mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
- Synchronized data.
This commit is contained in:
parent
ffb18bd6fc
commit
71d424342e
67
1999/0xxx/CVE-1999-0734.json
Normal file
67
1999/0xxx/CVE-1999-0734.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID" : "CVE-1999-0734",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "n/a",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "A default configuration of CiscoSecure Access Control Server (ACS) allows remote users to modify the server database without authentication."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "19990819 CiscoSecure Access Control Server for UNIX Remote Administration Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-19990819-dbaccess"
|
||||
},
|
||||
{
|
||||
"name" : "ciscosecure-read-write(3133)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/3133"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -58,7 +58,7 @@
|
||||
"url" : "http://marc.info/?l=bugtraq&m=94217006208374&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "19991109 Re: BigIP - bigconf.cgi holes ",
|
||||
"name" : "19991109 Re: BigIP - bigconf.cgi holes",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=94217879020184&w=2"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20000324 AnalogX SimpleServer 1.03 Remote Crash\" at: ",
|
||||
"name" : "20000324 AnalogX SimpleServer 1.03 Remote Crash\" at:",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=web-5645555@post2.rnci.com"
|
||||
},
|
||||
|
@ -63,7 +63,7 @@
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010212 Re: Symantec pcAnywhere 9.0 DoS / Buffer Overflow ",
|
||||
"name" : "20010212 Re: Symantec pcAnywhere 9.0 DoS / Buffer Overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html"
|
||||
},
|
||||
|
@ -58,7 +58,7 @@
|
||||
"url" : "http://marc.info/?l=bugtraq&m=95878603510835&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20000522 RFP2K05 - NetProwler \"Fragmentation\" Issue ",
|
||||
"name" : "20000522 RFP2K05 - NetProwler \"Fragmentation\" Issue",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=392AD3B3.3E9BE3EA@axent.com"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20000525 DST2K0003 : Buffer Overrun in NAI WebShield SMTP v4.5.44 Managem ent Tool ",
|
||||
"name" : "20000525 DST2K0003 : Buffer Overrun in NAI WebShield SMTP v4.5.44 Managem ent Tool",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A@exchange.servers.delphis.net"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20000525 DST2K0003 : Buffer Overrun in NAI WebShield SMTP v4.5.44 Managem ent Tool ",
|
||||
"name" : "20000525 DST2K0003 : Buffer Overrun in NAI WebShield SMTP v4.5.44 Managem ent Tool",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A@exchange.servers.delphis.net"
|
||||
},
|
||||
|
@ -58,7 +58,7 @@
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-06/0247.html"
|
||||
},
|
||||
{
|
||||
"name" : "20000628 dhcp client: remote root exploit in dhcp client ",
|
||||
"name" : "20000628 dhcp client: remote root exploit in dhcp client",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2000/20000628"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20000708 gnu-pop3d (FTGate problem), Savant Webserver, Guild FTPd ",
|
||||
"name" : "20000708 gnu-pop3d (FTGate problem), Savant Webserver, Guild FTPd",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0114.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20000708 gnu-pop3d (FTGate problem), Savant Webserver, Guild FTPd ",
|
||||
"name" : "20000708 gnu-pop3d (FTGate problem), Savant Webserver, Guild FTPd",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0114.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20000912 (SRADV00003) Arbitrary file disclosure through IMP ",
|
||||
"name" : "20000912 (SRADV00003) Arbitrary file disclosure through IMP",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/82088"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20001129 Windows 2000 Telnet Service DoS ",
|
||||
"name" : "20001129 Windows 2000 Telnet Service DoS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/147914"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20001201 Fixed local AIX V43 vulnerabilities ",
|
||||
"name" : "20001201 Fixed local AIX V43 vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=97569466809056&w=2"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20001108 [CORE SDI ADVISORY] MS NT4.0 Terminal Server Edition GINA buffer overflow ",
|
||||
"name" : "20001108 [CORE SDI ADVISORY] MS NT4.0 Terminal Server Edition GINA buffer overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/143991"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010108 def-2001-02: IBM Websphere 3.52 Kernel Leak DoS ",
|
||||
"name" : "20010108 def-2001-02: IBM Websphere 3.52 Kernel Leak DoS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0079.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010109 Oracle XSQL servlet and xml-stylesheet allow executing java on the web server ",
|
||||
"name" : "20010109 Oracle XSQL servlet and xml-stylesheet allow executing java on the web server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=97906670012796&w=2"
|
||||
},
|
||||
|
@ -58,12 +58,12 @@
|
||||
"url" : "http://www.securityfocus.com/archive/1/152206"
|
||||
},
|
||||
{
|
||||
"name" : "20010109 Memory leakage in ProFTPd leads to remote DoS (SIZE FTP); (Exploit Code) ",
|
||||
"name" : "20010109 Memory leakage in ProFTPd leads to remote DoS (SIZE FTP); (Exploit Code)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0122.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010110 Re: Memory leakage in ProFTPd leads to remote DoS (SIZE FTP); (Exploit Code) ",
|
||||
"name" : "20010110 Re: Memory leakage in ProFTPd leads to remote DoS (SIZE FTP); (Exploit Code)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0132.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010115 Windows Media Player 7 and IE java vulnerability - executing arbitrary programs ",
