diff --git a/2002/0xxx/CVE-2002-0139.json b/2002/0xxx/CVE-2002-0139.json index 726010394ff..f44b83cdaf6 100644 --- a/2002/0xxx/CVE-2002-0139.json +++ b/2002/0xxx/CVE-2002-0139.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0139", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Pi-Soft SpoonFTP 1.1 and earlier allows remote attackers to redirect traffic to other sites (aka FTP bounce) via the PORT command." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0139", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020120 Bounce vulnerability in SpoonFTP 1.1.0.1", - "refsource" : "BUGTRAQ", - "url" : "http://online.securityfocus.com/archive/1/251422" - }, - { - "name" : "http://www.pi-soft.com/spoonftp/index.shtml", - "refsource" : "CONFIRM", - "url" : "http://www.pi-soft.com/spoonftp/index.shtml" - }, - { - "name" : "3910", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/3910" - }, - { - "name" : "spoonftp-ftp-bounce(7943)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/7943.php" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Pi-Soft SpoonFTP 1.1 and earlier allows remote attackers to redirect traffic to other sites (aka FTP bounce) via the PORT command." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://www.pi-soft.com/spoonftp/index.shtml", + "refsource": "CONFIRM", + "url": "http://www.pi-soft.com/spoonftp/index.shtml" + }, + { + "name": "3910", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/3910" + }, + { + "name": "spoonftp-ftp-bounce(7943)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/7943.php" + }, + { + "name": "20020120 Bounce vulnerability in SpoonFTP 1.1.0.1", + "refsource": "BUGTRAQ", + "url": "http://online.securityfocus.com/archive/1/251422" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0434.json b/2002/0xxx/CVE-2002-0434.json index 875d316613d..7b32596a31d 100644 --- a/2002/0xxx/CVE-2002-0434.json +++ b/2002/0xxx/CVE-2002-0434.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0434", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Marcus S. Xenakis directory.php script allows remote attackers to execute arbitrary commands via shell metacharacters in the dir parameter." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0434", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020310 Marcus S. Xenakis \"directory.php\" allows arbitrary code execution", - "refsource" : "BUGTRAQ", - "url" : "http://www.securityfocus.com/archive/1/261512" - }, - { - "name" : "4278", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/4278" - }, - { - "name" : "xenakis-directory-execute-commands(8440)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/8440.php" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Marcus S. Xenakis directory.php script allows remote attackers to execute arbitrary commands via shell metacharacters in the dir parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "4278", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/4278" + }, + { + "name": "20020310 Marcus S. Xenakis \"directory.php\" allows arbitrary code execution", + "refsource": "BUGTRAQ", + "url": "http://www.securityfocus.com/archive/1/261512" + }, + { + "name": "xenakis-directory-execute-commands(8440)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/8440.php" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0469.json b/2002/0xxx/CVE-2002-0469.json index e037d206ffe..7830f8bc1b3 100644 --- a/2002/0xxx/CVE-2002-0469.json +++ b/2002/0xxx/CVE-2002-0469.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0469", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Ecartis (formerly Listar) 1.0.0 in snapshot 20020125 and earlier does not properly drop privileges when Ecartis is installed setuid-root, \"lock-to-user\" is not set, and ecartis is called by certain MTA's, which could allow local users to gain privileges." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0469", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020310 Ecartis/Listar multiple vulnerabilities", - "refsource" : "BUGTRAQ", - "url" : "http://www.securityfocus.com/archive/1/261209" - }, - { - "name" : "4277", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/4277" - }, - { - "name" : "ecartis-root-privileges(8444)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/8444.php" - }, - { - "name" : "20020311 [VulnWatch] Ecartis/Listar multiple vulnerabilities", - "refsource" : "VULNWATCH", - "url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0063.html" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Ecartis (formerly Listar) 1.0.0 in snapshot 20020125 and earlier does not properly drop privileges when Ecartis is installed setuid-root, \"lock-to-user\" is not set, and ecartis is called by certain MTA's, which could allow local users to gain privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "ecartis-root-privileges(8444)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/8444.php" + }, + { + "name": "20020311 [VulnWatch] Ecartis/Listar multiple vulnerabilities", + "refsource": "VULNWATCH", + "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0063.html" + }, + { + "name": "20020310 Ecartis/Listar multiple vulnerabilities", + "refsource": "BUGTRAQ", + "url": "http://www.securityfocus.com/archive/1/261209" + }, + { + "name": "4277", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/4277" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0470.json b/2002/0xxx/CVE-2002-0470.json index 6c6ef3bf6f6..99911a1fddb 100644 --- a/2002/0xxx/CVE-2002-0470.json +++ b/2002/0xxx/CVE-2002-0470.