"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-08-26 02:00:59 +00:00
parent fc1a8b2cdc
commit 19b7c3096a
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
14 changed files with 423 additions and 369 deletions

View File

@ -1,69 +1,70 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "psirt@nvidia.com",
"ID" : "CVE-2021-1106",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.",
"version" : {
"version_data" : [
{
"version_value" : "All Jetson Linux versions prior to r32.6.1"
}
]
}
}
]
},
"vendor_name" : "NVIDIA"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "NVIDIA Linux kernel distributions contain a vulnerability in nvmap, where writes may be allowed to read-only buffers, which may result in escalation of privileges, complete denial of service, unconstrained information disclosure, and serious data tampering of all processes on the system."
}
]
},
"impact" : {
"cvss" : {
"baseScore" : 8.8,
"baseSeverity" : "High",
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version" : "3.1"
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "escalation of privileges, denial of service, information disclosure, and data tampering"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5216"
}
]
}
}
"CVE_data_meta": {
"ASSIGNER": "psirt@nvidia.com",
"ID": "CVE-2021-1106",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.",
"version": {
"version_data": [
{
"version_value": "All Jetson Linux versions prior to r32.6.1"
}
]
}
}
]
},
"vendor_name": "NVIDIA"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NVIDIA Linux kernel distributions contain a vulnerability in nvmap, where writes may be allowed to read-only buffers, which may result in escalation of privileges, complete denial of service, unconstrained information disclosure, and serious data tampering of all processes on the system."
}
]
},
"impact": {
"cvss": {
"baseScore": 8.8,
"baseSeverity": "High",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privileges, denial of service, information disclosure, and data tampering"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216",
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216"
}
]
}
}

View File

@ -1,69 +1,70 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "psirt@nvidia.com",
"ID" : "CVE-2021-1107",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.",
"version" : {
"version_data" : [
{
"version_value" : "All Jetson Linux versions prior to r32.6.1"
}
]
}
}
]
},
"vendor_name" : "NVIDIA"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "NVIDIA Linux kernel distributions contain a vulnerability in nvmap NVMAP_IOC_WRITE* paths, where improper access controls may lead to code execution, complete denial of service, and seriously compromised integrity of all system components."
}
]
},
"impact" : {
"cvss" : {
"baseScore" : 8.8,
"baseSeverity" : "High",
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version" : "3.1"
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "code execution, denial of service, loss of integrity"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5216"
}
]
}
}
"CVE_data_meta": {
"ASSIGNER": "psirt@nvidia.com",
"ID": "CVE-2021-1107",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.",
"version": {
"version_data": [
{
"version_value": "All Jetson Linux versions prior to r32.6.1"
}
]
}
}
]
},
"vendor_name": "NVIDIA"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NVIDIA Linux kernel distributions contain a vulnerability in nvmap NVMAP_IOC_WRITE* paths, where improper access controls may lead to code execution, complete denial of service, and seriously compromised integrity of all system components."
}
]
},
"impact": {
"cvss": {
"baseScore": 8.8,
"baseSeverity": "High",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "code execution, denial of service, loss of integrity"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216",
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216"
}
]
}
}

View File

@ -1,69 +1,70 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "psirt@nvidia.com",
"ID" : "CVE-2021-1108",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.",
"version" : {
"version_data" : [
{
"version_value" : "All Jetson Linux versions prior to r32.6.1"
}
]
}
}
]
},
"vendor_name" : "NVIDIA"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "NVIDIA Linux kernel distributions contain a vulnerability in FuSa Capture (VI/ISP), where integer underflow due to lack of input validation may lead to complete denial of service, partial integrity, and serious confidentiality loss for all processes in the system."
}
]
},
"impact" : {
"cvss" : {
"baseScore" : 8.7,
"baseSeverity" : "High",
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:H",
"version" : "3.1"
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "denial of service, partial integrity, and confidentiality loss"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5216"
}
]
}
}
"CVE_data_meta": {
"ASSIGNER": "psirt@nvidia.com",
"ID": "CVE-2021-1108",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.",
"version": {
"version_data": [
{
"version_value": "All Jetson Linux versions prior to r32.6.1"
}
]
}
}
]
},
"vendor_name": "NVIDIA"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NVIDIA Linux kernel distributions contain a vulnerability in FuSa Capture (VI/ISP), where integer underflow due to lack of input validation may lead to complete denial of service, partial integrity, and serious confidentiality loss for all processes in the system."
}
]
},
"impact": {
"cvss": {
"baseScore": 8.7,
"baseSeverity": "High",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "denial of service, partial integrity, and confidentiality loss"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216",
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216"
}
]
}
}

