"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-03-18 01:00:54 +00:00
parent 643da357ea
commit bd4e86e5da
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
14 changed files with 115 additions and 43 deletions

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20624",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/36866/"
"url": "https://kb.cybozu.support/article/36866/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36866/"
},
{
"url": "https://jvn.jp/en/jp/JVN45797538/index.html"
"url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20625",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/36874/"
"url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
},
{
"url": "https://jvn.jp/en/jp/JVN45797538/index.html"
"url": "https://kb.cybozu.support/article/36874/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36874/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20626",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/36864/"
"url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
},
{
"url": "https://jvn.jp/en/jp/JVN45797538/index.html"
"url": "https://kb.cybozu.support/article/36864/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36864/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20627",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/36873/"
"url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
},
{
"url": "https://jvn.jp/en/jp/JVN45797538/index.html"
"url": "https://kb.cybozu.support/article/36873/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36873/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20628",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/36868/"
"url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
},
{
"url": "https://jvn.jp/en/jp/JVN45797538/index.html"
"url": "https://kb.cybozu.support/article/36868/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36868/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20629",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/36867/"
"url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
},
{
"url": "https://jvn.jp/en/jp/JVN45797538/index.html"
"url": "https://kb.cybozu.support/article/36867/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36867/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20630",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/36872/"
"url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
},
{
"url": "https://jvn.jp/en/jp/JVN45797538/index.html"
"url": "https://kb.cybozu.support/article/36872/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36872/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20631",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/36871/"
"url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
},
{
"url": "https://jvn.jp/en/jp/JVN45797538/index.html"
"url": "https://kb.cybozu.support/article/36871/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36871/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20632",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/36870/"
"url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
},
{
"url": "https://jvn.jp/en/jp/JVN45797538/index.html"
"url": "https://kb.cybozu.support/article/36870/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36870/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20633",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/36869/"
"url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
},
{
"url": "https://jvn.jp/en/jp/JVN45797538/index.html"
"url": "https://kb.cybozu.support/article/36869/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36869/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20634",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/36865/"
"url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
},
{
"url": "https://jvn.jp/en/jp/JVN45797538/index.html"
"url": "https://kb.cybozu.support/article/36865/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36865/"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20675",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html"
"url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html",
"refsource": "MISC",
"name": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html"
},
{
"url": "https://jvn.jp/en/jp/JVN47497535/index.html"
"url": "https://jvn.jp/en/jp/JVN47497535/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN47497535/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20676",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html"
"url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html",
"refsource": "MISC",
"name": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html"
},
{
"url": "https://jvn.jp/en/jp/JVN47497535/index.html"
"url": "https://jvn.jp/en/jp/JVN47497535/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN47497535/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20678",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://www.paidmembershipspro.com/pmpro-update-2-5-6/"
"url": "https://www.paidmembershipspro.com/pmpro-update-2-5-6/",
"refsource": "MISC",
"name": "https://www.paidmembershipspro.com/pmpro-update-2-5-6/"
},
{
"url": "https://wordpress.org/plugins/paid-memberships-pro/"
"url": "https://wordpress.org/plugins/paid-memberships-pro/",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/paid-memberships-pro/"
},
{
"url": "https://jvn.jp/en/jp/JVN08191557/index.html"
"url": "https://jvn.jp/en/jp/JVN08191557/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN08191557/index.html"
}
]
},