From 4d711caec77aecbb47bb3b0a8bded10b5302e7b5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 18 Mar 2019 00:14:09 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2002/1xxx/CVE-2002-1307.json | 160 +++++------ 2002/1xxx/CVE-2002-1408.json | 140 +++++----- 2002/1xxx/CVE-2002-1522.json | 150 +++++----- 2003/0xxx/CVE-2003-0039.json | 200 +++++++------- 2003/0xxx/CVE-2003-0289.json | 190 ++++++------- 2003/0xxx/CVE-2003-0606.json | 120 ++++---- 2003/0xxx/CVE-2003-0762.json | 120 ++++---- 2003/1xxx/CVE-2003-1330.json | 140 +++++----- 2003/1xxx/CVE-2003-1374.json | 140 +++++----- 2003/1xxx/CVE-2003-1447.json | 160 +++++------ 2004/2xxx/CVE-2004-2331.json | 150 +++++----- 2004/2xxx/CVE-2004-2354.json | 130 ++++----- 2004/2xxx/CVE-2004-2411.json | 190 ++++++------- 2004/2xxx/CVE-2004-2453.json | 160 +++++------ 2008/2xxx/CVE-2008-2348.json | 140 +++++----- 2008/2xxx/CVE-2008-2486.json | 160 +++++------ 2008/2xxx/CVE-2008-2790.json | 160 +++++------ 2008/2xxx/CVE-2008-2836.json | 160 +++++------ 2008/2xxx/CVE-2008-2847.json | 150 +++++----- 2012/0xxx/CVE-2012-0333.json | 130 ++++----- 2012/0xxx/CVE-2012-0898.json | 140 +++++----- 2012/1xxx/CVE-2012-1090.json | 210 +++++++------- 2012/1xxx/CVE-2012-1411.json | 34 +-- 2012/1xxx/CVE-2012-1486.json | 34 +-- 2012/5xxx/CVE-2012-5013.json | 34 +-- 2012/5xxx/CVE-2012-5075.json | 490 ++++++++++++++++----------------- 2012/5xxx/CVE-2012-5725.json | 34 +-- 2017/3xxx/CVE-2017-3132.json | 152 +++++----- 2017/3xxx/CVE-2017-3566.json | 34 +-- 2017/3xxx/CVE-2017-3693.json | 34 +-- 2017/3xxx/CVE-2017-3750.json | 122 ++++---- 2017/3xxx/CVE-2017-3812.json | 140 +++++----- 2017/3xxx/CVE-2017-3852.json | 150 +++++----- 2017/7xxx/CVE-2017-7193.json | 34 +-- 2017/8xxx/CVE-2017-8325.json | 140 +++++----- 2017/8xxx/CVE-2017-8891.json | 140 +++++----- 2018/10xxx/CVE-2018-10532.json | 130 ++++----- 2018/10xxx/CVE-2018-10718.json | 140 +++++----- 2018/10xxx/CVE-2018-10837.json | 34 +-- 2018/10xxx/CVE-2018-10843.json | 156 +++++------ 2018/13xxx/CVE-2018-13053.json | 165 +++++------ 2018/13xxx/CVE-2018-13491.json | 130 ++++----- 2018/13xxx/CVE-2018-13817.json | 34 +-- 2018/17xxx/CVE-2018-17268.json | 34 +-- 2018/17xxx/CVE-2018-17427.json | 120 ++++---- 2018/17xxx/CVE-2018-17859.json | 140 +++++----- 2018/9xxx/CVE-2018-9137.json | 130 ++++----- 2018/9xxx/CVE-2018-9162.json | 120 ++++---- 2018/9xxx/CVE-2018-9303.json | 130 ++++----- 2018/9xxx/CVE-2018-9503.json | 162 +++++------ 50 files changed, 3301 insertions(+), 3296 deletions(-) diff --git a/2002/1xxx/CVE-2002-1307.json b/2002/1xxx/CVE-2002-1307.json index e07cd4b2e02..bd7a5e8ffdf 100644 --- a/2002/1xxx/CVE-2002-1307.json +++ b/2002/1xxx/CVE-2002-1307.json @@ -1,82 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-1307", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Cross-site scripting vulnerability (XSS) in MHonArc 2.5.12 and earlier allows remote attackers to insert script or HTML via an email message with the script in a MIME header name." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-1307", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "DSA-199", - "refsource" : "DEBIAN", - "url" : "http://www.debian.org/security/2002/dsa-199" - }, - { - "name" : "http://www.mhonarc.org/archive/cgi-bin/mesg.cgi?a=mhonarc-users&i=200210211713.g9LHDXE02256@mcguire.earlhood.com", - "refsource" : "CONFIRM", - "url" : "http://www.mhonarc.org/archive/cgi-bin/mesg.cgi?a=mhonarc-users&i=200210211713.g9LHDXE02256@mcguire.earlhood.com" - }, - { - "name" : "6204", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/6204" - }, - { - "name" : "mhonarc-mime-header-xss(10666)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/10666" - }, - { - "name" : "7353", - "refsource" : "OSVDB", - "url" : "http://www.osvdb.org/7353" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Cross-site scripting vulnerability (XSS) in MHonArc 2.5.12 and earlier allows remote attackers to insert script or HTML via an email message with the script in a MIME header name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "mhonarc-mime-header-xss(10666)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10666" + }, + { + "name": "http://www.mhonarc.org/archive/cgi-bin/mesg.cgi?a=mhonarc-users&i=200210211713.g9LHDXE02256@mcguire.earlhood.com", + "refsource": "CONFIRM", + "url": "http://www.mhonarc.org/archive/cgi-bin/mesg.cgi?a=mhonarc-users&i=200210211713.g9LHDXE02256@mcguire.earlhood.com" + }, + { + "name": "6204", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/6204" + }, + { + "name": "DSA-199", + "refsource": "DEBIAN", + "url": "http://www.debian.org/security/2002/dsa-199" + }, + { + "name": "7353", + "refsource": "OSVDB", + "url": "http://www.osvdb.org/7353" + } + ] + } +} \ No newline at end of file diff --git a/2002/1xxx/CVE-2002-1408.json b/2002/1xxx/CVE-2002-1408.json index 15f8cf9980f..dbb0a23b1f7 100644 --- a/2002/1xxx/CVE-2002-1408.json +++ b/2002/1xxx/CVE-2002-1408.