"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-04-26 01:00:49 +00:00
parent aecd011a3c
commit f7ffb4acb0
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
11 changed files with 85 additions and 32 deletions

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20680",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://jpn.nec.com/security-info/secinfo/nv21-008.html"
"url": "https://jpn.nec.com/security-info/secinfo/nv21-008.html",
"refsource": "MISC",
"name": "https://jpn.nec.com/security-info/secinfo/nv21-008.html"
},
{
"url": "https://jvn.jp/en/jp/JVN67456944/index.html"
"url": "https://jvn.jp/en/jp/JVN67456944/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN67456944/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20693",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,7 +45,9 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN54025691/index.html"
"url": "https://jvn.jp/en/jp/JVN54025691/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN54025691/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20694",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
"refsource": "MISC",
"name": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20695",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
"refsource": "MISC",
"name": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20696",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
"refsource": "MISC",
"name": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20697",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
"url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html",
"refsource": "MISC",
"name": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
"url": "https://jvn.jp/en/vu/JVNVU92898656/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU92898656/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20708",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
"refsource": "MISC",
"name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
},
{
"url": "https://jvn.jp/en/jp/JVN29739718/index.html"
"url": "https://jvn.jp/en/jp/JVN29739718/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN29739718/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20709",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
"refsource": "MISC",
"name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
},
{
"url": "https://jvn.jp/en/jp/JVN29739718/index.html"
"url": "https://jvn.jp/en/jp/JVN29739718/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN29739718/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20710",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
"refsource": "MISC",
"name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
},
{
"url": "https://jvn.jp/en/jp/JVN29739718/index.html"
"url": "https://jvn.jp/en/jp/JVN29739718/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN29739718/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20711",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
"refsource": "MISC",
"name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
},
{
"url": "https://jvn.jp/en/jp/JVN29739718/index.html"
"url": "https://jvn.jp/en/jp/JVN29739718/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN29739718/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-20712",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
"url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html",
"refsource": "MISC",
"name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html"
},
{
"url": "https://jvn.jp/en/jp/JVN29739718/index.html"
"url": "https://jvn.jp/en/jp/JVN29739718/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN29739718/index.html"
}
]
},