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0470", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "PHPNetToolpack 0.1 relies on its environment's PATH to find and execute the traceroute program, which could allow local users to gain privileges by inserting a Trojan horse program into the search path." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0470", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020318 PHP Net Toolpack: input validation error", - "refsource" : "BUGTRAQ", - "url" : "http://seclists.org/bugtraq/2002/Mar/0263.html" - }, - { - "name" : "4304", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/4304" - }, - { - "name" : "phpnettoolpack-traceroute-insecure-path(8484)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/8484.php" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "PHPNetToolpack 0.1 relies on its environment's PATH to find and execute the traceroute program, which could allow local users to gain privileges by inserting a Trojan horse program into the search path." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20020318 PHP Net Toolpack: input validation error", + "refsource": "BUGTRAQ", + "url": "http://seclists.org/bugtraq/2002/Mar/0263.html" + }, + { + "name": "phpnettoolpack-traceroute-insecure-path(8484)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/8484.php" + }, + { + "name": "4304", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/4304" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0710.json b/2002/0xxx/CVE-2002-0710.json index 300232ba0b6..b810697ff5b 100644 --- a/2002/0xxx/CVE-2002-0710.json +++ b/2002/0xxx/CVE-2002-0710.json @@ -1,82 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0710", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Directory traversal vulnerability in sendform.cgi 1.44 and earlier allows remote attackers to read arbitrary files by specifying the desired files in the BlurbFilePath parameter." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0710", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020730 Directory traversal vulnerability in sendform.cgi", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=102809084218422&w=2" - }, - { - "name" : "http://www.scn.org/~bb615/scripts/sendform.html", - "refsource" : "CONFIRM", - "url" : "http://www.scn.org/~bb615/scripts/sendform.html" - }, - { - "name" : "sendform-blurbfile-directory-traversal(9725)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/9725.php" - }, - { - "name" : "5286", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/5286" - }, - { - "name" : "3568", - "refsource" : "OSVDB", - "url" : "http://www.osvdb.org/3568" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Directory traversal vulnerability in sendform.cgi 1.44 and earlier allows remote attackers to read arbitrary files by specifying the desired files in the BlurbFilePath parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "3568", + "refsource": "OSVDB", + "url": "http://www.osvdb.org/3568" + }, + { + "name": "http://www.scn.org/~bb615/scripts/sendform.html", + "refsource": "CONFIRM", + "url": "http://www.scn.org/~bb615/scripts/sendform.html" + }, + { + "name": "20020730 Directory traversal vulnerability in sendform.cgi", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=102809084218422&w=2" + }, + { + "name": "5286", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/5286" + }, + { + "name": "sendform-blurbfile-directory-traversal(9725)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/9725.php" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0847.json b/2002/0xxx/CVE-2002-0847.json index ca57d872c0c..2705d172524 100644 --- a/2002/0xxx/CVE-2002-0847.json +++ b/2002/0xxx/CVE-2002-0847.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0847", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "tinyproxy HTTP proxy 1.5.0, 1.4.3, and earlier allows remote attackers to execute arbitrary code via memory that is freed twice (double-free)." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0847", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "DSA-145", - "refsource" : "DEBIAN", - "url" : "https://www.debian.org/security/2002/dsa-145" - }, - { - "name" : "http://sourceforge.net/project/shownotes.php?release_id=88790", - "refsource" : "CONFIRM", - "url" : "http://sourceforge.net/project/shownotes.php?release_id=88790" - }, - { - "name" : "tinyproxy-memory-corruption(9079)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/9079.php" - }, - { - "name" : "4731", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/4731" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "tinyproxy HTTP proxy 1.5.0, 1.4.3, and earlier allows remote attackers to execute arbitrary code via memory that is freed twice (double-free)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "DSA-145", + "refsource": "DEBIAN", + "url": "https://www.debian.org/security/2002/dsa-145" + }, + { + "name": "tinyproxy-memory-corruption(9079)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/9079.php" + }, + { + "name": "http://sourceforge.net/project/shownotes.php?release_id=88790", + "refsource": "CONFIRM", + "url": "http://sourceforge.net/project/shownotes.php?release_id=88790" + }, + { + "name": "4731", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/4731" + } + ] + } +} \ No newline at end of file diff --git a/2002/1xxx/CVE-2002-1064.json b/2002/1xxx/CVE-2002-1064.json index b6ed7bcee68..411d829bed2 100644 --- a/2002/1xxx/CVE-2002-1064.json +++ b/2002/1xxx/CVE-2002-1064.