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-1408", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Unknown vulnerability or vulnerabilities in HP OpenView EMANATE 14.2 snmpModules allow the SNMP read-write community name to be exposed, related to (1) \"'read-only' community access,\" and/or (2) an easily guessable community name." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-1408", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "HPSBUX0208-208", - "refsource" : "HP", - "url" : "http://online.securityfocus.com/advisories/4360" - }, - { - "name" : "hp-emanate-default-snmp(9814)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/9814.php" - }, - { - "name" : "5428", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/5428" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Unknown vulnerability or vulnerabilities in HP OpenView EMANATE 14.2 snmpModules allow the SNMP read-write community name to be exposed, related to (1) \"'read-only' community access,\" and/or (2) an easily guessable community name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "HPSBUX0208-208", + "refsource": "HP", + "url": "http://online.securityfocus.com/advisories/4360" + }, + { + "name": "5428", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/5428" + }, + { + "name": "hp-emanate-default-snmp(9814)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/9814.php" + } + ] + } +} \ No newline at end of file diff --git a/2002/1xxx/CVE-2002-1522.json b/2002/1xxx/CVE-2002-1522.json index 794647d83f7..3f5541cd4b4 100644 --- a/2002/1xxx/CVE-2002-1522.json +++ b/2002/1xxx/CVE-2002-1522.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-1522", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Buffer overflow in PowerFTP FTP server 2.24, and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long USER argument." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-1522", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20021005 Vulnerabilitie in PowerFTP server", - "refsource" : "BUGTRAQ", - "url" : "http://archives.neohapsis.com/archives/bugtraq/2002-10/0075.html" - }, - { - "name" : "20021012 Coolsoft PowerFTP <= v2.24 Denial of Service (Linux Source)", - "refsource" : "BUGTRAQ", - "url" : "http://archives.neohapsis.com/archives/bugtraq/2002-10/0194.html" - }, - { - "name" : "5899", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/5899" - }, - { - "name" : "powerftp-long-username-dos(10286)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/10286.php" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in PowerFTP FTP server 2.24, and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long USER argument." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20021005 Vulnerabilitie in PowerFTP server", + "refsource": "BUGTRAQ", + "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0075.html" + }, + { + "name": "5899", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/5899" + }, + { + "name": "20021012 Coolsoft PowerFTP <= v2.24 Denial of Service (Linux Source)", + "refsource": "BUGTRAQ", + "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0194.html" + }, + { + "name": "powerftp-long-username-dos(10286)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/10286.php" + } + ] + } +} \ No newline at end of file diff --git a/2003/0xxx/CVE-2003-0039.json b/2003/0xxx/CVE-2003-0039.json index d387345f4e7..9712e179af6 100644 --- a/2003/0xxx/CVE-2003-0039.json +++ b/2003/0xxx/CVE-2003-0039.json @@ -1,102 +1,102 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2003-0039", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "ISC dhcrelay (dhcp-relay) 3.0rc9 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (packet storm) via a certain BOOTP packet that is forwarded to a broadcast MAC address, causing an infinite loop that is not restricted by a hop count." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2003-0039", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20030115 DoS against DHCP infrastructure with isc dhcrelay", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=104310927813830&w=2" - }, - { - "name" : "CLSA-2003:616", - "refsource" : "CONECTIVA", - "url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000616" - }, - { - "name" : "DSA-245", - "refsource" : "DEBIAN", - "url" : "http://www.debian.org/security/2003/dsa-245" - }, - { - "name" : "RHSA-2003:034", - "refsource" : "REDHAT", - "url" : "http://www.redhat.com/support/errata/RHSA-2003-034.html" - }, - { - "name" : "TLSA-2003-26", - "refsource" : "TURBO", - "url" : "http://cc.turbolinux.com/security/TLSA-2003-26.txt" - }, - { - "name" : "20030219 [OpenPKG-SA-2003.012] OpenPKG Security Advisory (dhcpd)", - "refsource" : "BUGTRAQ", - "url" : "http://www.openpkg.org/security/OpenPKG-SA-2003.012-dhcpd.html" - }, - { - "name" : "VU#149953", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/149953" - }, - { - "name" : "6628", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/6628" - }, - { - "name" : "dhcp-dhcrelay-dos(11187)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/11187" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "ISC dhcrelay (dhcp-relay) 3.0rc9 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (packet storm) via a certain BOOTP packet that is forwarded to a broadcast MAC address, causing an infinite loop that is not restricted by a hop count." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "CLSA-2003:616", + "refsource": "CONECTIVA", + "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000616" + }, + { + "name": "VU#149953", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/149953" + }, + { + "name": "DSA-245", + "refsource": "DEBIAN", + "url": "http://www.debian.org/security/2003/dsa-245" + }, + { + "name": "TLSA-2003-26", + "refsource": "TURBO", + "url": "http://cc.turbolinux.com/security/TLSA-2003-26.txt" + }, + { + "name": "RHSA-2003:034", + "refsource": "REDHAT", + "url": "http://www.redhat.com/support/errata/RHSA-2003-034.html" + }, + { + "name": "20030219 [OpenPKG-SA-2003.012] OpenPKG Security Advisory (dhcpd)", + "refsource": "BUGTRAQ", + "url": "http://www.openpkg.org/security/OpenPKG-SA-2003.012-dhcpd.html" + }, + { + "name": "dhcp-dhcrelay-dos(11187)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11187" + }, + { + "name": "20030115 DoS against DHCP infrastructure with isc dhcrelay", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=104310927813830&w=2" + }, + { + "name": "6628", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/6628" + } + ] + } +} \ No newline at end of file diff --git a/2003/0xxx/CVE-2003-0289.json b/2003/0xxx/CVE-2003-0289.json index a67b00786b8..d8c8cf7ec02 100644 --- a/2003/0xxx/CVE-2003-0289.json +++ b/2003/0xxx/CVE-2003-0289.json @@ -1,97 +1,97 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2003-0289", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Format string vulnerability in scsiopen.c of the cdrecord program in cdrtools 2.0 allows local users to gain privileges via format string specifiers in the dev parameter." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2003-0289", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20030513 cdrtools2.0 Format String Vulnerability", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=105285564307225&w=2" - }, - { - "name" : "20030513 Cdrecord_local_root_exploit.", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=105286031812533&w=2" - }, - { - "name" : "ftp://ftp.berlios.de/pub/cdrecord/alpha/cdrtools-2.01a14.tar.gz", - "refsource" : "CONFIRM", - "url" : "ftp://ftp.berlios.de/pub/cdrecord/alpha/cdrtools-2.01a14.tar.gz" - }, - { - "name" : "200305-06", - "refsource" : "GENTOO", - "url" : "http://forums.gentoo.org/viewtopic.php?t=54904" - }, - { - "name" : "MDKSA-2003:058", - "refsource" : "MANDRAKE", - "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2003:058" - }, - { - "name" : "http://www.securiteam.com/exploits/5ZP0C2AAAC.html", - "refsource" : "MISC", - "url" : "http://www.securiteam.com/exploits/5ZP0C2AAAC.html" - }, - { - "name" : "7565", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/7565" - }, - { - "name" : "cdrtools-scsiopen-format-string(12007)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/12007" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Format