|
||||
"name" : "20010115 Windows Media Player 7 and IE java vulnerability - executing arbitrary programs",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=97958100816503&w=2"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010330 Serious Pitbull LX Vulnerability ",
|
||||
"name" : "20010330 Serious Pitbull LX Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0475.html"
|
||||
},
|
||||
|
@ -73,7 +73,7 @@
|
||||
"url" : "http://marc.info/?l=bugtraq&m=98865027328391&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20010501 Re: Proof of concept DoS against novell border manager enterprise edition 3.5 ",
|
||||
"name" : "20010501 Re: Proof of concept DoS against novell border manager enterprise edition 3.5",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0000.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010424 Advisory for Small HTTP Server ",
|
||||
"name" : "20010424 Advisory for Small HTTP Server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0428.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010424 IPSwitch IMail 6.06 SMTP Remote System Access Vulnerability ",
|
||||
"name" : "20010424 IPSwitch IMail 6.06 SMTP Remote System Access Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0433.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010426 Vulnerability in WebXQ Server ",
|
||||
"name" : "20010426 Vulnerability in WebXQ Server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0490.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010528 [synnergy] - Solaris mailtool(1) buffer overflow vulnerability ",
|
||||
"name" : "20010528 [synnergy] - Solaris mailtool(1) buffer overflow vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0258.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010515 DCForum Password File Manipukation Vulnerability (qDefense Advisory Number QDAV-5-2000-2) ",
|
||||
"name" : "20010515 DCForum Password File Manipukation Vulnerability (qDefense Advisory Number QDAV-5-2000-2)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0122.html"
|
||||
},
|
||||
|
@ -53,12 +53,12 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010604 SSH allows deletion of other users files... ",
|
||||
"name" : "20010604 SSH allows deletion of other users files...",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0322.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010604 Re: SSH allows deletion of other users files... ",
|
||||
"name" : "20010604 Re: SSH allows deletion of other users files...",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0007.html"
|
||||
},
|
||||
|
@ -53,12 +53,12 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010528 Vulnerability discovered in SpearHead NetGap ",
|
||||
"name" : "20010528 Vulnerability discovered in SpearHead NetGap",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0256.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010607 SpearHead Security NetGAP ",
|
||||
"name" : "20010607 SpearHead Security NetGAP",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0047.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010507 Advisory for Jana server ",
|
||||
"name" : "20010507 Advisory for Jana server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0086.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010210 vixie cron possible local root compromise ",
|
||||
"name" : "20010210 vixie cron possible local root compromise",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0197.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010507 Advisory for Electrocomm 2.0 ",
|
||||
"name" : "20010507 Advisory for Electrocomm 2.0",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0049.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010225 APC web/snmp/telnet management card dos ",
|
||||
"name" : "20010225 APC web/snmp/telnet management card dos",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0436.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010502 Solaris mailx Vulnerability ",
|
||||
"name" : "20010502 Solaris mailx Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0016.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010320 def-2001-13: NTMail Web Services DoS ",
|
||||
"name" : "20010320 def-2001-13: NTMail Web Services DoS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0248.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010330 STAT Security Advisory: Trend Micro's ScanMail for Exchange store s passwords in registry unprotected ",
|
||||
"name" : "20010330 STAT Security Advisory: Trend Micro's ScanMail for Exchange store s passwords in registry unprotected",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/ntbugtraq/2001-q1/0049.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010326 Netscreen: DMZ Network Receives Some \"Denied\" Traffic ",
|
||||
"name" : "20010326 Netscreen: DMZ Network Receives Some \"Denied\" Traffic",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010403 Re: Tomcat may reveal script source code by URL trickery ",
|
||||
"name" : "20010403 Re: Tomcat may reveal script source code by URL trickery",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010212 Patch for Potential Vulnerability in the execution of JSPs outside doc_root ",
|
||||
"name" : "20010212 Patch for Potential Vulnerability in the execution of JSPs outside doc_root",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0239.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010327 advisory ",
|
||||
"name" : "20010327 advisory",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0395.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010411 [LSD] Solaris kcsSUNWIOsolf.so and dtsession vulnerabilities ",
|
||||
"name" : "20010411 [LSD] Solaris kcsSUNWIOsolf.so and dtsession vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0203.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010516 Remote Desktop DoS ",
