"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-07-16 17:01:05 +00:00
parent bc2c0f55c7
commit fabf8a1062
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
22 changed files with 472 additions and 281 deletions

View File

@ -66,6 +66,11 @@
"refsource": "FULLDISC", "refsource": "FULLDISC",
"name": "20210716 Open-Xchange Security Advisory 2021-07-15", "name": "20210716 Open-Xchange Security Advisory 2021-07-15",
"url": "http://seclists.org/fulldisclosure/2021/Jul/33" "url": "http://seclists.org/fulldisclosure/2021/Jul/33"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html"
} }
] ]
} }

View File

@ -66,6 +66,11 @@
"refsource": "FULLDISC", "refsource": "FULLDISC",
"name": "20210716 Open-Xchange Security Advisory 2021-07-15", "name": "20210716 Open-Xchange Security Advisory 2021-07-15",
"url": "http://seclists.org/fulldisclosure/2021/Jul/33" "url": "http://seclists.org/fulldisclosure/2021/Jul/33"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/163527/OX-App-Suite-OX-Guard-OX-Documents-SSRF-Cross-Site-Scripting.html"
} }
] ]
} }

View File

@ -1,90 +1,90 @@
{ {
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{
"description" : [
{
"lang" : "eng",
"value" : "Gain Access"
}
]
}
]
},
"impact" : {
"cvssv3" : {
"TM" : {
"RL" : "O",
"E" : "U",
"RC" : "C"
},
"BM" : {
"UI" : "R",
"I" : "H",
"S" : "U",
"AV" : "N",
"PR" : "N",
"C" : "N",
"A" : "N",
"SCORE" : "6.500",
"AC" : "L"
}
}
},
"CVE_data_meta" : {
"ID" : "CVE-2020-4675",
"STATE" : "PUBLIC",
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2021-07-15T00:00:00"
},
"data_version" : "4.0",
"data_type" : "CVE",
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://www.ibm.com/support/pages/node/6472927",
"title" : "IBM Security Bulletin 6472927 (InfoSphere Master Data Management)",
"url" : "https://www.ibm.com/support/pages/node/6472927"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/186324",
"title" : "X-Force Vulnerability Report",
"name" : "ibm-infosphere-cve20204675-csrf (186324)",
"refsource" : "XF"
}
]
},
"description" : {
"description_data" : [
{
"value" : "IBM InfoSphere Master Data Management Server 11.6 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186324.",
"lang" : "eng"
}
]
},
"affects" : {
"vendor" : {
"vendor_data" : [
{ {
"product" : { "description": [
"product_data" : [ {
{ "lang": "eng",
"version" : { "value": "Gain Access"
"version_data" : [ }
{ ]
"version_value" : "11.6"
}
]
},
"product_name" : "InfoSphere Master Data Management"
}
]
},
"vendor_name" : "IBM"
} }
] ]
} },
}, "impact": {
"data_format" : "MITRE" "cvssv3": {
} "TM": {
"RL": "O",
"E": "U",
"RC": "C"
},
"BM": {
"UI": "R",
"I": "H",
"S": "U",
"AV": "N",
"PR": "N",
"C": "N",
"A": "N",
"SCORE": "6.500",
"AC": "L"
}
}
},
"CVE_data_meta": {
"ID": "CVE-2020-4675",
"STATE": "PUBLIC",
"ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC": "2021-07-15T00:00:00"
},
"data_version": "4.0",
"data_type": "CVE",
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.ibm.com/support/pages/node/6472927",
"title": "IBM Security Bulletin 6472927 (InfoSphere Master Data Management)",
"url": "https://www.ibm.com/support/pages/node/6472927"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/186324",
"title": "X-Force Vulnerability Report",
"name": "ibm-infosphere-cve20204675-csrf (186324)",
"refsource": "XF"
}
]
},
"description": {
"description_data": [
{
"value": "IBM InfoSphere Master Data Management Server 11.6 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186324.",
"lang": "eng"
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "11.6"
}
]
},
"product_name": "InfoSphere Master Data Management"
}
]
},
"vendor_name": "IBM"
}
]
}
},
"data_format": "MITRE"
}