string vulnerability in scsiopen.c of the cdrecord program in cdrtools 2.0 allows local users to gain privileges via format string specifiers in the dev parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "200305-06", + "refsource": "GENTOO", + "url": "http://forums.gentoo.org/viewtopic.php?t=54904" + }, + { + "name": "7565", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/7565" + }, + { + "name": "ftp://ftp.berlios.de/pub/cdrecord/alpha/cdrtools-2.01a14.tar.gz", + "refsource": "CONFIRM", + "url": "ftp://ftp.berlios.de/pub/cdrecord/alpha/cdrtools-2.01a14.tar.gz" + }, + { + "name": "http://www.securiteam.com/exploits/5ZP0C2AAAC.html", + "refsource": "MISC", + "url": "http://www.securiteam.com/exploits/5ZP0C2AAAC.html" + }, + { + "name": "20030513 cdrtools2.0 Format String Vulnerability", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=105285564307225&w=2" + }, + { + "name": "MDKSA-2003:058", + "refsource": "MANDRAKE", + "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:058" + }, + { + "name": "20030513 Cdrecord_local_root_exploit.", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=105286031812533&w=2" + }, + { + "name": "cdrtools-scsiopen-format-string(12007)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12007" + } + ] + } +} \ No newline at end of file diff --git a/2003/0xxx/CVE-2003-0606.json b/2003/0xxx/CVE-2003-0606.json index 43dfabc67d1..bf0819a9fa6 100644 --- a/2003/0xxx/CVE-2003-0606.json +++ b/2003/0xxx/CVE-2003-0606.json @@ -1,62 +1,62 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2003-0606", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "sup 1.8 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2003-0606", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "DSA-353", - "refsource" : "DEBIAN", - "url" : "http://www.debian.org/security/2003/dsa-353" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "sup 1.8 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "DSA-353", + "refsource": "DEBIAN", + "url": "http://www.debian.org/security/2003/dsa-353" + } + ] + } +} \ No newline at end of file diff --git a/2003/0xxx/CVE-2003-0762.json b/2003/0xxx/CVE-2003-0762.json index d43ec60ef65..1f0c32184c7 100644 --- a/2003/0xxx/CVE-2003-0762.json +++ b/2003/0xxx/CVE-2003-0762.json @@ -1,62 +1,62 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2003-0762", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Buffer overflow in (1) foxweb.dll and (2) foxweb.exe of Foxweb 2.5 allows remote attackers to execute arbitrary code via a long URL (PATH_INFO value)." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2003-0762", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20030905 [SCAN Associates Sdn Bhd Security Advisory] Foxweb 2.5 bufferoverflow in CGI and ISAPI extension", - "refsource" : "VULNWATCH", - "url" : "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0096.html" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in (1) foxweb.dll and (2) foxweb.exe of Foxweb 2.5 allows remote attackers to execute arbitrary code via a long URL (PATH_INFO value)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20030905 [SCAN Associates Sdn Bhd Security Advisory] Foxweb 2.5 bufferoverflow in CGI and ISAPI extension", + "refsource": "VULNWATCH", + "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0096.html" + } + ] + } +} \ No newline at end of file diff --git a/2003/1xxx/CVE-2003-1330.json b/2003/1xxx/CVE-2003-1330.json index 42b1538e2c6..3c0ad89f0ec 100644 --- a/2003/1xxx/CVE-2003-1330.json +++ b/2003/1xxx/CVE-2003-1330.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2003-1330", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Clearswift MAILsweeper for SMTP 4.3.6 SP1 does not execute custom \"on strip unsuccessful\" hooks, which allows remote attackers to bypass e-mail attachment filtering policies via an attachment that MAILsweeper can detect but not remove." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2003-1330", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://www.mimesweeper.com/download/bin/Patches/MAILsweeper_Patches_301_ReadMe.htm", - "refsource" : "MISC", - "url" : "http://www.mimesweeper.com/download/bin/Patches/MAILsweeper_Patches_301_ReadMe.htm" - }, - { - "name" : "7226", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/7226" - }, - { - "name" : "mailsweeper-onstrip-bypass-filter(11745)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/11745" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Clearswift MAILsweeper for SMTP 4.3.6 SP1 does not execute custom \"on strip unsuccessful\" hooks, which allows remote attackers to bypass e-mail attachment filtering policies via an attachment that MAILsweeper can detect but not remove." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://www.mimesweeper.com/download/bin/Patches/MAILsweeper_Patches_301_ReadMe.htm", + "refsource": "MISC", + "url": "http://www.mimesweeper.com/download/bin/Patches/MAILsweeper_Patches_301_ReadMe.htm" + }, + { + "name": "mailsweeper-onstrip-bypass-filter(11745)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11745" + }, + { + "name": "7226", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/7226" + } + ] + } +} \ No newline at end of file diff --git a/2003/1xxx/CVE-2003-1374.json b/2003/1xxx/CVE-2003-1374.json index e0fe47ec1bb..455ba148a3b 100644 --- a/2003/1xxx/CVE-2003-1374.json +++ b/2003/1xxx/CVE-2003-1374.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2003-1374", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Buffer overflow in disable of HP-UX 11.0 may allow local users to execute arbitrary code via a long argument to the (1) -r or (2)-c options." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2003-1374", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20030213 HPUX disable buffer overflow vulnerability", - "refsource" : "BUGTRAQ", - "url" : "http://archives.neohapsis.com/archives/bugtraq/2003-02/0156.html" - }, - { - "name" : "hp-lp-disable-bo(11316)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/11316" - }, - { - "name" : "6845", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/6845" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in disable of HP-UX 11.0 may allow local users to execute arbitrary code via a long argument to the (1) -r or (2)-c options." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20030213 HPUX disable buffer overflow vulnerability", + "refsource": "BUGTRAQ", + "url": "http://archives.neohapsis.com/archives/bugtraq/2003-02/0156.html" + }, + { + "name": "6845", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/6845" + }, + { + "name": "hp-lp-disable-bo(11316)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11316" + } + ] + } +} \ No newline at end of file diff --git a/2003/1xxx/CVE-2003-1447.json b/2003/1xxx/CVE-2003-1447.json index 094a9071d67..5607f2bddfb 100644 --- a/2003/1xxx/CVE-2003-1447.json +++ b/2003/1xxx/CVE-2003-1447.json @@ -1,82 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2003-1447", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM WebSphere Advanced Server Edition 4.0.4 uses a weak encryption algorithm (XOR and base64 encoding), which allows local users to decrypt passwords when the configuration file is exported to XML." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2003-1447", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20030204 Weak password protection in WebSphere 4.0.4 XML configuration export", - "refsource" : "BUGTRAQ", - "url" : "http://www.securityfocus.com/archive/1/310118" - }, - { - "name" : "20030206 Re: Weak password protection in WebSphere 4.0.4 XML configuration export", - "refsource" : "BUGTRAQ", - "url" : "http://www.securityfocus.com/archive/1/310796" - }, - { - "name" : "6758", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/6758" - }, - { - "name" : "3277", - "refsource" : "SREASON", - "url" : "http://securityreason.com/securityalert/3277" - }, - { - "name" : "websphere-xml-weak-encryption(11245)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/11245" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM WebSphere Advanced Server Edition 4.0.4 uses a weak encryption algorithm (XOR and base64 encoding), which allows local users to decrypt passwords when the configuration file is exported to XML." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "websphere-xml-weak-encryption(11245)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11245" + }, + { + "name": "20030206 Re: Weak password protection in WebSphere 4.0.4 XML configuration export", + "refsource": "BUGTRAQ", + "url": "http://www.securityfocus.com/archive/1/310796" + }, + { + "name": "6758", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/6758" + }, + { + "name": "20030204 Weak password protection in WebSphere 4.0.4 XML configuration export", + "refsource": "BUGTRAQ", + "url": "http://www.securityfocus.com/archive/1/310118" + }, + { + "name": "3277", + "refsource": "SREASON", + "url": "http://securityreason.com/securityalert/3277" + } + ] + } +} \ No newline at end of file diff --git a/2004/2xxx/CVE-2004-2331.json b/2004/2xxx/CVE-2004-2331.json index 41c92139ce8..4d784f83009 100644 --- a/2004/2xxx/CVE-2004-2331.json +++ b/2004/2xxx/CVE-2004-2331.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2004-2331", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "ColdFusion MX 6.1 and 6.1 J2EE allows local users to bypass sandbox security restrictions and obtain sensitive information by using Java reflection methods to access trusted Java objects without using the CreateObject function or cfobject tag." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2004-2331", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://www.macromedia.com/devnet/security/security_zone/mpsb04-01.html", - "refsource" : "CONFIRM", - "url" : "http://www.macromedia.com/devnet/security/security_zone/mpsb04-01.html" - }, - { - "name" : "9521", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/9521" - }, - { - "name" : "10743", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/10743/" - }, - { - "name" : "coldfusion-mx-sandbox-bypass(14984)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/14984" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "ColdFusion MX 6.1 and 6.1 J2EE allows local users to bypass sandbox security restrictions and obtain sensitive information by using Java reflection methods to access trusted Java objects without using the CreateObject function or cfobject tag." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-01.html", + "refsource": "CONFIRM", + "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-01.html" + }, + { + "name": "coldfusion-mx-sandbox-bypass(14984)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14984" + }, + { + "name": "9521", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/9521" + }, + { + "name": "10743", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/10743/" + } + ] + } +} \ No newline at end of file diff --git a/2004/2xxx/CVE-2004-2354.json b/2004/2xxx/CVE-2004-2354.json index b80f9d190d8..0938b112342 100644 --- a/2004/2xxx/CVE-2004-2354.json +++ b/2004/2xxx/CVE-2004-2354.json @@ -1,67 +1,67 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2004-2354", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2004-2354", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20040315 [waraxe-2004-SA#007 - XSS and SQL injection bugs in 4nguestbook module for PhpNuke]", - "refsource" : "BUGTRAQ", - "url" : "http://archives.neohapsis.com/archives/bugtraq/2004-03/0139.html" - }, - { - "name" : "4nguestbook-modules-xss(15478)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15478" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "4nguestbook-modules-xss(15478)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15478" + }, + { + "name": "20040315 [waraxe-2004-SA#007 - XSS and SQL injection bugs in 4nguestbook module for PhpNuke]", + "refsource": "BUGTRAQ", + "url": "http://archives.neohapsis.com/archives/bugtraq/2004-03/0139.html" + } + ] + } +} \ No newline at end of file diff --git a/2004/2xxx/CVE-2004-2411.json b/2004/2xxx/CVE-2004-2411.json index ccc443f6be3..032a9979cb3 100644 --- a/2004/2xxx/CVE-2004-2411.json +++ b/2004/2xxx/CVE-2004-2411.json @@ -1,97 +1,97 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2004-2411", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "The CleanseMessage function in shop$db.asp for VP-ASP Shopping Cart 4.0 through 5.0 does not sufficiently cleanse inputs, which allows remote attackers to conduct cross-site scripting (XSS) attacks that do not use