"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-03-18 01:00:54 +00:00
parent 643da357ea
commit bd4e86e5da
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
14 changed files with 115 additions and 43 deletions

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20624", "ID": "CVE-2021-20624",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,10 +45,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://kb.cybozu.support/article/36866/" "url": "https://kb.cybozu.support/article/36866/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36866/"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN45797538/index.html" "url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20625", "ID": "CVE-2021-20625",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,10 +45,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://kb.cybozu.support/article/36874/" "url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN45797538/index.html" "url": "https://kb.cybozu.support/article/36874/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36874/"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20626", "ID": "CVE-2021-20626",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,10 +45,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://kb.cybozu.support/article/36864/" "url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN45797538/index.html" "url": "https://kb.cybozu.support/article/36864/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36864/"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20627", "ID": "CVE-2021-20627",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,10 +45,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://kb.cybozu.support/article/36873/" "url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN45797538/index.html" "url": "https://kb.cybozu.support/article/36873/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36873/"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20628", "ID": "CVE-2021-20628",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,10 +45,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://kb.cybozu.support/article/36868/" "url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN45797538/index.html" "url": "https://kb.cybozu.support/article/36868/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36868/"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20629", "ID": "CVE-2021-20629",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,10 +45,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://kb.cybozu.support/article/36867/" "url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN45797538/index.html" "url": "https://kb.cybozu.support/article/36867/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36867/"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20630", "ID": "CVE-2021-20630",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,10 +45,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://kb.cybozu.support/article/36872/" "url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN45797538/index.html" "url": "https://kb.cybozu.support/article/36872/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36872/"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20631", "ID": "CVE-2021-20631",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,10 +45,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://kb.cybozu.support/article/36871/" "url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN45797538/index.html" "url": "https://kb.cybozu.support/article/36871/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36871/"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20632", "ID": "CVE-2021-20632",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,10 +45,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://kb.cybozu.support/article/36870/" "url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN45797538/index.html" "url": "https://kb.cybozu.support/article/36870/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36870/"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20633", "ID": "CVE-2021-20633",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,10 +45,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://kb.cybozu.support/article/36869/" "url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN45797538/index.html" "url": "https://kb.cybozu.support/article/36869/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36869/"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20634", "ID": "CVE-2021-20634",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,10 +45,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://kb.cybozu.support/article/36865/" "url": "https://jvn.jp/en/jp/JVN45797538/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN45797538/index.html"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN45797538/index.html" "url": "https://kb.cybozu.support/article/36865/",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36865/"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20675", "ID": "CVE-2021-20675",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,10 +45,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html" "url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html",
"refsource": "MISC",
"name": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN47497535/index.html" "url": "https://jvn.jp/en/jp/JVN47497535/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN47497535/index.html"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20676", "ID": "CVE-2021-20676",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,10 +45,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html" "url": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html",
"refsource": "MISC",
"name": "https://www.m-system.co.jp/download_w/dl_dl8updaterE.html"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN47497535/index.html" "url": "https://jvn.jp/en/jp/JVN47497535/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN47497535/index.html"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2021-20678", "ID": "CVE-2021-20678",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -44,13 +45,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://www.paidmembershipspro.com/pmpro-update-2-5-6/" "url": "https://www.paidmembershipspro.com/pmpro-update-2-5-6/",
"refsource": "MISC",
"name": "https://www.paidmembershipspro.com/pmpro-update-2-5-6/"
}, },
{ {
"url": "https://wordpress.org/plugins/paid-memberships-pro/" "url": "https://wordpress.org/plugins/paid-memberships-pro/",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/paid-memberships-pro/"
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN08191557/index.html" "url": "https://jvn.jp/en/jp/JVN08191557/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN08191557/index.html"
} }
] ]
}, },