diff --git a/2002/0xxx/CVE-2002-0159.json b/2002/0xxx/CVE-2002-0159.json index ef282b4ccec..29cf9136848 100644 --- a/2002/0xxx/CVE-2002-0159.json +++ b/2002/0xxx/CVE-2002-0159.json @@ -1,82 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0159", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Format string vulnerability in the administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to crash the CSADMIN module only (denial of service of administration function) or execute arbitrary code via format strings in the URL to port 2002." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0159", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020403 iXsecurity.20020314.csadmin_fmt.a", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=101787248913611&w=2" - }, - { - "name" : "20020403 Web Interface Vulnerabilities in Cisco Secure ACS for Windows", - "refsource" : "CISCO", - "url" : "http://www.cisco.com/warp/public/707/ACS-Win-Web.shtml" - }, - { - "name" : "ciscosecure-acs-format-string(8742)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/8742.php" - }, - { - "name" : "4416", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/4416" - }, - { - "name" : "2062", - "refsource" : "OSVDB", - "url" : "http://www.osvdb.org/2062" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Format string vulnerability in the administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to crash the CSADMIN module only (denial of service of administration function) or execute arbitrary code via format strings in the URL to port 2002." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "2062", + "refsource": "OSVDB", + "url": "http://www.osvdb.org/2062" + }, + { + "name": "ciscosecure-acs-format-string(8742)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/8742.php" + }, + { + "name": "20020403 iXsecurity.20020314.csadmin_fmt.a", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=101787248913611&w=2" + }, + { + "name": "20020403 Web Interface Vulnerabilities in Cisco Secure ACS for Windows", + "refsource": "CISCO", + "url": "http://www.cisco.com/warp/public/707/ACS-Win-Web.shtml" + }, + { + "name": "4416", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/4416" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0249.json b/2002/0xxx/CVE-2002-0249.json index 92b3c2c80ac..34c92db33b9 100644 --- a/2002/0xxx/CVE-2002-0249.json +++ b/2002/0xxx/CVE-2002-0249.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0249", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0249", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020207 Security Advisory - #1", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=101311698909691&w=2" - }, - { - "name" : "php-123-path-information(8121)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/8121.php" - }, - { - "name" : "4056", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/4056" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20020207 Security Advisory - #1", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=101311698909691&w=2" + }, + { + "name": "4056", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/4056" + }, + { + "name": "php-123-path-information(8121)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/8121.php" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0442.json b/2002/0xxx/CVE-2002-0442.json index 2e05b00a5c7..da0405faeed 100644 --- a/2002/0xxx/CVE-2002-0442.json +++ b/2002/0xxx/CVE-2002-0442.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0442", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Buffer overflow in dlvr_audit for Caldera OpenServer 5.0.5 and 5.0.6 allows local users to gain root privileges." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0442", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "CSSA-2002-SCO.8", - "refsource" : "CALDERA", - "url" : "ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.8/CSSA-2002-SCO.8.txt" - }, - { - "name" : "openserver-dlvraudit-bo(8442)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/8442.php" - }, - { - "name" : "4273", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/4273" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in dlvr_audit for Caldera OpenServer 5.0.5 and 5.0.6 allows local users to gain root privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "4273", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/4273" + }, + { + "name": "CSSA-2002-SCO.8", + "refsource": "CALDERA", + "url": "ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.8/CSSA-2002-SCO.8.txt" + }, + { + "name": "openserver-dlvraudit-bo(8442)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/8442.php" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0612.json b/2002/0xxx/CVE-2002-0612.json index 766b7da927e..2f849ad3209 100644 --- a/2002/0xxx/CVE-2002-0612.json +++ b/2002/0xxx/CVE-2002-0612.json @@ -1,67 +1,67 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0612", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "FileSeek.cgi allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) head or (2) foot parameters." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0612", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020416 FileSeek cgi script advisory", - "refsource" : "VULN-DEV", - "url" : "http://archives.neohapsis.com/archives/vuln-dev/2002-q2/0132.html" - }, - { - "name" : "fileseek-cgi-command-execution(8857)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/8857.php" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "FileSeek.cgi allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) head or (2) foot parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "fileseek-cgi-command-execution(8857)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/8857.php" + }, + { + "name": "20020416 FileSeek cgi script advisory", + "refsource": "VULN-DEV", + "url": "http://archives.neohapsis.com/archives/vuln-dev/2002-q2/0132.html" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0744.json b/2002/0xxx/CVE-2002-0744.json index b89b02cbb4a..ba22bdac669 100644 --- a/2002/0xxx/CVE-2002-0744.json +++ b/2002/0xxx/CVE-2002-0744.json @@ -1,62 +1,62 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0744", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "namerslv in AIX 4.3.3 core dumps when called with a very long argument, possibly as a result of a buffer overflow." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0744", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "IY29517", - "refsource" : "AIXAPAR", - "url" : "http://archives.neohapsis.com/archives/aix/2002-q2/0005.html" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "namerslv in AIX 4.3.3 core dumps when called with a very long argument, possibly as a result of a buffer overflow." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "IY29517", + "refsource": "AIXAPAR", + "url": "http://archives.neohapsis.com/archives/aix/2002-q2/0005.html" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0780.json b/2002/0xxx/CVE-2002-0780.json index 93d9b836a00..21bb9538c2f 100644 --- a/2002/0xxx/CVE-2002-0780.json +++ b/2002/0xxx/CVE-2002-0780.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0780", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IP/IPX gateway for Novell BorderManager 3.6 SP 1a allows remote attackers to cause a denial of service via a connection to port 8225 with a large amount of random data, which causes ipipxgw.nlm to ABEND." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0780", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020508 [VulnWatch] cqure.net.20020412.bordermanager_36_mv1.a", - "refsource" : "VULNWATCH", - "url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0060.html" - }, - { - "name" : "20020508 cqure.net.20020412.bordermanager_36_mv1.a", - "refsource" : "BUGTRAQ", - "url" : "http://online.securityfocus.com/archive/1/271475" - }, - { - "name" : "4697", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/4697" - }, - { - "name" : "novell-bordermanager-ipipx-dos(9032)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/9032.php" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IP/IPX gateway for Novell BorderManager 3.6 SP 1a allows remote attackers to cause a denial of service via a connection to port 8225 with a large amount of random data, which causes ipipxgw.nlm to ABEND." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20020508 cqure.net.20020412.bordermanager_36_mv1.a", + "refsource": "BUGTRAQ", + "url": "http://online.securityfocus.com/archive/1/271475" + }, + { + "name": "20020508 [VulnWatch] cqure.net.20020412.bordermanager_36_mv1.a", + "refsource": "VULNWATCH", + "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0060.html" + }, + { + "name": "novell-bordermanager-ipipx-dos(9032)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/9032.php" + }, + { + "name": "4697", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/4697" + } + ] + } +} \ No newline at end of file diff --git a/2002/1xxx/CVE-2002-1026.json b/2002/1xxx/CVE-2002-1026.json index 0387fe412ec..5df5136d72e 100644 --- a/2002/1xxx/CVE-2002-1026.json +++ b/2002/1xxx/CVE-2002-1026.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-1026", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Macromedia Sitespring 1.2.0 (277.1) using Sybase runtime engine 7.0.2.1480 allows remote attackers to cause a denial of service (crash) via a long malformed request to TCP port 2500, possibly triggering a buffer overflow." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-1026", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020701 KPMG-2002028: Sitespring Server Denial of Service", - "refsource" : "BUGTRAQ", - "url" : "http://online.securityfocus.com/archive/1/280079" - }, - { - "name" : "20020701 [VulnWatch] KPMG-2002028: Sitespring Server Denial of Service", - "refsource" : "VULNWATCH", - "url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0140.html" - }, - { - "name" : "sitespring-sybase-dos(9458)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/9458.php" - }, - { - "name" : "5132", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/5132" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Macromedia Sitespring 1.2.0 (277.1) using Sybase runtime engine 7.0.2.1480 allows remote attackers to cause a denial of service (crash) via a long malformed request to TCP port 2500, possibly triggering a buffer overflow." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "sitespring-sybase-dos(9458)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/9458.php" + }, + { + "name": "20020701 [VulnWatch] KPMG-2002028: Sitespring Server Denial of Service", + "refsource": "VULNWATCH", + "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0140.html" + }, + { + "name": "5132", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/5132" + }, + { + "name": "20020701 KPMG-2002028: Sitespring Server Denial of Service", + "refsource": "BUGTRAQ", + "url": "http://online.securityfocus.com/archive/1/280079" + } + ] + } +} \ No newline at end of file diff --git a/2002/1xxx/CVE-2002-1422.json b/2002/1xxx/CVE-2002-1422.json index e3386d8c058..61a39c21cc9 100644 --- a/2002/1xxx/CVE-2002-1422.json +++ b/2002/1xxx/CVE-2002-1422.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-1422", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "admbrowse.php in FUDforum before 2.2.0 allows remote attackers to create or delete files via URL-encoded pathnames in the cur and dest parameters." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-1422", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020818 FUDforum file access and SQL Injection", - "refsource" : "BUGTRAQ", - "url" : "http://online.securityfocus.com/archive/1/288042" - }, - { - "name" : "20020818 FUDforum file access and SQL Injection", - "refsource" : "VULNWATCH", - "url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0082.html" - }, - { - "name" : "fudforum-admnbrowse-modify-files(9901)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/9901.php" - }, - { - "name" : "5502", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/5502" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "admbrowse.php in FUDforum before 2.2.0 allows remote attackers to create or delete files via URL-encoded pathnames in the cur and dest parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20020818 FUDforum file access and SQL Injection", + "refsource": "VULNWATCH", + "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0082.html" + }, + { + "name": "5502", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/5502" + }, + { + "name": "20020818 FUDforum file access and SQL Injection", + "refsource": "BUGTRAQ", + "url": "http://online.securityfocus.com/archive/1/288042" + }, + { + "name": "fudforum-admnbrowse-modify-files(9901)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/9901.php" + } + ] + } +} \ No newline at end of file diff --git a/2002/1xxx/CVE-2002-1488.json b/2002/1xxx/CVE-2002-1488.json index 7d2143ba97e..1d411d717aa 100644 --- a/2002/1xxx/CVE-2002-1488.json +++ b/2002/1xxx/CVE-2002-1488.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-1488", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "The IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service (crash) via a PART message with (1) a missing channel or (2) a channel that the Trillian user is not in." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-1488", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020922 *sigh* Trillian multiple DoS", - "refsource" : "BUGTRAQ", - "url" : "http://archives.neohapsis.com/archives/bugtraq/2002-09/0268.html" - }, - { - "name" : "5776", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/5776" - }, - { - "name" : "trillian-part-message-dos(10162)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/10162.php" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service (crash) via a PART message with (1) a missing channel or (2) a channel that the Trillian user is not in." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20020922 *sigh* Trillian multiple DoS", + "refsource": "BUGTRAQ", + "url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0268.html" + }, + { + "name": "5776", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/5776" + }, + { + "name": "trillian-part-message-dos(10162)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/10162.php" + } + ] + } +} \ No newline at end of file diff --git a/2002/1xxx/CVE-2002-1776.json b/2002/1xxx/CVE-2002-1776.json index 82ef370a541..bb3b1fcbe89 100644 --- a/2002/1xxx/CVE-2002-1776.json +++ b/2002/1xxx/CVE-2002-1776.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-1776", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** DISPUTED ** NOTE: this issue has been disputed by the vendor. Symantec Norton AntiVirus 2002 allows remote attackers to bypass virus protection via a Word Macro virus with a .nch or .dbx extension, which is automatically recognized and executed as a Microsoft Office document. NOTE: the vendor has disputed this issue, acknowledging that the initial scan is bypassed, but the Office plug-in would detect the virus before it is executed." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-1776", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020307 Various Vulnerabilities in Norton Anti-Virus 2002", - "refsource" : "BUGTRAQ", - "url" : "http://online.securityfocus.com/archive/1/260271" - }, - { - "name" : "20020308 Re: Edvice Security Services