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-1064", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Thomas Hauck Jana Server 2.x through 2.2.1, and 1.4.6 and earlier, generates different responses for valid and invalid usernames, which allows remote attackers to identify valid users on the server." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-1064", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020726 SECURITY.NNOV: multiple vulnerabilities in JanaServer", - "refsource" : "BUGTRAQ", - "url" : "http://archives.neohapsis.com/archives/bugtraq/2002-07/0329.html" - }, - { - "name" : "jana-pop3-bruteforce(9688)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/9688.php" - }, - { - "name" : "5326", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/5326" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Thomas Hauck Jana Server 2.x through 2.2.1, and 1.4.6 and earlier, generates different responses for valid and invalid usernames, which allows remote attackers to identify valid users on the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20020726 SECURITY.NNOV: multiple vulnerabilities in JanaServer", + "refsource": "BUGTRAQ", + "url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0329.html" + }, + { + "name": "5326", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/5326" + }, + { + "name": "jana-pop3-bruteforce(9688)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/9688.php" + } + ] + } +} \ No newline at end of file diff --git a/2002/1xxx/CVE-2002-1159.json b/2002/1xxx/CVE-2002-1159.json index ff442268d64..2a7d9046d8a 100644 --- a/2002/1xxx/CVE-2002-1159.json +++ b/2002/1xxx/CVE-2002-1159.json @@ -1,92 +1,92 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-1159", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Canna 3.6 and earlier does not properly validate requests, which allows remote attackers to cause a denial of service or information leak." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-1159", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "DSA-224", - "refsource" : "DEBIAN", - "url" : "http://www.debian.org/security/2003/dsa-224" - }, - { - "name" : "RHSA-2002:246", - "refsource" : "REDHAT", - "url" : "http://www.redhat.com/support/errata/RHSA-2002-246.html" - }, - { - "name" : "RHSA-2002:261", - "refsource" : "REDHAT", - "url" : "http://www.redhat.com/support/errata/RHSA-2002-261.html" - }, - { - "name" : "RHSA-2003:115", - "refsource" : "REDHAT", - "url" : "http://www.redhat.com/support/errata/RHSA-2003-115.html" - }, - { - "name" : "http://canna.sourceforge.jp/sec/Canna-2002-01.txt", - "refsource" : "CONFIRM", - "url" : "http://canna.sourceforge.jp/sec/Canna-2002-01.txt" - }, - { - "name" : "6354", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/6354" - }, - { - "name" : "canna-improper-request-validation(10832)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/10832" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Canna 3.6 and earlier does not properly validate requests, which allows remote attackers to cause a denial of service or information leak." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "DSA-224", + "refsource": "DEBIAN", + "url": "http://www.debian.org/security/2003/dsa-224" + }, + { + "name": "6354", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/6354" + }, + { + "name": "RHSA-2002:246", + "refsource": "REDHAT", + "url": "http://www.redhat.com/support/errata/RHSA-2002-246.html" + }, + { + "name": "RHSA-2002:261", + "refsource": "REDHAT", + "url": "http://www.redhat.com/support/errata/RHSA-2002-261.html" + }, + { + "name": "canna-improper-request-validation(10832)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10832" + }, + { + "name": "RHSA-2003:115", + "refsource": "REDHAT", + "url": "http://www.redhat.com/support/errata/RHSA-2003-115.html" + }, + { + "name": "http://canna.sourceforge.jp/sec/Canna-2002-01.txt", + "refsource": "CONFIRM", + "url": "http://canna.sourceforge.jp/sec/Canna-2002-01.txt" + } + ] + } +} \ No newline at end of file diff --git a/2002/1xxx/CVE-2002-1617.json b/2002/1xxx/CVE-2002-1617.json index 821522c4044..c76e8575cc9 100644 --- a/2002/1xxx/CVE-2002-1617.json +++ b/2002/1xxx/CVE-2002-1617.json @@ -1,112 +1,112 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-1617", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Multiple buffer overflows in HP Tru64 UNIX 5.x allow local users to execute arbitrary code via (1) a long -contextDir argument to dtaction, (2) a long -p argument to dtprintinfo, (3) a long -customization argument to dxterm, or (4) a long DISPLAY environment variable to dtterm." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-1617", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020902 Happy Labor Day from Snosoft", - "refsource" : "BUGTRAQ", - "url" : "http://www.securityfocus.com/archive/1/290115" - }, - { - "name" : "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification", - "refsource" : "FULLDISC", - "url" : "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html" - }, - { - "name" : "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification", - "refsource" : "BUGTRAQ", - "url" : "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html" - }, - { - "name" : "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dxterm.txt", - "refsource" : "MISC", - "url" : "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dxterm.txt" - }, - { - "name" : "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtterm.txt", - "refsource" : "MISC", - "url" : "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtterm.txt" - }, - { - "name" : "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtprintinfo.txt", - "refsource" : "MISC", - "url" : "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtprintinfo.txt" - }, - { - "name" : "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtaction.txt", - "refsource" : "MISC", - "url" : "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtaction.txt" - }, - { - "name" : "VU#836275", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/836275" - }, - { - "name" : "VU#600699", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/600699" - }, - { - "name" : "VU#931579", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/931579" - }, - { - "name" : "VU#202939", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/202939" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Multiple