mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 19:17:10 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5ec78620eb
commit
041da13ead
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "PSIRT@hcl.com",
|
||||
"ASSIGNER": "psirt@hcl.com",
|
||||
"DATE_PUBLIC": "2022-04-05T00:00:00.000Z",
|
||||
"ID": "CVE-2021-27751",
|
||||
"STATE": "PUBLIC",
|
||||
@ -80,12 +80,13 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097650"
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097650",
|
||||
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097650"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
||||
}
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "PSIRT@hcl.com",
|
||||
"ASSIGNER": "psirt@hcl.com",
|
||||
"DATE_PUBLIC": "2022-04-28T00:00:00.000Z",
|
||||
"ID": "CVE-2021-27758",
|
||||
"STATE": "PUBLIC"
|
||||
@ -38,7 +38,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "There is a security vulnerability in login form related to Cross-site Request Forgery which prevents user to login after attacker spam to login and system blocked victim's account.\n"
|
||||
"value": "There is a security vulnerability in login form related to Cross-site Request Forgery which prevents user to login after attacker spam to login and system blocked victim's account."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -76,13 +76,13 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006"
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006",
|
||||
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
||||
|
||||
}
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "PSIRT@hcl.com",
|
||||
"ASSIGNER": "psirt@hcl.com",
|
||||
"DATE_PUBLIC": "2022-04-28T00:00:00.000Z",
|
||||
"ID": "CVE-2021-27759",
|
||||
"STATE": "PUBLIC"
|
||||
@ -38,7 +38,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "This vulnerability arises because the application allows the user to perform some sensitive action without verifying that the request was sent intentionally. An attacker can cause a victim's browser to emit an HTTP request to an arbitrary URL in the application.\n"
|
||||
"value": "This vulnerability arises because the application allows the user to perform some sensitive action without verifying that the request was sent intentionally. An attacker can cause a victim's browser to emit an HTTP request to an arbitrary URL in the application."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -76,12 +76,13 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006"
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006",
|
||||
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098006"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
||||
}
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "PSIRT@hcl.com",
|
||||
"ASSIGNER": "psirt@hcl.com",
|
||||
"DATE_PUBLIC": "2022-04-11T00:00:00.000Z",
|
||||
"ID": "CVE-2021-27760",
|
||||
"STATE": "PUBLIC",
|
||||
@ -36,7 +36,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": " An issue was discovered in the Sametime chat feature in the Notes 11.0 - 11.0.1 FP4 clients. An authenticated Sametime chat user could cause Remote Code Execution on another chat client by sending a specially formatted message through chat containing Javascript code."
|
||||
"value": "An issue was discovered in the Sametime chat feature in the Notes 11.0 - 11.0.1 FP4 clients. An authenticated Sametime chat user could cause Remote Code Execution on another chat client by sending a specially formatted message through chat containing Javascript code."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -74,12 +74,13 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097670"
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097670",
|
||||
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097670"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
||||
}
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "PSIRT@hcl.com",
|
||||
"ASSIGNER": "psirt@hcl.com",
|
||||
"DATE_PUBLIC": "2022-04-21T00:00:00.000Z",
|
||||
"ID": "CVE-2021-27761",
|
||||
"STATE": "PUBLIC",
|
||||
@ -36,7 +36,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Weak web transport security (Weak TLS): An attacker may be able to decrypt the data using attacks\n"
|
||||
"value": "Weak web transport security (Weak TLS): An attacker may be able to decrypt the data using attacks"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -74,12 +74,13 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116",
|
||||
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
||||
}
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "PSIRT@hcl.com",
|
||||
"ASSIGNER": "psirt@hcl.com",
|
||||
"DATE_PUBLIC": "2022-04-21T00:00:00.000Z",
|
||||
"ID": "CVE-2021-27762",
|
||||
"STATE": "PUBLIC",
|
||||
@ -36,7 +36,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Misconfigured security-related HTTP headers: Several security-related headers were missing or mis-configured on the web responses\n"
|
||||
"value": "Misconfigured security-related HTTP headers: Several security-related headers were missing or mis-configured on the web responses"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -74,12 +74,13 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116",
|
||||
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
||||
}
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "PSIRT@hcl.com",
|
||||
"ASSIGNER": "psirt@hcl.com",
|
||||
"DATE_PUBLIC": "2022-04-07T00:00:00.000Z",
|
||||
"ID": "CVE-2021-27764",
|
||||
"STATE": "PUBLIC",
|
||||
@ -74,12 +74,13 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097778coo"
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097778coo",
|
||||
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097778coo"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
||||
}
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "PSIRT@hcl.com",
|
||||
"ASSIGNER": "psirt@hcl.com",
|
||||
"DATE_PUBLIC": "2022-04-21T00:00:00.000Z",
|
||||
"ID": "CVE-2021-27765",
|
||||
"STATE": "PUBLIC",
|
||||
@ -42,7 +42,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The BigFix Server API installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation.\nThis vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed.\n"
|
||||
"value": "The BigFix Server API installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation. This vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -80,12 +80,13 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116",
|
||||
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
||||
}
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "PSIRT@hcl.com",
|
||||
"ASSIGNER": "psirt@hcl.com",
|
||||
"DATE_PUBLIC": "2022-04-21T00:00:00.000Z",
|
||||
"ID": "CVE-2021-27766",
|
||||
"STATE": "PUBLIC",
|
||||
@ -42,7 +42,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The BigFix Client installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation.\nThis vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed.\n"
|
||||
"value": "The BigFix Client installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation. This vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -80,12 +80,13 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116",
|
||||
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
||||
}
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "PSIRT@hcl.com",
|
||||
"ASSIGNER": "psirt@hcl.com",
|
||||
"DATE_PUBLIC": "2022-04-21T00:00:00.000Z",
|
||||
"ID": "CVE-2021-27767",
|
||||
"STATE": "PUBLIC",
|
||||
@ -42,7 +42,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The BigFix Console installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation.\nThis vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed.\n"
|
||||
"value": "The BigFix Console installer is created with InstallShield, which was affected by CVE-2021-41526, a vulnerability that could allow a local user to perform a privilege escalation. This vulnerability was resolved by updating to an InstallShield version with the underlying vulnerability fixed."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -80,12 +80,13 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116",
|
||||
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098116"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "UNKNOWN"
|
||||
}
|
||||
}
|
||||
}
|
18
2022/1xxx/CVE-2022-1614.json
Normal file
18
2022/1xxx/CVE-2022-1614.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-1614",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/30xxx/CVE-2022-30312.json
Normal file
18
2022/30xxx/CVE-2022-30312.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-30312",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/30xxx/CVE-2022-30313.json
Normal file
18
2022/30xxx/CVE-2022-30313.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-30313",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/30xxx/CVE-2022-30314.json
Normal file
18
2022/30xxx/CVE-2022-30314.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-30314",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/30xxx/CVE-2022-30315.json
Normal file
18
2022/30xxx/CVE-2022-30315.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-30315",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/30xxx/CVE-2022-30316.json
Normal file
18
2022/30xxx/CVE-2022-30316.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-30316",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/30xxx/CVE-2022-30317.json
Normal file
18
2022/30xxx/CVE-2022-30317.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-30317",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/30xxx/CVE-2022-30318.json
Normal file
18
2022/30xxx/CVE-2022-30318.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-30318",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/30xxx/CVE-2022-30319.json
Normal file
18
2022/30xxx/CVE-2022-30319.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-30319",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2022/30xxx/CVE-2022-30320.json
Normal file
18
2022/30xxx/CVE-2022-30320.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2022-30320",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user