diff --git a/2021/20xxx/CVE-2021-20624.json b/2021/20xxx/CVE-2021-20624.json index 22a553f9033..4ac1f22fef3 100644 --- a/2021/20xxx/CVE-2021-20624.json +++ b/2021/20xxx/CVE-2021-20624.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20624", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36866/" + "url": "https://kb.cybozu.support/article/36866/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36866/" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20625.json b/2021/20xxx/CVE-2021-20625.json index cb10984ed13..ce4ab334c0e 100644 --- a/2021/20xxx/CVE-2021-20625.json +++ b/2021/20xxx/CVE-2021-20625.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20625", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36874/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36874/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36874/" } ] }, diff --git a/2021/20xxx/CVE-2021-20626.json b/2021/20xxx/CVE-2021-20626.json index 44e99d123d8..a6e83995248 100644 --- a/2021/20xxx/CVE-2021-20626.json +++ b/2021/20xxx/CVE-2021-20626.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20626", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36864/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36864/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36864/" } ] }, diff --git a/2021/20xxx/CVE-2021-20627.json b/2021/20xxx/CVE-2021-20627.json index f975ec9cc1a..af33a2fda04 100644 --- a/2021/20xxx/CVE-2021-20627.json +++ b/2021/20xxx/CVE-2021-20627.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20627", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36873/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36873/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36873/" } ] }, diff --git a/2021/20xxx/CVE-2021-20628.json b/2021/20xxx/CVE-2021-20628.json index 88933f0d769..8cca753c91c 100644 --- a/2021/20xxx/CVE-2021-20628.json +++ b/2021/20xxx/CVE-2021-20628.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20628", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36868/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36868/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36868/" } ] }, diff --git a/2021/20xxx/CVE-2021-20629.json b/2021/20xxx/CVE-2021-20629.json index f9765cc0989..d8c5ebf418e 100644 --- a/2021/20xxx/CVE-2021-20629.json +++ b/2021/20xxx/CVE-2021-20629.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20629", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36867/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36867/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36867/" } ] }, diff --git a/2021/20xxx/CVE-2021-20630.json b/2021/20xxx/CVE-2021-20630.json index 840e6de4b84..72bf0c3614c 100644 --- a/2021/20xxx/CVE-2021-20630.json +++ b/2021/20xxx/CVE-2021-20630.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20630", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36872/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36872/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36872/" } ] }, diff --git a/2021/20xxx/CVE-2021-20631.json b/2021/20xxx/CVE-2021-20631.json index 0580b31af05..1e13fe049fe 100644 --- a/2021/20xxx/CVE-2021-20631.json +++ b/2021/20xxx/CVE-2021-20631.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20631", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36871/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36871/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36871/" } ] }, diff --git a/2021/20xxx/CVE-2021-20632.json b/2021/20xxx/CVE-2021-20632.json index 5aa92e0e244..0c35b1d3d57 100644 --- a/2021/20xxx/CVE-2021-20632.json +++ b/2021/20xxx/CVE-2021-20632.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20632", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36870/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36870/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36870/" } ] }, diff --git a/2021/20xxx/CVE-2021-20633.json b/2021/20xxx/CVE-2021-20633.json index e5d5ad7fba1..129ab6c3b02 100644 --- a/2021/20xxx/CVE-2021-20633.json +++ b/2021/20xxx/CVE-2021-20633.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20633", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36869/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36869/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36869/" } ] }, diff --git a/2021/20xxx/CVE-2021-20634.json b/2021/20xxx/CVE-2021-20634.json index 3da853ee0be..f75708315dc 100644 --- a/2021/20xxx/CVE-2021-20634.json +++ b/2021/20xxx/CVE-2021-20634.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20634", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/36865/" + "url": "https://jvn.jp/en/jp/JVN45797538/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN45797538/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN45797538/index.html" + "url": "https://kb.cybozu.support/article/36865/", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/36865/" } ] }, diff --git a/2021/20xxx/CVE-2021-20675.json b/2021/20xxx/CVE-2021-20675.json index 04ee60055d3..61f95fbea48 100644 --- a/2021/20xxx/CVE-2021-20675.json +++ b/2021/20xxx/CVE-2021-20675.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20675", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html" + "url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html", + "refsource": "MISC", + "name": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html" }, { - "url": "https://jvn.jp/en/jp/JVN47497535/index.html" + "url": "https://jvn.jp/en/jp/JVN47497535/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN47497535/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20676.json b/2021/20xxx/CVE-2021-20676.json index 556ed126b8b..860de9ecd9e 100644 --- a/2021/20xxx/CVE-2021-20676.json +++ b/2021/20xxx/CVE-2021-20676.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20676", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html" + "url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html", + "refsource": "MISC", + "name": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html" }, { - "url": "https://jvn.jp/en/jp/JVN47497535/index.html" + "url": "https://jvn.jp/en/jp/JVN47497535/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN47497535/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20678.json b/2021/20xxx/CVE-2021-20678.json index 652c81eac2c..87009119482 100644 --- a/2021/20xxx/CVE-2021-20678.json +++ b/2021/20xxx/CVE-2021-20678.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20678", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,13 +45,19 @@ "references": { "reference_data": [ { - "url": "https://www.paidmembershipspro.com/pmpro-update-2-5-6/" + "url": "https://www.paidmembershipspro.com/pmpro-update-2-5-6/", + "refsource": "MISC", + "name": "https://www.paidmembershipspro.com/pmpro-update-2-5-6/" }, { - "url": "https://wordpress.org/plugins/paid-memberships-pro/" + "url": "https://wordpress.org/plugins/paid-memberships-pro/", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/paid-memberships-pro/" }, { - "url": "https://jvn.jp/en/jp/JVN08191557/index.html" + "url": "https://jvn.jp/en/jp/JVN08191557/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN08191557/index.html" } ] },