb64af --- /dev/null +++ b/2021/1xxx/CVE-2021-1140.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1140", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1141.json b/2021/1xxx/CVE-2021-1141.json new file mode 100644 index 00000000000..d8910f4cbef --- /dev/null +++ b/2021/1xxx/CVE-2021-1141.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1141", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1142.json b/2021/1xxx/CVE-2021-1142.json new file mode 100644 index 00000000000..20c0ca4d6c3 --- /dev/null +++ b/2021/1xxx/CVE-2021-1142.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1142", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1143.json b/2021/1xxx/CVE-2021-1143.json new file mode 100644 index 00000000000..a98e5d9b067 --- /dev/null +++ b/2021/1xxx/CVE-2021-1143.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1143", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1144.json b/2021/1xxx/CVE-2021-1144.json new file mode 100644 index 00000000000..955c2dcf5b0 --- /dev/null +++ b/2021/1xxx/CVE-2021-1144.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1144", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1359.json b/2021/1xxx/CVE-2021-1359.json new file mode 100644 index 00000000000..2ed2bb255e4 --- /dev/null +++ b/2021/1xxx/CVE-2021-1359.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1359", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1360.json b/2021/1xxx/CVE-2021-1360.json new file mode 100644 index 00000000000..88b4561fc06 --- /dev/null +++ b/2021/1xxx/CVE-2021-1360.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1360", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1361.json b/2021/1xxx/CVE-2021-1361.json new file mode 100644 index 00000000000..182970330e2 --- /dev/null +++ b/2021/1xxx/CVE-2021-1361.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1361", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1362.json b/2021/1xxx/CVE-2021-1362.json new file mode 100644 index 00000000000..bb08a128d51 --- /dev/null +++ b/2021/1xxx/CVE-2021-1362.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1362", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1363.json b/2021/1xxx/CVE-2021-1363.json new file mode 100644 index 00000000000..138a569f0fc --- /dev/null +++ b/2021/1xxx/CVE-2021-1363.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1363", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1364.json b/2021/1xxx/CVE-2021-1364.json new file mode 100644 index 00000000000..81ae20f79ba --- /dev/null +++ b/2021/1xxx/CVE-2021-1364.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1364", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1365.json b/2021/1xxx/CVE-2021-1365.json new file mode 100644 index 00000000000..a941f3570eb --- /dev/null +++ b/2021/1xxx/CVE-2021-1365.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1365", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1366.json b/2021/1xxx/CVE-2021-1366.json new file mode 100644 index 00000000000..faf7f1819ae --- /dev/null +++ b/2021/1xxx/CVE-2021-1366.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1366", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1367.json b/2021/1xxx/CVE-2021-1367.json new file mode 100644 index 00000000000..9cedcbc71bf --- /dev/null +++ b/2021/1xxx/CVE-2021-1367.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1367", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1368.json b/2021/1xxx/CVE-2021-1368.json new file mode 100644 index 00000000000..96469eeb57f --- /dev/null +++ b/2021/1xxx/CVE-2021-1368.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1368", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1369.json b/2021/1xxx/CVE-2021-1369.json new file mode 100644 index 00000000000..71d065cc0c8 --- /dev/null +++ b/2021/1xxx/CVE-2021-1369.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1369", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1370.json b/2021/1xxx/CVE-2021-1370.json new file mode 100644 index 00000000000..8e2f8bcc906 --- /dev/null +++ b/2021/1xxx/CVE-2021-1370.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1370", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1371.json b/2021/1xxx/CVE-2021-1371.json new file mode 100644 index 00000000000..d837b35f563 --- /dev/null +++ b/2021/1xxx/CVE-2021-1371.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1371", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1372.json b/2021/1xxx/CVE-2021-1372.json new file mode 100644 index 00000000000..80d4dd699e2 --- /dev/null +++ b/2021/1xxx/CVE-2021-1372.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1372", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1373.json b/2021/1xxx/CVE-2021-1373.json new file mode 100644 index 00000000000..767d8439be1 --- /dev/null +++ b/2021/1xxx/CVE-2021-1373.