diff --git a/2002/0xxx/CVE-2002-0009.json b/2002/0xxx/CVE-2002-0009.json index 28b5c530143..faa1efaf71d 100644 --- a/2002/0xxx/CVE-2002-0009.json +++ b/2002/0xxx/CVE-2002-0009.json @@ -1,87 +1,87 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0009", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "show_bug.cgi in Bugzilla before 2.14.1 allows a user with \"Bugs Access\" privileges to see other products that are not accessible to the user, by submitting a bug and reading the resulting Product pulldown menu." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0009", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older", - "refsource" : "BUGTRAQ", - "url" : "http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html" - }, - { - "name" : "http://www.bugzilla.org/security2_14_1.html", - "refsource" : "CONFIRM", - "url" : "http://www.bugzilla.org/security2_14_1.html" - }, - { - "name" : "http://bugzilla.mozilla.org/show_bug.cgi?id=102141", - "refsource" : "MISC", - "url" : "http://bugzilla.mozilla.org/show_bug.cgi?id=102141" - }, - { - "name" : "RHSA-2002:001", - "refsource" : "REDHAT", - "url" : "http://rhn.redhat.com/errata/RHSA-2002-001.html" - }, - { - "name" : "bugzilla-showbug-reveal-bugs(7802)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/7802.php" - }, - { - "name" : "3798", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/3798" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "show_bug.cgi in Bugzilla before 2.14.1 allows a user with \"Bugs Access\" privileges to see other products that are not accessible to the user, by submitting a bug and reading the resulting Product pulldown menu." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "RHSA-2002:001", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2002-001.html" + }, + { + "name": "20020105 Security Advisory for Bugzilla v2.15 (cvs20020103) and older", + "refsource": "BUGTRAQ", + "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html" + }, + { + "name": "http://www.bugzilla.org/security2_14_1.html", + "refsource": "CONFIRM", + "url": "http://www.bugzilla.org/security2_14_1.html" + }, + { + "name": "3798", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/3798" + }, + { + "name": "bugzilla-showbug-reveal-bugs(7802)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/7802.php" + }, + { + "name": "http://bugzilla.mozilla.org/show_bug.cgi?id=102141", + "refsource": "MISC", + "url": "http://bugzilla.mozilla.org/show_bug.cgi?id=102141" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0173.json b/2002/0xxx/CVE-2002-0173.json index fbebe680135..23557f72c6f 100644 --- a/2002/0xxx/CVE-2002-0173.json +++ b/2002/0xxx/CVE-2002-0173.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0173", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and earlier may allow local users to gain root privileges." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0173", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020409-01-I", - "refsource" : "SGI", - "url" : "ftp://patches.sgi.com/support/free/security/advisories/20020409-01-I" - }, - { - "name" : "4644", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/4644" - }, - { - "name" : "irix-cpr-bo(8959)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/8959.php" - }, - { - "name" : "5359", - "refsource" : "OSVDB", - "url" : "http://www.osvdb.org/5359" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and earlier may allow local users to gain root privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "5359", + "refsource": "OSVDB", + "url": "http://www.osvdb.org/5359" + }, + { + "name": "irix-cpr-bo(8959)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/8959.php" + }, + { + "name": "4644", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/4644" + }, + { + "name": "20020409-01-I", + "refsource": "SGI", + "url": "ftp://patches.sgi.com/support/free/security/advisories/20020409-01-I" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0182.json b/2002/0xxx/CVE-2002-0182.json index 4c44acb1947..77a6e36ae9e 100644 --- a/2002/0xxx/CVE-2002-0182.json +++ b/2002/0xxx/CVE-2002-0182.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0182", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0182", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0312.json b/2002/0xxx/CVE-2002-0312.json index 9668f62d20a..0e84eb344e9 100644 --- a/2002/0xxx/CVE-2002-0312.json +++ b/2002/0xxx/CVE-2002-0312.json @@ -1,82 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0312", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Directory traversal vulnerability in Essentia Web Server 2.1 allows remote attackers to read arbitrary files via a .. (dot dot) in a URL." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0312", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020226 SecurityOffice Security Advisory:// Essentia Web Server Vulnerabilities (Vendor Patch)", - "refsource" : "BUGTRAQ", - "url" : "http://online.securityfocus.com/archive/1/258365" - }, - { - "name" : "20020222 SecurityOffice Security Advisory:// Essentia Web Server Vulnerabilities (Vendor Patch)", - "refsource" : "NTBUGTRAQ", - "url" : "http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0202&L=ntbugtraq&F=P&S=&P=10201" - }, - { - "name" : "20020221 SecurityOffice Security Advisory:// Essentia Web Server Directory Traversal Vulnerability", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=101439734827908&w=2" - }, - { - "name" : "essentia-server-directory-traversal(8248)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/8248.php" - }, - { - "name" : "4160", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/4160" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Directory traversal vulnerability in Essentia Web Server 2.1 allows remote attackers to read arbitrary files via a .. (dot dot) in a URL." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "4160", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/4160" + }, + { + "name": "20020221 SecurityOffice Security Advisory:// Essentia Web Server Directory Traversal Vulnerability", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=101439734827908&w=2" + }, + { + "name": "20020226 SecurityOffice Security Advisory:// Essentia Web Server Vulnerabilities (Vendor Patch)", + "refsource": "BUGTRAQ", + "url": "http://online.securityfocus.com/archive/1/258365" + }, + { + "name": "essentia-server-directory-traversal(8248)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/8248.php" + }, + { + "name": "20020222 SecurityOffice Security Advisory:// Essentia Web Server Vulnerabilities (Vendor Patch)", + "refsource": "NTBUGTRAQ", + "url": "http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0202&L=ntbugtraq&F=P&S=&P=10201" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0764.json b/2002/0xxx/CVE-2002-0764.json index a1d448d780f..5fb0379b70a 100644 --- a/2002/0xxx/CVE-2002-0764.json +++ b/2002/0xxx/CVE-2002-0764.json @@ -1,82 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0764", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Phorum 3.3.2a allows remote attackers to execute arbitrary commands via an HTTP request to (1) plugin.php, (2) admin.php, or (3) del.php that modifies the PHORUM[settings_dir] variable to point to a directory that contains a PHP file with the commands." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0764", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020517 Phorum 3.3.2a remote command execution", - "refsource" : "BUGTRAQ", - "url" : "http://archives.neohapsis.com/archives/bugtraq/2002-05/0147.html" - }, - { - "name" : "20020518 Phorum 3.3.2a has another bug for remote command execution", - "refsource" : "BUGTRAQ", - "url" : "http://archives.neohapsis.com/archives/bugtraq/2002-05/0153.html" - }, - { - "name" : "http://www.phorum.org/", - "refsource" : "CONFIRM", - "url" : "http://www.phorum.org/" - }, - { - "name" : "phorum-php-command-execution(9107)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/9107.php" - }, - { - "name" : "4763", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/4763" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Phorum 3.3.2a allows remote attackers to execute arbitrary commands via an HTTP request to (1) plugin.php, (2) admin.php, or (3) del.php that modifies the PHORUM[settings_dir] variable to point to a directory that contains a PHP file with the commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "4763", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/4763" + }, + { + "name": "http://www.phorum.org/", + "refsource": "CONFIRM", + "url": "http://www.phorum.org/" + }, + { + "name": "20020518 Phorum 3.3.2a has another bug for remote command execution", + "refsource": "BUGTRAQ", + "url": "http://archives.neohapsis.com/archives/bugtraq/2002-05/0153.html" + }, + { + "name": "phorum-php-command-execution(9107)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/9107.php" + }, + { + "name": "20020517 Phorum 3.3.2a remote command execution", + "refsource": "BUGTRAQ", + "url": "http://archives.neohapsis.com/archives/bugtraq/2002-05/0147.html" + } + ] + } +} \ No newline at end of file diff --git a/2002/1xxx/CVE-2002-1772.json b/2002/1xxx/CVE-2002-1772.json index 6307b7723d4..2454db6ad17 100644 --- a/2002/1xxx/CVE-2002-1772.json +++ b/2002/1xxx/CVE-2002-1772.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-1772", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Novell Netware 5.0 through 5.1 may allow local users to gain \"Domain Admin\" rights by logging into a Novell Directory Services (NDS) account, and executing \"net use\" on an NDS_ADM account that is not in the NT domain but has domain access rights, which allows the user to enter a null password." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-1772", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020131 Possible privilege escalation with NDS for NT", - "refsource" : "BUGTRAQ", - "url" : "http://online.securityfocus.com/archive/1/253373" - }, - { - "name" : "4012", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/4012" - }, - { - "name" : "netware-nds-unauth-access(8065)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/8065" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Novell Netware 5.0 through 5.1 may allow local users to gain \"Domain Admin\" rights by logging into a Novell Directory Services (NDS) account, and executing \"net use\" on an NDS_ADM account that is not in the NT domain but has domain access rights, which allows the user to enter a null password." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20020131 Possible privilege escalation with NDS for NT", + "refsource": "BUGTRAQ", + "url": "http://online.securityfocus.com/archive/1/253373" + }, + { + "name": "netware-nds-unauth-access(8065)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8065" + }, + { + "name": "4012", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/4012" + } + ] + } +} \ No newline at end of file diff --git a/2002/2xxx/CVE-2002-2086.json b/2002/2xxx/CVE-2002-2086.json index dd6406635c6..453775751e6 100644 --- a/2002/2xxx/CVE-2002-2086.json +++ b/2002/2xxx/CVE-2002-2086.json @@ -1,92 +1,92 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-2086", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Multiple cross-site scripting (XSS) vulnerabilities in magicHTML of SquirrelMail before 1.2.6 allow remote attackers to inject arbitrary web script or HTML via (1) \"<