From ff700b106eeba0fdecdbc77c4b962f685da2722e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 1 Dec 2021 03:01:06 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/20xxx/CVE-2021-20847.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20851.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20852.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20853.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20854.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20855.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20856.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20857.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20858.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20859.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20860.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20861.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20862.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20863.json | 11 ++++++++--- 2021/20xxx/CVE-2021-20864.json | 11 ++++++++--- 2021/43xxx/CVE-2021-43358.json | 5 +++-- 2021/43xxx/CVE-2021-43359.json | 5 +++-- 2021/43xxx/CVE-2021-43360.json | 7 ++++--- 18 files changed, 130 insertions(+), 52 deletions(-) diff --git a/2021/20xxx/CVE-2021-20847.json b/2021/20xxx/CVE-2021-20847.json index db39541ecdd..77de364cc73 100644 --- a/2021/20xxx/CVE-2021-20847.json +++ b/2021/20xxx/CVE-2021-20847.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20847", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.nttdocomo.co.jp/support/product_update/sh52a/index.html" + "url": "https://www.nttdocomo.co.jp/support/product_update/sh52a/index.html", + "refsource": "MISC", + "name": "https://www.nttdocomo.co.jp/support/product_update/sh52a/index.html" }, { - "url": "https://jvn.jp/en/jp/JVN19482703/index.html" + "url": "https://jvn.jp/en/jp/JVN19482703/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN19482703/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20851.json b/2021/20xxx/CVE-2021-20851.json index 92f9a36a2a2..f8ffd661974 100644 --- a/2021/20xxx/CVE-2021-20851.json +++ b/2021/20xxx/CVE-2021-20851.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20851", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://wordpress.org/plugins/browser-and-operating-system-finder/" + "url": "https://wordpress.org/plugins/browser-and-operating-system-finder/", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/browser-and-operating-system-finder/" }, { - "url": "https://jvn.jp/en/jp/JVN93562098/index.html" + "url": "https://jvn.jp/en/jp/JVN93562098/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN93562098/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20852.json b/2021/20xxx/CVE-2021-20852.json index a77465f89b9..356f881e0e1 100644 --- a/2021/20xxx/CVE-2021-20852.json +++ b/2021/20xxx/CVE-2021-20852.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20852", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20211130-01/" + "url": "https://www.elecom.co.jp/news/security/20211130-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20211130-01/" }, { - "url": "https://jvn.jp/en/jp/JVN88993473/index.html" + "url": "https://jvn.jp/en/jp/JVN88993473/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN88993473/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20853.json b/2021/20xxx/CVE-2021-20853.json index b037640b4ad..9b630d3959c 100644 --- a/2021/20xxx/CVE-2021-20853.json +++ b/2021/20xxx/CVE-2021-20853.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20853", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20211130-01/" + "url": "https://www.elecom.co.jp/news/security/20211130-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20211130-01/" }, { - "url": "https://jvn.jp/en/jp/JVN88993473/index.html" + "url": "https://jvn.jp/en/jp/JVN88993473/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN88993473/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20854.json b/2021/20xxx/CVE-2021-20854.json index d60bea34d89..ad87380a4ea 100644 --- a/2021/20xxx/CVE-2021-20854.json +++ b/2021/20xxx/CVE-2021-20854.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20854", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20211130-01/" + "url": "https://www.elecom.co.jp/news/security/20211130-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20211130-01/" }, { - "url": "https://jvn.jp/en/jp/JVN88993473/index.html" + "url": "https://jvn.jp/en/jp/JVN88993473/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN88993473/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20855.json b/2021/20xxx/CVE-2021-20855.json index 3c20249b187..7283f317e5e 100644 --- a/2021/20xxx/CVE-2021-20855.json +++ b/2021/20xxx/CVE-2021-20855.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20855", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20211130-01/" + "url": "https://www.elecom.co.jp/news/security/20211130-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20211130-01/" }, { - "url": "https://jvn.jp/en/jp/JVN88993473/index.html" + "url": "https://jvn.jp/en/jp/JVN88993473/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN88993473/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20856.json b/2021/20xxx/CVE-2021-20856.json index 5cb51d44bfd..c046a41b150 100644 --- a/2021/20xxx/CVE-2021-20856.json +++ b/2021/20xxx/CVE-2021-20856.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20856", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20211130-01/" + "url": "https://www.elecom.co.jp/news/security/20211130-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20211130-01/" }, { - "url": "https://jvn.jp/en/jp/JVN88993473/index.html" + "url": "https://jvn.jp/en/jp/JVN88993473/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN88993473/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20857.json b/2021/20xxx/CVE-2021-20857.json index db7bba96484..76c34ee17eb 100644 --- a/2021/20xxx/CVE-2021-20857.json +++ b/2021/20xxx/CVE-2021-20857.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20857", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20211130-01/" + "url": "https://www.elecom.co.jp/news/security/20211130-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20211130-01/" }, { - "url": "https://jvn.jp/en/jp/JVN88993473/index.html" + "url": "https://jvn.jp/en/jp/JVN88993473/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN88993473/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20858.json b/2021/20xxx/CVE-2021-20858.json index b038f078025..26122f2c973 100644 --- a/2021/20xxx/CVE-2021-20858.json +++ b/2021/20xxx/CVE-2021-20858.