"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-05-06 19:01:36 +00:00
parent 5ec78620eb
commit 041da13ead
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
20 changed files with 238 additions and 49 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "PSIRT@hcl.com",
"ASSIGNER": "psirt@hcl.com",
"DATE_PUBLIC": "2022-04-05T00:00:00.000Z",
"ID": "CVE-2021-27751",
"STATE": "PUBLIC",
@ -80,12 +80,13 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097650"
"refsource": "MISC",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097650",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097650"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "PSIRT@hcl.com",
"ASSIGNER": "psirt@hcl.com",
"DATE_PUBLIC": "2022-04-28T00:00:00.000Z",
"ID": "CVE-2021-27758",
"STATE": "PUBLIC"
@ -38,7 +38,7 @@
"description_data": [
{
"lang": "eng",
"value": "There is a security vulnerability in login form related to Cross-site Request Forgery which prevents user to login after attacker spam to login and system blocked victim's account.\n"
"value": "There is a security vulnerability in login form related to Cross-site Request Forgery which prevents user to login after attacker spam to login and system blocked victim's account."
}
]
},
@ -76,13 +76,13 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006"
"refsource": "MISC",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "PSIRT@hcl.com",
"ASSIGNER": "psirt@hcl.com",
"DATE_PUBLIC": "2022-04-28T00:00:00.000Z",
"ID": "CVE-2021-27759",
"STATE": "PUBLIC"
@ -38,7 +38,7 @@
"description_data": [
{
"lang": "eng",
"value": "This vulnerability arises because the application allows the user to perform some sensitive action without verifying that the request was sent intentionally. An attacker can cause a victim's browser to emit an HTTP request to an arbitrary URL in the application.\n"
"value": "This vulnerability arises because the application allows the user to perform some sensitive action without verifying that the request was sent intentionally. An attacker can cause a victim's browser to emit an HTTP request to an arbitrary URL in the application."
}
]
},
@ -76,12 +76,13 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006"
"refsource": "MISC",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "PSIRT@hcl.com",
"ASSIGNER": "psirt@hcl.com",
"DATE_PUBLIC": "2022-04-11T00:00:00.000Z",
"ID": "CVE-2021-27760",
"STATE": "PUBLIC",
@ -36,7 +36,7 @@
"description_data": [
{
"lang": "eng",
"value": " An issue was discovered in the Sametime chat feature in the Notes 11.0 - 11.0.1 FP4 clients. An authenticated Sametime chat user could cause Remote Code Execution on another chat client by sending a specially formatted message through chat containing Javascript code."
"value": "An issue was discovered in the Sametime chat feature in the Notes 11.0 - 11.0.1 FP4 clients. An authenticated Sametime chat user could cause Remote Code Execution on another chat client by sending a specially formatted message through chat containing Javascript code."
}
]
},
@ -74,12 +74,13 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097670"
"refsource": "MISC",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097670",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097670"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "PSIRT@hcl.com",
"ASSIGNER": "psirt@hcl.com",
"DATE_PUBLIC": "2022-04-21T00:00:00.000Z",
"ID": "CVE-2021-27761",
"STATE": "PUBLIC",
@ -36,7 +36,7 @@
"description_data": [
{
"lang": "eng",
"value": "Weak web transport security (Weak TLS): An attacker may be able to decrypt the data using attacks\n"
"value": "Weak web transport security (Weak TLS): An attacker may be able to decrypt the data using attacks"
}
]
},
@ -74,12 +74,13 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
"refsource": "MISC",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "PSIRT@hcl.com",
"ASSIGNER": "psirt@hcl.com",
"DATE_PUBLIC": "2022-04-21T00:00:00.000Z",
"ID": "CVE-2021-27762",
"STATE": "PUBLIC",
@ -36,7 +36,7 @@
"description_data": [
{
"lang": "eng",
"value": "Misconfigured security-related HTTP headers: Several security-related headers were missing or mis-configured on the web responses\n"
"value": "Misconfigured security-related HTTP headers: Several security-related headers were missing or mis-configured on the web responses"
}
]
},
@ -74,12 +74,13 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
"refsource": "MISC",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "PSIRT@hcl.com",
"ASSIGNER": "psirt@hcl.com",
"DATE_PUBLIC": "2022-04-07T00:00:00.000Z",
"ID": "CVE-2021-27764",
"STATE": "PUBLIC",
@ -74,12 +74,13 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097778coo"
"refsource": "MISC",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097778coo",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097778coo"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "PSIRT@hcl.com",
"ASSIGNER": "psirt@hcl.com",
"DATE_PUBLIC": "2022-04-21T00:00:00.000Z",
"ID": "CVE-2021-27765",
"STATE": "PUBLIC",
@ -42,7 +42,7 @@
"description_data": [
{
"lang": "eng",
"value": "The BigFix Server API installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation.\nThis vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed.\n"
"value": "The BigFix Server API installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation. This vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed."
}
]
},
@ -80,12 +80,13 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
"refsource": "MISC",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "PSIRT@hcl.com",
"ASSIGNER": "psirt@hcl.com",
"DATE_PUBLIC": "2022-04-21T00:00:00.000Z",
"ID": "CVE-2021-27766",
"STATE": "PUBLIC",
@ -42,7 +42,7 @@
"description_data": [
{
"lang": "eng",
"value": "The BigFix Client installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation.\nThis vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed.\n"
"value": "The BigFix Client installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation. This vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed."
}
]
},
@ -80,12 +80,13 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
"refsource": "MISC",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "PSIRT@hcl.com",
"ASSIGNER": "psirt@hcl.com",
"DATE_PUBLIC": "2022-04-21T00:00:00.000Z",
"ID": "CVE-2021-27767",
"STATE": "PUBLIC",
@ -42,7 +42,7 @@
"description_data": [
{
"lang": "eng",
"value": "The BigFix Console installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation.\nThis vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed.\n"
"value": "The BigFix Console installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation. This vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed."
}
]
},
@ -80,12 +80,13 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
"refsource": "MISC",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-1614",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-30312",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-30313",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-30314",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-30315",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-30316",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-30317",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-30318",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-30319",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-30320",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}