View File

@ -1,106 +1,106 @@
{ {
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "InfoSphere Change Data Capture for z/OS", "product_name": "InfoSphere Change Data Capture for z/OS",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "10.2.1" "version_value": "10.2.1"
} }
] ]
} }
}, },
{ {
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "11.4" "version_value": "11.4"
} }
] ]
}, },
"product_name" : "InfoSphere Data Replication" "product_name": "InfoSphere Data Replication"
} }
] ]
}, },
"vendor_name" : "IBM" "vendor_name": "IBM"
} }
]
}
},
"data_format" : "MITRE",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM InfoSphere Data Replication 11.4 and IBM InfoSphere Change Data Capture for z/OS 10.2.1, under certain configurations, could allow a user to bypass authentication mechanisms using an empty password string. IBM X-Force ID: 189834"
}
]
},
"data_type" : "CVE",
"references" : {
"reference_data" : [
{
"title" : "IBM Security Bulletin 6472911 (InfoSphere Change Data Capture for z/OS)",
"url" : "https://www.ibm.com/support/pages/node/6472911",
"name" : "https://www.ibm.com/support/pages/node/6472911",
"refsource" : "CONFIRM"
},
{
"refsource" : "CONFIRM",
"name" : "https://www.ibm.com/support/pages/node/6472909",
"title" : "IBM Security Bulletin 6472909 (InfoSphere Data Replication)",
"url" : "https://www.ibm.com/support/pages/node/6472909"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/189834",
"title" : "X-Force Vulnerability Report",
"refsource" : "XF",
"name" : "ibm-cognos-cve20204821-sec-bypass (189834)"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Bypass Security"
}
] ]
} }
] },
}, "data_format": "MITRE",
"impact" : { "description": {
"cvssv3" : { "description_data": [
"TM" : { {
"RL" : "O", "lang": "eng",
"RC" : "C", "value": "IBM InfoSphere Data Replication 11.4 and IBM InfoSphere Change Data Capture for z/OS 10.2.1, under certain configurations, could allow a user to bypass authentication mechanisms using an empty password string. IBM X-Force ID: 189834"
"E" : "U" }
}, ]
"BM" : { },
"SCORE" : "5.900", "data_type": "CVE",
"AC" : "H", "references": {
"A" : "N", "reference_data": [
"C" : "H", {
"S" : "U", "title": "IBM Security Bulletin 6472911 (InfoSphere Change Data Capture for z/OS)",
"AV" : "N", "url": "https://www.ibm.com/support/pages/node/6472911",
"PR" : "N", "name": "https://www.ibm.com/support/pages/node/6472911",
"UI" : "N", "refsource": "CONFIRM"
"I" : "N" },
} {
} "refsource": "CONFIRM",
}, "name": "https://www.ibm.com/support/pages/node/6472909",
"CVE_data_meta" : { "title": "IBM Security Bulletin 6472909 (InfoSphere Data Replication)",
"ID" : "CVE-2020-4821", "url": "https://www.ibm.com/support/pages/node/6472909"
"ASSIGNER" : "psirt@us.ibm.com", },
"STATE" : "PUBLIC", {
"DATE_PUBLIC" : "2021-07-15T00:00:00" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189834",
}, "title": "X-Force Vulnerability Report",
"data_version" : "4.0" "refsource": "XF",
} "name": "ibm-cognos-cve20204821-sec-bypass (189834)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Bypass Security"
}
]
}
]
},
"impact": {
"cvssv3": {
"TM": {
"RL": "O",
"RC": "C",
"E": "U"
},
"BM": {
"SCORE": "5.900",
"AC": "H",
"A": "N",
"C": "H",
"S": "U",
"AV": "N",
"PR": "N",
"UI": "N",
"I": "N"
}
}
},
"CVE_data_meta": {
"ID": "CVE-2020-4821",
"ASSIGNER": "psirt@us.ibm.com",
"STATE": "PUBLIC",
"DATE_PUBLIC": "2021-07-15T00:00:00"
},
"data_version": "4.0"
}