|
||||
"name" : "20010516 Remote Desktop DoS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0158.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010515 OmniHTTPd Pro Denial of Service Vulnerability ",
|
||||
"name" : "20010515 OmniHTTPd Pro Denial of Service Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0131.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010525 Security Bug in InoculateIT for Linux (fwd) ",
|
||||
"name" : "20010525 Security Bug in InoculateIT for Linux (fwd)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0245.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010522 [SRT2001-09] - vi and crontab -e /tmp issues ",
|
||||
"name" : "20010522 [SRT2001-09] - vi and crontab -e /tmp issues",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0220.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010523 HP OpenView NNM v6.1 buffer overflow ",
|
||||
"name" : "20010523 HP OpenView NNM v6.1 buffer overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0226.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010523 Vulnerability in viewsrc.cgi ",
|
||||
"name" : "20010523 Vulnerability in viewsrc.cgi",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0231.html"
|
||||
},
|
||||
|
@ -53,12 +53,12 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010221 FirstClass Internetgateway \"stupidity\" ",
|
||||
"name" : "20010221 FirstClass Internetgateway \"stupidity\"",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0376.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010226 Re: [Fwd: FirstClass Internetgateway \"stupidity\"] ",
|
||||
"name" : "20010226 Re: [Fwd: FirstClass Internetgateway \"stupidity\"]",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0440.html"
|
||||
},
|
||||
|
@ -53,12 +53,12 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010220 Advisory: Chili!Soft ASP Multiple Vulnerabilities ",
|
||||
"name" : "20010220 Advisory: Chili!Soft ASP Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0378.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010226 Re: Advisory: Chili!Soft ASP Multiple Vulnerabilities ",
|
||||
"name" : "20010226 Re: Advisory: Chili!Soft ASP Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0443.html"
|
||||
},
|
||||
|
@ -63,7 +63,7 @@
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0381.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010423 Re: SECURITY.NNOV: The Bat! <cr> bug ",
|
||||
"name" : "20010423 Re: SECURITY.NNOV: The Bat! <cr> bug",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0410.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010515 3COM OfficeConnect DSL router vulneratibilities ",
|
||||
"name" : "20010515 3COM OfficeConnect DSL router vulneratibilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0115.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010503 Cisco HSRP Weakness/DoS ",
|
||||
"name" : "20010503 Cisco HSRP Weakness/DoS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0035.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010605 SECURITY.NNOV: Netscape 4.7x Messanger user information retrival ",
|
||||
"name" : "20010605 SECURITY.NNOV: Netscape 4.7x Messanger user information retrival",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0014.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010608 potential buffer overflow in xinetd-2.1.8.9pre11-1 ",
|
||||
"name" : "20010608 potential buffer overflow in xinetd-2.1.8.9pre11-1",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0064.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010702 BisonFTP Server V4R1 *.bdl upload Directory Traversal ",
|
||||
"name" : "20010702 BisonFTP Server V4R1 *.bdl upload Directory Traversal",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-07/0025.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010527 def-2001-27: GuildFTPD Buffer Overflow and Memory Leak DoS ",
|
||||
"name" : "20010527 def-2001-27: GuildFTPD Buffer Overflow and Memory Leak DoS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0254.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010527 def-2001-27: GuildFTPD Buffer Overflow and Memory Leak DoS ",
|
||||
"name" : "20010527 def-2001-27: GuildFTPD Buffer Overflow and Memory Leak DoS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0254.html"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "20010626 Advisory ",
|
||||
"name" : "20010626 Advisory",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0353.html"
|
||||
},
|
||||
|
@ -58,7 +58,7 @@
|
||||
"url" : "http://marc.info/?l=bugtraq&m=99358249631139&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20011007 OS X 10.1 and localized desktop folder still vulnerable ",
|
||||
"name" : "20011007 OS X 10.1 and localized desktop folder still vulnerable",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://online.securityfocus.com/archive/1/219166"
|
||||
},
|
||||
|
@ -53,7 +53,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "CSSA-2001-SCO.15 ",
|
||||
"name" : "CSSA-2001-SCO.15",
|
||||
"refsource" : "CALDERA",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-08/0391.html"
|
||||
},
|
||||
|
18
2018/19xxx/CVE-2018-19298.json
Normal file
18
2018/19xxx/CVE-2018-19298.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID" : "CVE-2018-19298",
|
||||
"STATE" : "RESERVED"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2018/19xxx/CVE-2018-19299.json
Normal file
18
2018/19xxx/CVE-2018-19299.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID" : "CVE-2018-19299",
|
||||
"STATE" : "RESERVED"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2018/19xxx/CVE-2018-19300.json
Normal file
18
2018/19xxx/CVE-2018-19300.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID" : "CVE-2018-19300",
|
||||
"STATE" : "RESERVED"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user