diff --git a/2021/20xxx/CVE-2021-20747.json b/2021/20xxx/CVE-2021-20747.json index b05610510ea..f433d5fa867 100644 --- a/2021/20xxx/CVE-2021-20747.json +++ b/2021/20xxx/CVE-2021-20747.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20747", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://drive.google.com/file/d/1PBYqIsK8QxEEhGJ4SEgpY7iZw3RTTDho/view" + "url": "https://drive.google.com/file/d/1PBYqIsK8QxEEhGJ4SEgpY7iZw3RTTDho/view", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1PBYqIsK8QxEEhGJ4SEgpY7iZw3RTTDho/view" }, { - "url": "https://jvn.jp/en/jp/JVN26891339/index.html" + "url": "https://jvn.jp/en/jp/JVN26891339/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN26891339/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20748.json b/2021/20xxx/CVE-2021-20748.json index b8f001f1db6..817a6d92a16 100644 --- a/2021/20xxx/CVE-2021-20748.json +++ b/2021/20xxx/CVE-2021-20748.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20748", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://drive.google.com/file/d/1PBYqIsK8QxEEhGJ4SEgpY7iZw3RTTDho/view" + "url": "https://drive.google.com/file/d/1PBYqIsK8QxEEhGJ4SEgpY7iZw3RTTDho/view", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1PBYqIsK8QxEEhGJ4SEgpY7iZw3RTTDho/view" }, { - "url": "https://jvn.jp/en/jp/JVN26891339/index.html" + "url": "https://jvn.jp/en/jp/JVN26891339/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN26891339/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20781.json b/2021/20xxx/CVE-2021-20781.json index e6eaf4dd7d9..3373a490b84 100644 --- a/2021/20xxx/CVE-2021-20781.json +++ b/2021/20xxx/CVE-2021-20781.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20781", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,13 +45,19 @@ "references": { "reference_data": [ { - "url": "https://wp-filter.com/update-v-2-2-8-v-1-2-8/" + "url": "https://wp-filter.com/update-v-2-2-8-v-1-2-8/", + "refsource": "MISC", + "name": "https://wp-filter.com/update-v-2-2-8-v-1-2-8/" }, { - "url": "https://wp-filter.com/" + "url": "https://wp-filter.com/", + "refsource": "MISC", + "name": "https://wp-filter.com/" }, { - "url": "https://jvn.jp/en/jp/JVN48413554/index.html" + "url": "https://jvn.jp/en/jp/JVN48413554/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN48413554/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20782.json b/2021/20xxx/CVE-2021-20782.json index 50cea71fe66..77fb70ca206 100644 --- a/2021/20xxx/CVE-2021-20782.json +++ b/2021/20xxx/CVE-2021-20782.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20782", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,13 +45,19 @@ "references": { "reference_data": [ { - "url": "https://wordpress.org/plugins/software-license-manager/" + "url": "https://wordpress.org/plugins/software-license-manager/", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/software-license-manager/" }, { - "url": "https://www.tipsandtricks-hq.com/software-license-manager-plugin-for-wordpress" + "url": "https://www.tipsandtricks-hq.com/software-license-manager-plugin-for-wordpress", + "refsource": "MISC", + "name": "https://www.tipsandtricks-hq.com/software-license-manager-plugin-for-wordpress" }, { - "url": "https://jvn.jp/en/jp/JVN89054582/index.html" + "url": "https://jvn.jp/en/jp/JVN89054582/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN89054582/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20784.json b/2021/20xxx/CVE-2021-20784.json index 493b595ae43..852ad984b20 100644 --- a/2021/20xxx/CVE-2021-20784.json +++ b/2021/20xxx/CVE-2021-20784.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20784", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,13 +45,19 @@ "references": { "reference_data": [ { - "url": "https://www.voidtools.com/downloads/" + "url": "https://www.voidtools.com/downloads/", + "refsource": "MISC", + "name": "https://www.voidtools.com/downloads/" }, { - "url": "https://www.voidtools.com/" + "url": "https://www.voidtools.com/", + "refsource": "MISC", + "name": "https://www.voidtools.com/" }, { - "url": "https://jvn.jp/en/jp/JVN68971465/index.html" + "url": "https://jvn.jp/en/jp/JVN68971465/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN68971465/index.html" } ] },