diff --git a/2021/20xxx/CVE-2021-20684.json b/2021/20xxx/CVE-2021-20684.json index 086ac88bb0e..1f48f4f51dc 100644 --- a/2021/20xxx/CVE-2021-20684.json +++ b/2021/20xxx/CVE-2021-20684.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20684", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN97370614/index.html" + "url": "https://jvn.jp/en/jp/JVN97370614/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN97370614/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20685.json b/2021/20xxx/CVE-2021-20685.json index 424011548e0..e86e19e3385 100644 --- a/2021/20xxx/CVE-2021-20685.json +++ b/2021/20xxx/CVE-2021-20685.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20685", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN12559271/index.html" + "url": "https://jvn.jp/en/jp/JVN12559271/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN12559271/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20686.json b/2021/20xxx/CVE-2021-20686.json index 4bced418e95..cb051bd32c8 100644 --- a/2021/20xxx/CVE-2021-20686.json +++ b/2021/20xxx/CVE-2021-20686.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20686", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN42220311/index.html" + "url": "https://jvn.jp/en/jp/JVN42220311/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN42220311/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20687.json b/2021/20xxx/CVE-2021-20687.json index aaf1ea8cafa..88e9f2833a5 100644 --- a/2021/20xxx/CVE-2021-20687.json +++ b/2021/20xxx/CVE-2021-20687.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20687", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN11438679/index.html" + "url": "https://jvn.jp/en/jp/JVN11438679/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN11438679/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20688.json b/2021/20xxx/CVE-2021-20688.json index a3eedd02993..68cf4e6804e 100644 --- a/2021/20xxx/CVE-2021-20688.json +++ b/2021/20xxx/CVE-2021-20688.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20688", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN93207949/index.html" + "url": "https://jvn.jp/en/jp/JVN93207949/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN93207949/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20689.json b/2021/20xxx/CVE-2021-20689.json index d1aab01be0c..d222feee452 100644 --- a/2021/20xxx/CVE-2021-20689.json +++ b/2021/20xxx/CVE-2021-20689.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20689", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN37179202/index.html" + "url": "https://jvn.jp/en/jp/JVN37179202/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN37179202/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20690.json b/2021/20xxx/CVE-2021-20690.json index d7ef91e7bd9..b013fd7da24 100644 --- a/2021/20xxx/CVE-2021-20690.json +++ b/2021/20xxx/CVE-2021-20690.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20690", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN83042295/index.html" + "url": "https://jvn.jp/en/jp/JVN83042295/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN83042295/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20691.json b/2021/20xxx/CVE-2021-20691.json index a1d1acc91ec..4dcdf65cc40 100644 --- a/2021/20xxx/CVE-2021-20691.json +++ b/2021/20xxx/CVE-2021-20691.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20691", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,7 +45,9 @@ "references": { "reference_data": [ { - "url": "https://jvn.jp/en/jp/JVN94705238/index.html" + "url": "https://jvn.jp/en/jp/JVN94705238/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN94705238/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20692.json b/2021/20xxx/CVE-2021-20692.json index ed54190db26..93f5e356be2 100644 --- a/2021/20xxx/CVE-2021-20692.json +++ b/2021/20xxx/CVE-2021-20692.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20692", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "http://www.eikisoft.com/release01.html" + "url": "http://www.eikisoft.com/release01.html", + "refsource": "MISC", + "name": "http://www.eikisoft.com/release01.html" }, { - "url": "https://jvn.jp/en/jp/JVN73236007/index.html" + "url": "https://jvn.jp/en/jp/JVN73236007/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN73236007/index.html" } ] }, diff --git a/2021/30xxx/CVE-2021-30179.json b/2021/30xxx/CVE-2021-30179.json new file mode 100644 index 00000000000..eb44ea6d18f --- /dev/null +++ b/2021/30xxx/CVE-2021-30179.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30179", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30180.json b/2021/30xxx/CVE-2021-30180.json new file mode 100644 index 00000000000..823ebf30602 --- /dev/null +++ b/2021/30xxx/CVE-2021-30180.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30180", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/30xxx/CVE-2021-30181.json b/2021/30xxx/CVE-2021-30181.json new file mode 100644 index 00000000000..d563e64ad23 --- /dev/null +++ b/2021/30xxx/CVE-2021-30181.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-30181", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file