diff --git a/2021/20xxx/CVE-2021-20680.json b/2021/20xxx/CVE-2021-20680.json index 21fbdc6cd4d..e3021921ccf 100644 --- a/2021/20xxx/CVE-2021-20680.json +++ b/2021/20xxx/CVE-2021-20680.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20680", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://jpn.nec.com/security-info/secinfo/nv21-008.html" + "url": "https://jpn.nec.com/security-info/secinfo/nv21-008.html", + "refsource": "MISC", + "name": "https://jpn.nec.com/security-info/secinfo/nv21-008.html" }, { - "url": "https://jvn.jp/en/jp/JVN67456944/index.html" + "url": "https://jvn.jp/en/jp/JVN67456944/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN67456944/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20693.json b/2021/20xxx/CVE-2021-20693.json index 36a8a33f737..5e32521e9b4 100644 --- a/2021/20xxx/CVE-2021-20693.json +++ b/2021/20xxx/CVE-2021-20693.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20693", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN54025691/index.html" + "url": "https://jvn.jp/en/jp/JVN54025691/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN54025691/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20694.json b/2021/20xxx/CVE-2021-20694.json index 79872baad0a..4ac3d23c87f 100644 --- a/2021/20xxx/CVE-2021-20694.json +++ b/2021/20xxx/CVE-2021-20694.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20694", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html" + "url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html", + "refsource": "MISC", + "name": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html" }, { - "url": "https://jvn.jp/en/vu/JVNVU92898656/index.html" + "url": "https://jvn.jp/en/vu/JVNVU92898656/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU92898656/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20695.json b/2021/20xxx/CVE-2021-20695.json index 883a44b81e2..ad582794c26 100644 --- a/2021/20xxx/CVE-2021-20695.json +++ b/2021/20xxx/CVE-2021-20695.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20695", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html" + "url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html", + "refsource": "MISC", + "name": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html" }, { - "url": "https://jvn.jp/en/vu/JVNVU92898656/index.html" + "url": "https://jvn.jp/en/vu/JVNVU92898656/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU92898656/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20696.json b/2021/20xxx/CVE-2021-20696.json index ee56fb40f59..d87dcf33af5 100644 --- a/2021/20xxx/CVE-2021-20696.json +++ b/2021/20xxx/CVE-2021-20696.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20696", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html" + "url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html", + "refsource": "MISC", + "name": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html" }, { - "url": "https://jvn.jp/en/vu/JVNVU92898656/index.html" + "url": "https://jvn.jp/en/vu/JVNVU92898656/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU92898656/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20697.json b/2021/20xxx/CVE-2021-20697.json index 08505d18c3b..977d2ce9303 100644 --- a/2021/20xxx/CVE-2021-20697.json +++ b/2021/20xxx/CVE-2021-20697.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20697", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html" + "url": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html", + "refsource": "MISC", + "name": "https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html" }, { - "url": "https://jvn.jp/en/vu/JVNVU92898656/index.html" + "url": "https://jvn.jp/en/vu/JVNVU92898656/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU92898656/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20708.json b/2021/20xxx/CVE-2021-20708.json index e1eb68e027f..3b1efdd1e9c 100644 --- a/2021/20xxx/CVE-2021-20708.json +++ b/2021/20xxx/CVE-2021-20708.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20708", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html" + "url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html", + "refsource": "MISC", + "name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html" }, { - "url": "https://jvn.jp/en/jp/JVN29739718/index.html" + "url": "https://jvn.jp/en/jp/JVN29739718/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN29739718/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20709.json b/2021/20xxx/CVE-2021-20709.json index e7b6273d19b..5c298d46b2b 100644 --- a/2021/20xxx/CVE-2021-20709.json +++ b/2021/20xxx/CVE-2021-20709.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20709", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html" + "url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html", + "refsource": "MISC", + "name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html" }, { - "url": "https://jvn.jp/en/jp/JVN29739718/index.html" + "url": "https://jvn.jp/en/jp/JVN29739718/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN29739718/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20710.json b/2021/20xxx/CVE-2021-20710.json index 96186cf932a..9da9a0a4e8d 100644 --- a/2021/20xxx/CVE-2021-20710.json +++ b/2021/20xxx/CVE-2021-20710.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20710", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html" + "url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html", + "refsource": "MISC", + "name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html" }, { - "url": "https://jvn.jp/en/jp/JVN29739718/index.html" + "url": "https://jvn.jp/en/jp/JVN29739718/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN29739718/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20711.json b/2021/20xxx/CVE-2021-20711.json index 7f8e434514b..29ba0f56103 100644 --- a/2021/20xxx/CVE-2021-20711.json +++ b/2021/20xxx/CVE-2021-20711.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20711", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html" + "url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html", + "refsource": "MISC", + "name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html" }, { - "url": "https://jvn.jp/en/jp/JVN29739718/index.html" + "url": "https://jvn.jp/en/jp/JVN29739718/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN29739718/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20712.json b/2021/20xxx/CVE-2021-20712.json index 44a06d88c82..091e4e23ada 100644 --- a/2021/20xxx/CVE-2021-20712.json +++ b/2021/20xxx/CVE-2021-20712.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20712", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html" + "url": "https://jpn.nec.com/security-info/secinfo/nv21-010.html", + "refsource": "MISC", + "name": "https://jpn.nec.com/security-info/secinfo/nv21-010.html" }, { - "url": "https://jvn.jp/en/jp/JVN29739718/index.html" + "url": "https://jvn.jp/en/jp/JVN29739718/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN29739718/index.html" } ] },