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1373", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1374.json b/2021/1xxx/CVE-2021-1374.json new file mode 100644 index 00000000000..fd125b0f751 --- /dev/null +++ b/2021/1xxx/CVE-2021-1374.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1374", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1375.json b/2021/1xxx/CVE-2021-1375.json new file mode 100644 index 00000000000..46717164797 --- /dev/null +++ b/2021/1xxx/CVE-2021-1375.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1375", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1376.json b/2021/1xxx/CVE-2021-1376.json new file mode 100644 index 00000000000..cc473808a56 --- /dev/null +++ b/2021/1xxx/CVE-2021-1376.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1376", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1377.json b/2021/1xxx/CVE-2021-1377.json new file mode 100644 index 00000000000..d1863c819b7 --- /dev/null +++ b/2021/1xxx/CVE-2021-1377.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1377", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1378.json b/2021/1xxx/CVE-2021-1378.json new file mode 100644 index 00000000000..5a948df26cb --- /dev/null +++ b/2021/1xxx/CVE-2021-1378.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1378", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1379.json b/2021/1xxx/CVE-2021-1379.json new file mode 100644 index 00000000000..72398620915 --- /dev/null +++ b/2021/1xxx/CVE-2021-1379.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1379", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1380.json b/2021/1xxx/CVE-2021-1380.json new file mode 100644 index 00000000000..a2cc981588d --- /dev/null +++ b/2021/1xxx/CVE-2021-1380.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1380", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1381.json b/2021/1xxx/CVE-2021-1381.json new file mode 100644 index 00000000000..f451722d67f --- /dev/null +++ b/2021/1xxx/CVE-2021-1381.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1381", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1382.json b/2021/1xxx/CVE-2021-1382.json new file mode 100644 index 00000000000..97806f1ea26 --- /dev/null +++ b/2021/1xxx/CVE-2021-1382.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1382", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1383.json b/2021/1xxx/CVE-2021-1383.json new file mode 100644 index 00000000000..3a594e0ef13 --- /dev/null +++ b/2021/1xxx/CVE-2021-1383.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1383", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1384.json b/2021/1xxx/CVE-2021-1384.json new file mode 100644 index 00000000000..90562c0f8bb --- /dev/null +++ b/2021/1xxx/CVE-2021-1384.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1384", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1385.json b/2021/1xxx/CVE-2021-1385.json new file mode 100644 index 00000000000..81eafca512c --- /dev/null +++ b/2021/1xxx/CVE-2021-1385.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1385", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1386.json b/2021/1xxx/CVE-2021-1386.json new file mode 100644 index 00000000000..38b50e4c821 --- /dev/null +++ b/2021/1xxx/CVE-2021-1386.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1386", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1387.json b/2021/1xxx/CVE-2021-1387.json new file mode 100644 index 00000000000..0eab4696c66 --- /dev/null +++ b/2021/1xxx/CVE-2021-1387.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1387", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1388.json b/2021/1xxx/CVE-2021-1388.json new file mode 100644 index 00000000000..97446c43d8e --- /dev/null +++ b/2021/1xxx/CVE-2021-1388.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1388", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1389.json b/2021/1xxx/CVE-2021-1389.json new file mode 100644 index 00000000000..e2c3d85d6cf --- /dev/null +++ b/2021/1xxx/CVE-2021-1389.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1389", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1390.json b/2021/1xxx/CVE-2021-1390.json new file mode 100644 index 00000000000..18dd2d01e14 --- /dev/null +++ b/2021/1xxx/CVE-2021-1390.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1390", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1391.json b/2021/1xxx/CVE-2021-1391.json new file mode 100644 index 00000000000..9795c61c864 --- /dev/null +++ b/2021/1xxx/CVE-2021-1391.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1391", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1392.json b/2021/1xxx/CVE-2021-1392.json new file mode 100644 index 00000000000..925f8b43961 --- /dev/null +++ b/2021/1xxx/CVE-2021-1392.