From 19b7c3096a1d8933c2b95a3e0987540ba70fb12e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 26 Aug 2021 02:00:59 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/1xxx/CVE-2021-1106.json | 137 +++++++++++++++++---------------- 2021/1xxx/CVE-2021-1107.json | 137 +++++++++++++++++---------------- 2021/1xxx/CVE-2021-1108.json | 137 +++++++++++++++++---------------- 2021/1xxx/CVE-2021-1109.json | 137 +++++++++++++++++---------------- 2021/1xxx/CVE-2021-1110.json | 137 +++++++++++++++++---------------- 2021/20xxx/CVE-2021-20793.json | 19 +++-- 2021/20xxx/CVE-2021-20808.json | 11 ++- 2021/20xxx/CVE-2021-20809.json | 11 ++- 2021/20xxx/CVE-2021-20810.json | 11 ++- 2021/20xxx/CVE-2021-20811.json | 11 ++- 2021/20xxx/CVE-2021-20812.json | 11 ++- 2021/20xxx/CVE-2021-20813.json | 11 ++- 2021/20xxx/CVE-2021-20814.json | 11 ++- 2021/20xxx/CVE-2021-20815.json | 11 ++- 14 files changed, 423 insertions(+), 369 deletions(-) diff --git a/2021/1xxx/CVE-2021-1106.json b/2021/1xxx/CVE-2021-1106.json index ee01129e002..cb3bbc5d8d7 100644 --- a/2021/1xxx/CVE-2021-1106.json +++ b/2021/1xxx/CVE-2021-1106.json @@ -1,69 +1,70 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "psirt@nvidia.com", - "ID" : "CVE-2021-1106", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.", - "version" : { - "version_data" : [ - { - "version_value" : "All Jetson Linux versions prior to r32.6.1" - } - ] - } - } - ] - }, - "vendor_name" : "NVIDIA" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "NVIDIA Linux kernel distributions contain a vulnerability in nvmap, where writes may be allowed to read-only buffers, which may result in escalation of privileges, complete denial of service, unconstrained information disclosure, and serious data tampering of all processes on the system." - } - ] - }, - "impact" : { - "cvss" : { - "baseScore" : 8.8, - "baseSeverity" : "High", - "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", - "version" : "3.1" - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "escalation of privileges, denial of service, information disclosure, and data tampering" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5216" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "psirt@nvidia.com", + "ID": "CVE-2021-1106", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.", + "version": { + "version_data": [ + { + "version_value": "All Jetson Linux versions prior to r32.6.1" + } + ] + } + } + ] + }, + "vendor_name": "NVIDIA" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "NVIDIA Linux kernel distributions contain a vulnerability in nvmap, where writes may be allowed to read-only buffers, which may result in escalation of privileges, complete denial of service, unconstrained information disclosure, and serious data tampering of all processes on the system." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "escalation of privileges, denial of service, information disclosure, and data tampering" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216" + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1107.json b/2021/1xxx/CVE-2021-1107.json index e7e81e289c2..6365ce7e663 100644 --- a/2021/1xxx/CVE-2021-1107.json +++ b/2021/1xxx/CVE-2021-1107.json @@ -1,69 +1,70 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "psirt@nvidia.com", - "ID" : "CVE-2021-1107", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.", - "version" : { - "version_data" : [ - { - "version_value" : "All Jetson Linux versions prior to r32.6.1" - } - ] - } - } - ] - }, - "vendor_name" : "NVIDIA" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "NVIDIA Linux kernel distributions contain a vulnerability in nvmap NVMAP_IOC_WRITE* paths, where improper access controls may lead to code execution, complete denial of service, and seriously compromised integrity of all system components." - } - ] - }, - "impact" : { - "cvss" : { - "baseScore" : 8.8, - "baseSeverity" : "High", - "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", - "version" : "3.1" - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "code execution, denial of service, loss of integrity" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5216" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "psirt@nvidia.com", + "ID": "CVE-2021-1107", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.", + "version": { + "version_data": [ + { + "version_value": "All Jetson Linux versions prior to r32.6.1" + } + ] + } + } + ] + }, + "vendor_name": "NVIDIA" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "NVIDIA Linux kernel distributions contain a vulnerability in nvmap NVMAP_IOC_WRITE* paths, where improper access controls may lead to code execution, complete denial of service, and seriously compromised integrity of all system components." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "code execution, denial of service, loss of integrity" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216" + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1108.json b/2021/1xxx/CVE-2021-1108.json index 1b51eae0cb7..109b3df2cfa 100644 --- a/2021/1xxx/CVE-2021-1108.json +++ b/2021/1xxx/CVE-2021-1108.json @@ -1,69 +1,70 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "psirt@nvidia.com", - "ID" : "CVE-2021-1108", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.", - "version" : { - "version_data" : [ - { - "version_value" : "All Jetson Linux versions prior to r32.6.1" - } - ] - } - } - ] - }, - "vendor_name" : "NVIDIA" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "NVIDIA Linux kernel distributions contain a vulnerability in FuSa Capture (VI/ISP), where integer underflow due to lack of input validation may lead to complete denial of service, partial integrity, and serious confidentiality loss for all processes in the