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20858", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20211130-01/" + "url": "https://www.elecom.co.jp/news/security/20211130-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20211130-01/" }, { - "url": "https://jvn.jp/en/jp/JVN88993473/index.html" + "url": "https://jvn.jp/en/jp/JVN88993473/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN88993473/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20859.json b/2021/20xxx/CVE-2021-20859.json index d91306be944..7feddc8d4d3 100644 --- a/2021/20xxx/CVE-2021-20859.json +++ b/2021/20xxx/CVE-2021-20859.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20859", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20211130-01/" + "url": "https://www.elecom.co.jp/news/security/20211130-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20211130-01/" }, { - "url": "https://jvn.jp/en/jp/JVN88993473/index.html" + "url": "https://jvn.jp/en/jp/JVN88993473/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN88993473/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20860.json b/2021/20xxx/CVE-2021-20860.json index cc411a21409..c259e17a415 100644 --- a/2021/20xxx/CVE-2021-20860.json +++ b/2021/20xxx/CVE-2021-20860.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20860", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20211130-01/" + "url": "https://www.elecom.co.jp/news/security/20211130-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20211130-01/" }, { - "url": "https://jvn.jp/en/jp/JVN88993473/index.html" + "url": "https://jvn.jp/en/jp/JVN88993473/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN88993473/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20861.json b/2021/20xxx/CVE-2021-20861.json index 71c92b5d939..503f2c21c74 100644 --- a/2021/20xxx/CVE-2021-20861.json +++ b/2021/20xxx/CVE-2021-20861.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20861", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20211130-01/" + "url": "https://www.elecom.co.jp/news/security/20211130-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20211130-01/" }, { - "url": "https://jvn.jp/en/jp/JVN88993473/index.html" + "url": "https://jvn.jp/en/jp/JVN88993473/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/jp/JVN88993473/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20862.json b/2021/20xxx/CVE-2021-20862.json index 61e8d875344..65614d33b95 100644 --- a/2021/20xxx/CVE-2021-20862.json +++ b/2021/20xxx/CVE-2021-20862.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20862", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20211130-01/" + "url": "https://www.elecom.co.jp/news/security/20211130-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20211130-01/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94527926/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94527926/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94527926/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20863.json b/2021/20xxx/CVE-2021-20863.json index 4081d3f9388..c2785f2626e 100644 --- a/2021/20xxx/CVE-2021-20863.json +++ b/2021/20xxx/CVE-2021-20863.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20863", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20211130-01/" + "url": "https://www.elecom.co.jp/news/security/20211130-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20211130-01/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94527926/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94527926/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94527926/index.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20864.json b/2021/20xxx/CVE-2021-20864.json index a075b50c139..f9b918a4e86 100644 --- a/2021/20xxx/CVE-2021-20864.json +++ b/2021/20xxx/CVE-2021-20864.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-20864", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -44,10 +45,14 @@ "references": { "reference_data": [ { - "url": "https://www.elecom.co.jp/news/security/20211130-01/" + "url": "https://www.elecom.co.jp/news/security/20211130-01/", + "refsource": "MISC", + "name": "https://www.elecom.co.jp/news/security/20211130-01/" }, { - "url": "https://jvn.jp/en/vu/JVNVU94527926/index.html" + "url": "https://jvn.jp/en/vu/JVNVU94527926/index.html", + "refsource": "MISC", + "name": "https://jvn.jp/en/vu/JVNVU94527926/index.html" } ] }, diff --git a/2021/43xxx/CVE-2021-43358.json b/2021/43xxx/CVE-2021-43358.json index 613c4ade413..27aae354343 100644 --- a/2021/43xxx/CVE-2021-43358.json +++ b/2021/43xxx/CVE-2021-43358.json @@ -80,8 +80,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5353-4ebee-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5353-4ebee-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5353-4ebee-1.html" } ] }, diff --git a/2021/43xxx/CVE-2021-43359.json b/2021/43xxx/CVE-2021-43359.json index 7173efa5879..3b9478737d1 100644 --- a/2021/43xxx/CVE-2021-43359.json +++ b/2021/43xxx/CVE-2021-43359.json @@ -80,8 +80,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5354-0aac0-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5354-0aac0-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5354-0aac0-1.html" } ] }, diff --git a/2021/43xxx/CVE-2021-43360.json b/2021/43xxx/CVE-2021-43360.json index 958a5a7fcdb..e2eb6905261 100644 --- a/2021/43xxx/CVE-2021-43360.json +++ b/2021/43xxx/CVE-2021-43360.json @@ -42,7 +42,7 @@ "description_data": [ { "lang": "eng", - "value": "Sunnet eHRD e-mail delivery task schedule’s serialization function has inadequate input object validation and restriction, which allows a post-authenticated remote attacker with database access privilege, to execute arbitrary code and control the system or interrupt services." + "value": "Sunnet eHRD e-mail delivery task schedule\u2019s serialization function has inadequate input object validation and restriction, which allows a post-authenticated remote attacker with database access privilege, to execute arbitrary code and control the system or interrupt services." } ] }, @@ -80,8 +80,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-5355-6e339-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-5355-6e339-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-5355-6e339-1.html" } ] },