From e76166cd6278a52e67f99f16b165e7d56e863243 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 7 Jul 2021 08:01:01 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/20xxx/CVE-2021-20738.json | 13 +++++++++---- 2021/20xxx/CVE-2021-20739.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20776.json | 7 +++++-- 2021/20xxx/CVE-2021-20777.json | 7 +++++-- 2021/20xxx/CVE-2021-20779.json | 15 +++++++++++---- 2021/20xxx/CVE-2021-20780.json | 15 +++++++++++---- 6 files changed, 49 insertions(+), 19 deletions(-) diff --git a/2021/20xxx/CVE-2021-20738.json b/2021/20xxx/CVE-2021-20738.json index 215b2b6968b..598facc278a 100644 --- a/2021/20xxx/CVE-2021-20738.json +++ b/2021/20xxx/CVE-2021-20738.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20738", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20210706-01/" + "url": "https://www.elecom.co.jp/news/security/20210706-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20210706-01/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94260088/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94260088/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94260088/index.html" } ] }, @@ -59,4 +64,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2021/20xxx/CVE-2021-20739.json b/2021/20xxx/CVE-2021-20739.json index 687e384000d..c5e47e00820 100644 --- a/2021/20xxx/CVE-2021-20739.json +++ b/2021/20xxx/CVE-2021-20739.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20739", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20210706-01/" + "url": "https://www.elecom.co.jp/news/security/20210706-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20210706-01/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94260088/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94260088/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94260088/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20776.json b/2021/20xxx/CVE-2021-20776.json index 8b337390e3d..85203829ed2 100644 --- a/2021/20xxx/CVE-2021-20776.json +++ b/2021/20xxx/CVE-2021-20776.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20776", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN21636825/index.html" + "url": "https://jvn.jp/en/jp/JVN21636825/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN21636825/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20777.json b/2021/20xxx/CVE-2021-20777.json index 3dbc9d12072..81031e62a37 100644 --- a/2021/20xxx/CVE-2021-20777.json +++ b/2021/20xxx/CVE-2021-20777.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20777", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN25850723/index.html" + "url": "https://jvn.jp/en/jp/JVN25850723/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN25850723/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20779.json b/2021/20xxx/CVE-2021-20779.json index 222579b91ad..1760af2b88a 100644 --- a/2021/20xxx/CVE-2021-20779.json +++ b/2021/20xxx/CVE-2021-20779.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20779", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,13 +45,19 @@ "references": { "reference_data": [ { - "url": "https://wordpress.org/plugins/wp-html-mail/" + "url": "https://wordpress.org/plugins/wp-html-mail/", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/wp-html-mail/" }, { - "url": "https://codemiq.com/en/" + "url": "https://codemiq.com/en/", + "refsource": "MISC", + "name": "https://codemiq.com/en/" }, { - "url": "https://jvn.jp/en/jp/JVN42880365/index.html" + "url": "https://jvn.jp/en/jp/JVN42880365/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN42880365/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20780.json b/2021/20xxx/CVE-2021-20780.json index 510db1ca161..c537374be4e 100644 --- a/2021/20xxx/CVE-2021-20780.json +++ b/2021/20xxx/CVE-2021-20780.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20780", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,13 +45,19 @@ "references": { "reference_data": [ { - "url": "https://wordpress.org/plugins/currency-switcher/" + "url": "https://wordpress.org/plugins/currency-switcher/", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/currency-switcher/" }, { - "url": "https://pluginus.net/" + "url": "https://pluginus.net/", + "refsource": "MISC", + "name": "https://pluginus.net/" }, { - "url": "https://jvn.jp/en/jp/JVN91372527/index.html" + "url": "https://jvn.jp/en/jp/JVN91372527/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN91372527/index.html" } ] },