system." - } - ] - }, - "impact" : { - "cvss" : { - "baseScore" : 8.7, - "baseSeverity" : "High", - "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:H", - "version" : "3.1" - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "denial of service, partial integrity, and confidentiality loss" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5216" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "psirt@nvidia.com", + "ID": "CVE-2021-1108", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.", + "version": { + "version_data": [ + { + "version_value": "All Jetson Linux versions prior to r32.6.1" + } + ] + } + } + ] + }, + "vendor_name": "NVIDIA" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "NVIDIA Linux kernel distributions contain a vulnerability in FuSa Capture (VI/ISP), where integer underflow due to lack of input validation may lead to complete denial of service, partial integrity, and serious confidentiality loss for all processes in the system." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 8.7, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "denial of service, partial integrity, and confidentiality loss" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216" + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1109.json b/2021/1xxx/CVE-2021-1109.json index 297ac190cd7..fbbaa4b1b6b 100644 --- a/2021/1xxx/CVE-2021-1109.json +++ b/2021/1xxx/CVE-2021-1109.json @@ -1,69 +1,70 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "psirt@nvidia.com", - "ID" : "CVE-2021-1109", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.", - "version" : { - "version_data" : [ - { - "version_value" : "All Jetson Linux versions prior to r32.6.1" - } - ] - } - } - ] - }, - "vendor_name" : "NVIDIA" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "NVIDIA camera firmware contains a multistep, timing-related vulnerability where an unauthorized modification by camera resources may result in loss of data integrity or denial of service across several streams." - } - ] - }, - "impact" : { - "cvss" : { - "baseScore" : 7.2, - "baseSeverity" : "High", - "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H", - "version" : "3.1" - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "data integrity, denial of service." - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5216" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "psirt@nvidia.com", + "ID": "CVE-2021-1109", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1.", + "version": { + "version_data": [ + { + "version_value": "All Jetson Linux versions prior to r32.6.1" + } + ] + } + } + ] + }, + "vendor_name": "NVIDIA" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "NVIDIA camera firmware contains a multistep, timing-related vulnerability where an unauthorized modification by camera resources may result in loss of data integrity or denial of service across several streams." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 7.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "data integrity, denial of service." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216" + } + ] + } +} \ No newline at end of file diff --git a/2021/1xxx/CVE-2021-1110.json b/2021/1xxx/CVE-2021-1110.json index c4ebfb4d189..3904856c3b4 100644 --- a/2021/1xxx/CVE-2021-1110.json +++ b/2021/1xxx/CVE-2021-1110.json @@ -1,69 +1,70 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "psirt@nvidia.com", - "ID" : "CVE-2021-1110", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Jetson AGX Xavier series, Jetson Xavier NX.", - "version" : { - "version_data" : [ - { - "version_value" : "All Jetson Linux versions prior to r32.6.1" - } - ] - } - } - ] - }, - "vendor_name" : "NVIDIA" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "NVIDIA Linux kernel distributions on Jetson Xavier contain a vulnerability in camera firmware where a user can change input data after validation, which may lead to complete denial of service and serious data corruption of all kernel components." - } - ] - }, - "impact" : { - "cvss" : { - "baseScore" : 7.1, - "baseSeverity" : "High", - "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", - "version" : "3.1" - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "denial of service, data corruption" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5216" - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "psirt@nvidia.com", + "ID": "CVE-2021-1110", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Jetson AGX Xavier series, Jetson Xavier NX.", + "version": { + "version_data": [ + { + "version_value": "All Jetson Linux versions prior to r32.6.1" + } + ] + } + } + ] + }, + "vendor_name": "NVIDIA" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "NVIDIA Linux kernel distributions on Jetson Xavier contain a vulnerability in camera firmware where a user can change input data after validation, which may lead to complete denial of service and serious data corruption of all kernel components." + } + ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "denial of service, data corruption" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5216" + } + ] + } +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20793.json b/2021/20xxx/CVE-2021-20793.json index ef50c162ca6..db429ae20a9 100644 --- a/2021/20xxx/CVE-2021-20793.json +++ b/2021/20xxx/CVE-2021-20793.