mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
aecd011a3c
commit
f7ffb4acb0
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-20680",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv21-008.html"
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv21-008.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jpn.nec.com/security-info/secinfo/nv21-008.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN67456944/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN67456944/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN67456944/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-20693",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,7 +45,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN54025691/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN54025691/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN54025691/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-20694",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
|
||||
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
|
||||
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-20695",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
|
||||
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
|
||||
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-20696",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
|
||||
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
|
||||
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-20697",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
|
||||
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
|
||||
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-20708",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN29739718/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN29739718/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN29739718/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-20709",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN29739718/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN29739718/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN29739718/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-20710",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN29739718/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN29739718/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN29739718/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-20711",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN29739718/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN29739718/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN29739718/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-20712",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
|
||||
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN29739718/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN29739718/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN29739718/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user