buffer overflows in HP Tru64 UNIX 5.x allow local users to execute arbitrary code via (1) a long -contextDir argument to dtaction, (2) a long -p argument to dtprintinfo, (3) a long -customization argument to dxterm, or (4) a long DISPLAY environment variable to dtterm." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification", + "refsource": "FULLDISC", + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html" + }, + { + "name": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtterm.txt", + "refsource": "MISC", + "url": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtterm.txt" + }, + { + "name": "VU#931579", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/931579" + }, + { + "name": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtprintinfo.txt", + "refsource": "MISC", + "url": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtprintinfo.txt" + }, + { + "name": "VU#836275", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/836275" + }, + { + "name": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dxterm.txt", + "refsource": "MISC", + "url": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dxterm.txt" + }, + { + "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification", + "refsource": "BUGTRAQ", + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html" + }, + { + "name": "VU#202939", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/202939" + }, + { + "name": "20020902 Happy Labor Day from Snosoft", + "refsource": "BUGTRAQ", + "url": "http://www.securityfocus.com/archive/1/290115" + }, + { + "name": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtaction.txt", + "refsource": "MISC", + "url": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtaction.txt" + }, + { + "name": "VU#600699", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/600699" + } + ] + } +} \ No newline at end of file diff --git a/2002/1xxx/CVE-2002-1696.json b/2002/1xxx/CVE-2002-1696.json index 688de00401e..2233a4919a2 100644 --- a/2002/1xxx/CVE-2002-1696.json +++ b/2002/1xxx/CVE-2002-1696.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-1696", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Microsoft Outlook plug-in PGP version 7.0, 7.0.3, and 7.0.4 silently saves a decrypted copy of a message to hard disk when \"Automatically decrypt/verify when opening messages\" option is checked, \"Always use Secure Viewer when decrypting\" option is not checked, and the user replies to an encrypted message." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-1696", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020108 PGP 7.0 Outlook Plug-in flaw", - "refsource" : "NTBUGTRAQ", - "url" : "http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0201&L=ntbugtraq&F=P&S=&P=528" - }, - { - "name" : "pgp-outlook-decrypted-copy(7900)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7900" - }, - { - "name" : "3825", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/3825" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Outlook plug-in PGP version 7.0, 7.0.3, and 7.0.4 silently saves a decrypted copy of a message to hard disk when \"Automatically decrypt/verify when opening messages\" option is checked, \"Always use Secure Viewer when decrypting\" option is not checked, and the user replies to an encrypted message." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "pgp-outlook-decrypted-copy(7900)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7900" + }, + { + "name": "3825", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/3825" + }, + { + "name": "20020108 PGP 7.0 Outlook Plug-in flaw", + "refsource": "NTBUGTRAQ", + "url": "http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0201&L=ntbugtraq&F=P&S=&P=528" + } + ] + } +} \ No newline at end of file diff --git a/2002/1xxx/CVE-2002-1777.json b/2002/1xxx/CVE-2002-1777.json index b5436344022..023dee2e3cf 100644 --- a/2002/1xxx/CVE-2002-1777.json +++ b/2002/1xxx/CVE-2002-1777.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-1777", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** DISPUTED ** NOTE: this issue has been disputed by the vendor. Symantec Norton AntiVirus (NAV) 2002 allows remote attackers to bypass e-mail scanning via a filename in the Content-Type field with an excluded extension such as .nch or .dbx, but a malicious extension in the Content-Disposition field, which is used by Outlook to obtain the file name. NOTE: the vendor has disputed this issue, acknowledging that the initial scan is bypassed, but Norton AntiVirus or the Office plug-in would detect the virus before it is executed." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-1777", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020307 Various Vulnerabilities in Norton Anti-Virus 2002", - "refsource" : "BUGTRAQ", - "url" : "http://online.securityfocus.com/archive/1/260271" - }, - { - "name" : "20020308 Re: Edvice Security Services