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1392", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1393.json b/2021/1xxx/CVE-2021-1393.json new file mode 100644 index 00000000000..0f3b4b8f68f --- /dev/null +++ b/2021/1xxx/CVE-2021-1393.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1393", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1394.json b/2021/1xxx/CVE-2021-1394.json new file mode 100644 index 00000000000..86859352310 --- /dev/null +++ b/2021/1xxx/CVE-2021-1394.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1394", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1395.json b/2021/1xxx/CVE-2021-1395.json new file mode 100644 index 00000000000..2371853a113 --- /dev/null +++ b/2021/1xxx/CVE-2021-1395.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1395", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1396.json b/2021/1xxx/CVE-2021-1396.json new file mode 100644 index 00000000000..aac82869bdf --- /dev/null +++ b/2021/1xxx/CVE-2021-1396.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1396", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1397.json b/2021/1xxx/CVE-2021-1397.json new file mode 100644 index 00000000000..8ba34e1e309 --- /dev/null +++ b/2021/1xxx/CVE-2021-1397.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1397", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1398.json b/2021/1xxx/CVE-2021-1398.json new file mode 100644 index 00000000000..ec1c9b70d04 --- /dev/null +++ b/2021/1xxx/CVE-2021-1398.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1398", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1399.json b/2021/1xxx/CVE-2021-1399.json new file mode 100644 index 00000000000..bd56b47e6c8 --- /dev/null +++ b/2021/1xxx/CVE-2021-1399.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1399", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1400.json b/2021/1xxx/CVE-2021-1400.json new file mode 100644 index 00000000000..304c0031432 --- /dev/null +++ b/2021/1xxx/CVE-2021-1400.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1400", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1615.json b/2021/1xxx/CVE-2021-1615.json new file mode 100644 index 00000000000..807f37b11ac --- /dev/null +++ b/2021/1xxx/CVE-2021-1615.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1615", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1616.json b/2021/1xxx/CVE-2021-1616.json new file mode 100644 index 00000000000..1aadf6e4a5b --- /dev/null +++ b/2021/1xxx/CVE-2021-1616.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1616", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1617.json b/2021/1xxx/CVE-2021-1617.json new file mode 100644 index 00000000000..fbcdb4f3aaa --- /dev/null +++ b/2021/1xxx/CVE-2021-1617.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1617", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1618.json b/2021/1xxx/CVE-2021-1618.json new file mode 100644 index 00000000000..7dcdab08744 --- /dev/null +++ b/2021/1xxx/CVE-2021-1618.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1618", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1619.json b/2021/1xxx/CVE-2021-1619.json new file mode 100644 index 00000000000..77cf3285b4c --- /dev/null +++ b/2021/1xxx/CVE-2021-1619.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1619", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1620.json b/2021/1xxx/CVE-2021-1620.json new file mode 100644 index 00000000000..ff5cacfcdbb --- /dev/null +++ b/2021/1xxx/CVE-2021-1620.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1620", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1621.json b/2021/1xxx/CVE-2021-1621.json new file mode 100644 index 00000000000..9ea7b72d82c --- /dev/null +++ b/2021/1xxx/CVE-2021-1621.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1621", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1622.json b/2021/1xxx/CVE-2021-1622.json new file mode 100644 index 00000000000..501fb9d38de --- /dev/null +++ b/2021/1xxx/CVE-2021-1622.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1622", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1623.json b/2021/1xxx/CVE-2021-1623.json new file mode 100644 index 00000000000..2c5d2d583a3 --- /dev/null +++ b/2021/1xxx/CVE-2021-1623.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1623", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1624.json b/2021/1xxx/CVE-2021-1624.json new file mode 100644 index 00000000000..b4dd2774314 --- /dev/null +++ b/2021/1xxx/CVE-2021-1624.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1624", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1625.json b/2021/1xxx/CVE-2021-1625.json new file mode 100644 index 00000000000..bc854d40e65 --- /dev/null +++ b/2021/1xxx/CVE-2021-1625.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-1625", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file