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20793", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,16 +45,24 @@ "references": { "reference_data": [ { - "url": "https://www.sony.co.uk/electronics/support/software/00266749" + "url": "https://www.sony.co.uk/electronics/support/software/00266749", + "refsource": "MISC", + "name": "https://www.sony.co.uk/electronics/support/software/00266749" }, { - "url": "https://www.sony.co.uk/electronics/support/software/00266758" + "url": "https://www.sony.co.uk/electronics/support/software/00266758", + "refsource": "MISC", + "name": "https://www.sony.co.uk/electronics/support/software/00266758" }, { - "url": "https://www.sony.co.uk/electronics/support/software/00266642" + "url": "https://www.sony.co.uk/electronics/support/software/00266642", + "refsource": "MISC", + "name": "https://www.sony.co.uk/electronics/support/software/00266642" }, { - "url": "https://jvn.jp/en/jp/JVN80288258/index.html" + "url": "https://jvn.jp/en/jp/JVN80288258/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN80288258/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20808.json b/2021/20xxx/CVE-2021-20808.json index a62409da4c2..6efc10cc030 100644 --- a/2021/20xxx/CVE-2021-20808.json +++ b/2021/20xxx/CVE-2021-20808.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20808", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html" + "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html", + "refsource": "MISC", + "name": "https://movabletype.org/news/2021/08/mt-780-681-released.html" }, { - "url": "https://jvn.jp/en/jp/JVN97545738/index.html" + "url": "https://jvn.jp/en/jp/JVN97545738/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN97545738/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20809.json b/2021/20xxx/CVE-2021-20809.json index 52b2226b428..30690828345 100644 --- a/2021/20xxx/CVE-2021-20809.json +++ b/2021/20xxx/CVE-2021-20809.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20809", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html" + "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html", + "refsource": "MISC", + "name": "https://movabletype.org/news/2021/08/mt-780-681-released.html" }, { - "url": "https://jvn.jp/en/jp/JVN97545738/index.html" + "url": "https://jvn.jp/en/jp/JVN97545738/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN97545738/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20810.json b/2021/20xxx/CVE-2021-20810.json index fd2221ac30e..ca845e92400 100644 --- a/2021/20xxx/CVE-2021-20810.json +++ b/2021/20xxx/CVE-2021-20810.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20810", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html" + "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html", + "refsource": "MISC", + "name": "https://movabletype.org/news/2021/08/mt-780-681-released.html" }, { - "url": "https://jvn.jp/en/jp/JVN97545738/index.html" + "url": "https://jvn.jp/en/jp/JVN97545738/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN97545738/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20811.json b/2021/20xxx/CVE-2021-20811.json index 46e65fa4722..73ea3cbabe2 100644 --- a/2021/20xxx/CVE-2021-20811.json +++ b/2021/20xxx/CVE-2021-20811.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20811", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html" + "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html", + "refsource": "MISC", + "name": "https://movabletype.org/news/2021/08/mt-780-681-released.html" }, { - "url": "https://jvn.jp/en/jp/JVN97545738/index.html" + "url": "https://jvn.jp/en/jp/JVN97545738/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN97545738/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20812.json b/2021/20xxx/CVE-2021-20812.json index 4811bc9586d..1386e5d58e3 100644 --- a/2021/20xxx/CVE-2021-20812.json +++ b/2021/20xxx/CVE-2021-20812.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20812", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html" + "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html", + "refsource": "MISC", + "name": "https://movabletype.org/news/2021/08/mt-780-681-released.html" }, { - "url": "https://jvn.jp/en/jp/JVN97545738/index.html" + "url": "https://jvn.jp/en/jp/JVN97545738/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN97545738/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20813.json b/2021/20xxx/CVE-2021-20813.json index 385ed86a83b..9566d355645 100644 --- a/2021/20xxx/CVE-2021-20813.json +++ b/2021/20xxx/CVE-2021-20813.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20813", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html" + "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html", + "refsource": "MISC", + "name": "https://movabletype.org/news/2021/08/mt-780-681-released.html" }, { - "url": "https://jvn.jp/en/jp/JVN97545738/index.html" + "url": "https://jvn.jp/en/jp/JVN97545738/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN97545738/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20814.json b/2021/20xxx/CVE-2021-20814.json index f28e64fb900..83163fcfe4f 100644 --- a/2021/20xxx/CVE-2021-20814.json +++ b/2021/20xxx/CVE-2021-20814.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20814", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html" + "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html", + "refsource": "MISC", + "name": "https://movabletype.org/news/2021/08/mt-780-681-released.html" }, { - "url": "https://jvn.jp/en/jp/JVN97545738/index.html" + "url": "https://jvn.jp/en/jp/JVN97545738/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN97545738/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20815.json b/2021/20xxx/CVE-2021-20815.json index c65a85505c4..6bf7b9269d4 100644 --- a/2021/20xxx/CVE-2021-20815.json +++ b/2021/20xxx/CVE-2021-20815.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20815", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html" + "url": "https://movabletype.org/news/2021/08/mt-780-681-released.html", + "refsource": "MISC", + "name": "https://movabletype.org/news/2021/08/mt-780-681-released.html" }, { - "url": "https://jvn.jp/en/jp/JVN97545738/index.html" + "url": "https://jvn.jp/en/jp/JVN97545738/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN97545738/index.html" } ] },