From da19c390404a9bc90a0a220e14c3708dd1198202 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 27 Oct 2021 22:01:21 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/14xxx/CVE-2020-14273.json | 13 +++++-------- 2021/30xxx/CVE-2021-30846.json | 5 +++++ 2021/30xxx/CVE-2021-30848.json | 5 +++++ 2021/30xxx/CVE-2021-30849.json | 5 +++++ 2021/43xxx/CVE-2021-43046.json | 18 ++++++++++++++++++ 2021/43xxx/CVE-2021-43047.json | 18 ++++++++++++++++++ 2021/43xxx/CVE-2021-43048.json | 18 ++++++++++++++++++ 2021/43xxx/CVE-2021-43049.json | 18 ++++++++++++++++++ 2021/43xxx/CVE-2021-43050.json | 18 ++++++++++++++++++ 2021/43xxx/CVE-2021-43051.json | 18 ++++++++++++++++++ 2021/43xxx/CVE-2021-43052.json | 18 ++++++++++++++++++ 2021/43xxx/CVE-2021-43053.json | 18 ++++++++++++++++++ 2021/43xxx/CVE-2021-43054.json | 18 ++++++++++++++++++ 2021/43xxx/CVE-2021-43055.json | 18 ++++++++++++++++++ 14 files changed, 200 insertions(+), 8 deletions(-) create mode 100644 2021/43xxx/CVE-2021-43046.json create mode 100644 2021/43xxx/CVE-2021-43047.json create mode 100644 2021/43xxx/CVE-2021-43048.json create mode 100644 2021/43xxx/CVE-2021-43049.json create mode 100644 2021/43xxx/CVE-2021-43050.json create mode 100644 2021/43xxx/CVE-2021-43051.json create mode 100644 2021/43xxx/CVE-2021-43052.json create mode 100644 2021/43xxx/CVE-2021-43053.json create mode 100644 2021/43xxx/CVE-2021-43054.json create mode 100644 2021/43xxx/CVE-2021-43055.json diff --git a/2020/14xxx/CVE-2020-14273.json b/2020/14xxx/CVE-2020-14273.json index 091be9d9e31..303590aad58 100644 --- a/2020/14xxx/CVE-2020-14273.json +++ b/2020/14xxx/CVE-2020-14273.json @@ -11,7 +11,7 @@ "vendor": { "vendor_data": [ { - "vendor_name": "HCL Software", + "vendor_name": "n/a", "product": { "product_data": [ { @@ -19,10 +19,7 @@ "version": { "version_data": [ { - "version_value": "v10" - }, - { - "version_value": "v11" + "version_value": "v10, v11" } ] } @@ -39,7 +36,7 @@ "description": [ { "lang": "eng", - "value": "\"Denial of Service\"" + "value": "Denial of Service" } ] } @@ -48,7 +45,7 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", + "refsource": "MISC", "name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0085947", "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0085947" } @@ -58,7 +55,7 @@ "description_data": [ { "lang": "eng", - "value": "HCL Domino v10 and v11 is susceptible to a Denial of Service (DoS) vulnerability due to insufficient validation of input to its public API. An unauthenticated attacker could could exploit this vulnerability to crash the Domino server." + "value": "HCL Domino is susceptible to a Denial of Service (DoS) vulnerability due to insufficient validation of input to its public API. An unauthenticated attacker could could exploit this vulnerability to crash the Domino server." } ] } diff --git a/2021/30xxx/CVE-2021-30846.json b/2021/30xxx/CVE-2021-30846.json index d97b7b0cce5..1db39743ecd 100644 --- a/2021/30xxx/CVE-2021-30846.json +++ b/2021/30xxx/CVE-2021-30846.json @@ -148,6 +148,11 @@ "refsource": "FULLDISC", "name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15", "url": "http://seclists.org/fulldisclosure/2021/Oct/61" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", + "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4" } ] }, diff --git a/2021/30xxx/CVE-2021-30848.json b/2021/30xxx/CVE-2021-30848.json index 117c43dd340..d09cb12c290 100644 --- a/2021/30xxx/CVE-2021-30848.json +++ b/2021/30xxx/CVE-2021-30848.json @@ -106,6 +106,11 @@ "refsource": "FULLDISC", "name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15", "url": "http://seclists.org/fulldisclosure/2021/Oct/61" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", + "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4" } ] }, diff --git a/2021/30xxx/CVE-2021-30849.json b/2021/30xxx/CVE-2021-30849.json index 7697c314f74..1d16ee5e0e4 100644 --- a/2021/30xxx/CVE-2021-30849.json +++ b/2021/30xxx/CVE-2021-30849.json @@ -164,6 +164,11 @@ "refsource": "FULLDISC", "name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15", "url": "http://seclists.org/fulldisclosure/2021/Oct/61" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", + "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4" } ] }, diff --git a/2021/43xxx/CVE-2021-43046.json b/2021/43xxx/CVE-2021-43046.json new file mode 100644 index 00000000000..f47affda478 --- /dev/null +++ b/2021/43xxx/CVE-2021-43046.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43046", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43047.json b/2021/43xxx/CVE-2021-43047.json new file mode 100644 index 00000000000..84a466b598b --- /dev/null +++ b/2021/43xxx/CVE-2021-43047.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43047", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43048.json b/2021/43xxx/CVE-2021-43048.json new file mode 100644 index 00000000000..20437bbfef0 --- /dev/null +++ b/2021/43xxx/CVE-2021-43048.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43048", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43049.json b/2021/43xxx/CVE-2021-43049.json new file mode 100644 index 00000000000..2b368f3ab8b --- /dev/null +++ b/2021/43xxx/CVE-2021-43049.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43049", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43050.json b/2021/43xxx/CVE-2021-43050.json new file mode 100644 index 00000000000..04abf69a958 --- /dev/null +++ b/2021/43xxx/CVE-2021-43050.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43050", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43051.json b/2021/43xxx/CVE-2021-43051.json new file mode 100644 index 00000000000..10a7ac12cb7 --- /dev/null +++ b/2021/43xxx/CVE-2021-43051.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43051", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43052.json b/2021/43xxx/CVE-2021-43052.json new file mode 100644 index 00000000000..7df5aeabcc5 --- /dev/null +++ b/2021/43xxx/CVE-2021-43052.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43052", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43053.json b/2021/43xxx/CVE-2021-43053.json new file mode 100644 index 00000000000..14c8614c72f --- /dev/null +++ b/2021/43xxx/CVE-2021-43053.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43053", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43054.json b/2021/43xxx/CVE-2021-43054.json new file mode 100644 index 00000000000..a46e55b09da --- /dev/null +++ b/2021/43xxx/CVE-2021-43054.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43054", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/43xxx/CVE-2021-43055.json b/2021/43xxx/CVE-2021-43055.json new file mode 100644 index 00000000000..2e5af7c56ec --- /dev/null +++ b/2021/43xxx/CVE-2021-43055.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-43055", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file