View File

@ -1,93 +1,93 @@
{ {
"data_type" : "CVE", "data_type": "CVE",
"references" : { "references": {
"reference_data" : [ "reference_data": [
{
"name" : "https://www.ibm.com/support/pages/node/6472891",
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/support/pages/node/6472891",
"title" : "IBM Security Bulletin 6472891 (Qradar)"
},
{
"title" : "X-Force Vulnerability Report",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/192539",
"name" : "ibm-qradar-cve20204980-info-disc (192539)",
"refsource" : "XF"
}
]
},
"CVE_data_meta" : {
"STATE" : "PUBLIC",
"DATE_PUBLIC" : "2021-07-15T00:00:00",
"ASSIGNER" : "psirt@us.ibm.com",
"ID" : "CVE-2020-4980"
},
"data_version" : "4.0",
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Obtain Information"
}
]
}
]
},
"impact" : {
"cvssv3" : {
"BM" : {
"C" : "H",
"A" : "N",
"AC" : "H",
"SCORE" : "5.300",
"UI" : "N",
"I" : "N",
"S" : "U",
"PR" : "N",
"AV" : "A"
},
"TM" : {
"E" : "U",
"RC" : "C",
"RL" : "O"
}
}
},
"data_format" : "MITRE",
"affects" : {
"vendor" : {
"vendor_data" : [
{ {
"vendor_name" : "IBM", "name": "https://www.ibm.com/support/pages/node/6472891",
"product" : { "refsource": "CONFIRM",
"product_data" : [ "url": "https://www.ibm.com/support/pages/node/6472891",
{ "title": "IBM Security Bulletin 6472891 (Qradar)"
"version" : { },
"version_data" : [ {
{ "title": "X-Force Vulnerability Report",
"version_value" : "7.3" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/192539",
}, "name": "ibm-qradar-cve20204980-info-disc (192539)",
{ "refsource": "XF"
"version_value" : "7.4"
}
]
},
"product_name" : "QRadar"
}
]
}
} }
] ]
} },
}, "CVE_data_meta": {
"description" : { "STATE": "PUBLIC",
"description_data" : [ "DATE_PUBLIC": "2021-07-15T00:00:00",
{ "ASSIGNER": "psirt@us.ibm.com",
"lang" : "eng", "ID": "CVE-2020-4980"
"value" : "IBM QRadar SIEM 7.3 and 7.4 uses less secure methods for protecting data in transit between hosts when encrypt host connections is not enabled as well as data at rest. IBM X-Force ID: 192539." },
} "data_version": "4.0",
] "problemtype": {
} "problemtype_data": [
} {
"description": [
{
"lang": "eng",
"value": "Obtain Information"
}
]
}
]
},
"impact": {
"cvssv3": {
"BM": {
"C": "H",
"A": "N",
"AC": "H",
"SCORE": "5.300",
"UI": "N",
"I": "N",
"S": "U",
"PR": "N",
"AV": "A"
},
"TM": {
"E": "U",
"RC": "C",
"RL": "O"
}
}
},
"data_format": "MITRE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "7.3"
},
{
"version_value": "7.4"
}
]
},
"product_name": "QRadar"
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "IBM QRadar SIEM 7.3 and 7.4 uses less secure methods for protecting data in transit between hosts when encrypt host connections is not enabled as well as data at rest. IBM X-Force ID: 192539."
}
]
}
}

View File

@ -53,6 +53,11 @@
"refsource": "FULLDISC", "refsource": "FULLDISC",
"name": "20210716 VMware ThinApp DLL hijacking vulnerability", "name": "20210716 VMware ThinApp DLL hijacking vulnerability",
"url": "http://seclists.org/fulldisclosure/2021/Jul/35" "url": "http://seclists.org/fulldisclosure/2021/Jul/35"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163521/VMware-ThinApp-DLL-Hijacking.html",
"url": "http://packetstormsecurity.com/files/163521/VMware-ThinApp-DLL-Hijacking.html"
} }
] ]
}, },

View File

@ -94,6 +94,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d" "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html",
"url": "http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html"
} }
] ]
}, },

View File

@ -68,6 +68,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163524/Aruba-Instant-8.7.1.0-Arbitrary-File-Modification.html",
"url": "http://packetstormsecurity.com/files/163524/Aruba-Instant-8.7.1.0-Arbitrary-File-Modification.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html"
} }
] ]
}, },

View File

@ -68,6 +68,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html"
} }
] ]
}, },

View File

@ -68,6 +68,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html"
} }
] ]
}, },

View File

@ -65,6 +65,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html"
} }
] ]
}, },

View File

@ -68,6 +68,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html"
} }
] ]
}, },

View File

@ -68,6 +68,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html"
} }
] ]
}, },

View File

@ -68,6 +68,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html"
} }
] ]
}, },

View File

@ -68,6 +68,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf" "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/163522/Aruba-Instant-IAP-Remote-Code-Execution.html"
} }
] ]
}, },

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-36760",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-36761",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-36762",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-36763",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-36764",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-36765",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-36766",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}