View File

@ -1,69 +1,70 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "psirt@nvidia.com",
"ID" : "CVE-2021-1109",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.",
"version" : {
"version_data" : [
{
"version_value" : "All Jetson Linux versions prior to r32.6.1"
}
]
}
}
]
},
"vendor_name" : "NVIDIA"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "NVIDIA camera firmware contains a multistep, timing-related vulnerability where an unauthorized modification by camera resources may result in loss of data integrity or denial of service across several streams."
}
]
},
"impact" : {
"cvss" : {
"baseScore" : 7.2,
"baseSeverity" : "High",
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H",
"version" : "3.1"
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "data integrity, denial of service."
}
]
}
]
},
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5216"
}
]
}
}
"CVE_data_meta": {
"ASSIGNER": "psirt@nvidia.com",
"ID": "CVE-2021-1109",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.",
"version": {
"version_data": [
{
"version_value": "All Jetson Linux versions prior to r32.6.1"
}
]
}
}
]
},
"vendor_name": "NVIDIA"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NVIDIA camera firmware contains a multistep, timing-related vulnerability where an unauthorized modification by camera resources may result in loss of data integrity or denial of service across several streams."
}
]
},
"impact": {
"cvss": {
"baseScore": 7.2,
"baseSeverity": "High",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "data integrity, denial of service."
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216",
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216"
}
]
}
}

View File

@ -1,69 +1,70 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "psirt@nvidia.com",
"ID" : "CVE-2021-1110",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Jetson AGX Xavier series, Jetson Xavier NX.",
"version" : {
"version_data" : [
{
"version_value" : "All Jetson Linux versions prior to r32.6.1"
}
]
}
}
]
},
"vendor_name" : "NVIDIA"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "NVIDIA Linux kernel distributions on Jetson Xavier contain a vulnerability in camera firmware where a user can change input data after validation, which may lead to complete denial of service and serious data corruption of all kernel components."
}
]
},
"impact" : {
"cvss" : {
"baseScore" : 7.1,
"baseSeverity" : "High",
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version" : "3.1"
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "denial of service, data corruption"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5216"
}
]
}
}
"CVE_data_meta": {
"ASSIGNER": "psirt@nvidia.com",
"ID": "CVE-2021-1110",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Jetson AGX Xavier series, Jetson Xavier NX.",
"version": {
"version_data": [
{
"version_value": "All Jetson Linux versions prior to r32.6.1"
}
]
}
}
]
},
"vendor_name": "NVIDIA"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NVIDIA Linux kernel distributions on Jetson Xavier contain a vulnerability in camera firmware where a user can change input data after validation, which may lead to complete denial of service and serious data corruption of all kernel components."
}
]
},
"impact": {
"cvss": {
"baseScore": 7.1,
"baseSeverity": "High",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "denial of service, data corruption"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216",
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216"
}
]
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20793",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,16 +45,24 @@
"references": {
"reference_data": [
{
"url": "https://www.sony.co.uk/electronics/support/software/00266749"
"url": "https://www.sony.co.uk/electronics/support/software/00266749",
"refsource": "MISC",
"name": "https://www.sony.co.uk/electronics/support/software/00266749"
},
{
"url": "https://www.sony.co.uk/electronics/support/software/00266758"
"url": "https://www.sony.co.uk/electronics/support/software/00266758",
"refsource": "MISC",
"name": "https://www.sony.co.uk/electronics/support/software/00266758"
},
{
"url": "https://www.sony.co.uk/electronics/support/software/00266642"
"url": "https://www.sony.co.uk/electronics/support/software/00266642",
"refsource": "MISC",
"name": "https://www.sony.co.uk/electronics/support/software/00266642"
},
{
"url": "https://jvn.jp/en/jp/JVN80288258/index.html"
"url": "https://jvn.jp/en/jp/JVN80288258/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN80288258/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20808",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html",
"refsource": "MISC",
"name": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
},
{
"url": "https://jvn.jp/en/jp/JVN97545738/index.html"
"url": "https://jvn.jp/en/jp/JVN97545738/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN97545738/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20809",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html",
"refsource": "MISC",
"name": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
},
{
"url": "https://jvn.jp/en/jp/JVN97545738/index.html"
"url": "https://jvn.jp/en/jp/JVN97545738/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN97545738/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20810",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html",
"refsource": "MISC",
"name": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
},
{
"url": "https://jvn.jp/en/jp/JVN97545738/index.html"
"url": "https://jvn.jp/en/jp/JVN97545738/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN97545738/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20811",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html",
"refsource": "MISC",
"name": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
},
{
"url": "https://jvn.jp/en/jp/JVN97545738/index.html"
"url": "https://jvn.jp/en/jp/JVN97545738/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN97545738/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20812",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html",
"refsource": "MISC",
"name": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
},
{
"url": "https://jvn.jp/en/jp/JVN97545738/index.html"
"url": "https://jvn.jp/en/jp/JVN97545738/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN97545738/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20813",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html",
"refsource": "MISC",
"name": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
},
{
"url": "https://jvn.jp/en/jp/JVN97545738/index.html"
"url": "https://jvn.jp/en/jp/JVN97545738/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN97545738/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20814",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html",
"refsource": "MISC",
"name": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
},
{
"url": "https://jvn.jp/en/jp/JVN97545738/index.html"
"url": "https://jvn.jp/en/jp/JVN97545738/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN97545738/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20815",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
"url": "https://movabletype.org/news/2021/08/mt-780-681-released.html",
"refsource": "MISC",
"name": "https://movabletype.org/news/2021/08/mt-780-681-released.html"
},
{
"url": "https://jvn.jp/en/jp/JVN97545738/index.html"
"url": "https://jvn.jp/en/jp/JVN97545738/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN97545738/index.html"
}
]
},