From c40ab194a87da6c72ea209fa3b315c0f78228dc4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 10 Mar 2021 10:00:45 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/20xxx/CVE-2021-20667.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20668.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20669.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20670.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20671.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20672.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20673.json | 11 ++++++++--- 2021/28xxx/CVE-2021-28125.json | 18 ++++++++++++++++++ 8 files changed, 74 insertions(+), 21 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28125.json diff --git a/2021/20xxx/CVE-2021-20667.json b/2021/20xxx/CVE-2021-20667.json index a56ea114ee1..adcd30c7bb3 100644 --- a/2021/20xxx/CVE-2021-20667.json +++ b/2021/20xxx/CVE-2021-20667.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20667", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94889258/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20668.json b/2021/20xxx/CVE-2021-20668.json index 223e5f12a4b..4eb0dbde09a 100644 --- a/2021/20xxx/CVE-2021-20668.json +++ b/2021/20xxx/CVE-2021-20668.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20668", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94889258/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20669.json b/2021/20xxx/CVE-2021-20669.json index aeb87508082..ac87d9e4797 100644 --- a/2021/20xxx/CVE-2021-20669.json +++ b/2021/20xxx/CVE-2021-20669.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20669", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94889258/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20670.json b/2021/20xxx/CVE-2021-20670.json index 4b06bf19cd9..b0de98bcbf3 100644 --- a/2021/20xxx/CVE-2021-20670.json +++ b/2021/20xxx/CVE-2021-20670.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20670", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94889258/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20671.json b/2021/20xxx/CVE-2021-20671.json index 4d0d2529296..b021f16fa42 100644 --- a/2021/20xxx/CVE-2021-20671.json +++ b/2021/20xxx/CVE-2021-20671.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20671", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" + "url": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/08/vulnerability/growi-prevent-multiple-xss/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94889258/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94889258/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20672.json b/2021/20xxx/CVE-2021-20672.json index 2a462a02215..d17eca9a108 100644 --- a/2021/20xxx/CVE-2021-20672.json +++ b/2021/20xxx/CVE-2021-20672.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20672", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/" + "url": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/" }, { - "url": "https://jvn.jp/en/jp/JVN86438134/index.html" + "url": "https://jvn.jp/en/jp/JVN86438134/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN86438134/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20673.json b/2021/20xxx/CVE-2021-20673.json index ae5827bd42c..02e9622be30 100644 --- a/2021/20xxx/CVE-2021-20673.json +++ b/2021/20xxx/CVE-2021-20673.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20673", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/" + "url": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/", + "refsource": "MISC", + "name": "https://weseek.co.jp/security/2021/03/09/vulnerability/growi-prevent-xss5/" }, { - "url": "https://jvn.jp/en/jp/JVN86438134/index.html" + "url": "https://jvn.jp/en/jp/JVN86438134/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN86438134/index.html" } ] }, diff --git a/2021/28xxx/CVE-2021-28125.json b/2021/28xxx/CVE-2021-28125.json new file mode 100644 index 00000000000..6cdc3fac565 --- /dev/null +++ b/2021/28xxx/CVE-2021-28125.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28125", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file