From 71d424342e5a1aaf021f95ec00abc71cbb1b6352 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 15 Nov 2018 17:06:22 -0500 Subject: [PATCH] - Synchronized data. --- 1999/0xxx/CVE-1999-0734.json | 67 ++++++++++++++++++++++++++++++++++ 1999/1xxx/CVE-1999-1550.json | 2 +- 2000/0xxx/CVE-2000-0243.json | 2 +- 2000/0xxx/CVE-2000-0324.json | 2 +- 2000/0xxx/CVE-2000-0394.json | 2 +- 2000/0xxx/CVE-2000-0447.json | 2 +- 2000/0xxx/CVE-2000-0448.json | 2 +- 2000/0xxx/CVE-2000-0585.json | 2 +- 2000/0xxx/CVE-2000-0640.json | 2 +- 2000/0xxx/CVE-2000-0641.json | 2 +- 2000/0xxx/CVE-2000-0911.json | 2 +- 2000/1xxx/CVE-2000-1111.json | 2 +- 2000/1xxx/CVE-2000-1119.json | 2 +- 2000/1xxx/CVE-2000-1149.json | 2 +- 2001/0xxx/CVE-2001-0122.json | 2 +- 2001/0xxx/CVE-2001-0126.json | 2 +- 2001/0xxx/CVE-2001-0136.json | 4 +- 2001/0xxx/CVE-2001-0137.json | 2 +- 2001/0xxx/CVE-2001-0482.json | 2 +- 2001/0xxx/CVE-2001-0486.json | 2 +- 2001/0xxx/CVE-2001-0493.json | 2 +- 2001/0xxx/CVE-2001-0494.json | 2 +- 2001/0xxx/CVE-2001-0495.json | 2 +- 2001/0xxx/CVE-2001-0526.json | 2 +- 2001/0xxx/CVE-2001-0527.json | 2 +- 2001/0xxx/CVE-2001-0529.json | 4 +- 2001/0xxx/CVE-2001-0530.json | 4 +- 2001/0xxx/CVE-2001-0558.json | 2 +- 2001/0xxx/CVE-2001-0560.json | 2 +- 2001/0xxx/CVE-2001-0563.json | 2 +- 2001/0xxx/CVE-2001-0564.json | 2 +- 2001/0xxx/CVE-2001-0565.json | 2 +- 2001/0xxx/CVE-2001-0585.json | 2 +- 2001/0xxx/CVE-2001-0586.json | 2 +- 2001/0xxx/CVE-2001-0589.json | 2 +- 2001/0xxx/CVE-2001-0590.json | 2 +- 2001/0xxx/CVE-2001-0591.json | 2 +- 2001/0xxx/CVE-2001-0593.json | 2 +- 2001/0xxx/CVE-2001-0595.json | 2 +- 2001/0xxx/CVE-2001-0612.json | 2 +- 2001/0xxx/CVE-2001-0613.json | 2 +- 2001/0xxx/CVE-2001-0625.json | 2 +- 2001/0xxx/CVE-2001-0627.json | 2 +- 2001/0xxx/CVE-2001-0629.json | 2 +- 2001/0xxx/CVE-2001-0630.json | 2 +- 2001/0xxx/CVE-2001-0631.json | 4 +- 2001/0xxx/CVE-2001-0634.json | 4 +- 2001/0xxx/CVE-2001-0675.json | 2 +- 2001/0xxx/CVE-2001-0740.json | 2 +- 2001/0xxx/CVE-2001-0741.json | 2 +- 2001/0xxx/CVE-2001-0745.json | 2 +- 2001/0xxx/CVE-2001-0763.json | 2 +- 2001/0xxx/CVE-2001-0765.json | 2 +- 2001/0xxx/CVE-2001-0769.json | 2 +- 2001/0xxx/CVE-2001-0770.json | 2 +- 2001/0xxx/CVE-2001-0784.json | 2 +- 2001/0xxx/CVE-2001-0806.json | 2 +- 2001/1xxx/CVE-2001-1153.json | 2 +- 2018/19xxx/CVE-2018-19298.json | 18 +++++++++ 2018/19xxx/CVE-2018-19299.json | 18 +++++++++ 2018/19xxx/CVE-2018-19300.json | 18 +++++++++ 61 files changed, 183 insertions(+), 62 deletions(-) create mode 100644 1999/0xxx/CVE-1999-0734.json create mode 100644 2018/19xxx/CVE-2018-19298.json create mode 100644 2018/19xxx/CVE-2018-19299.json create mode 100644 2018/19xxx/CVE-2018-19300.json diff --git a/1999/0xxx/CVE-1999-0734.json b/1999/0xxx/CVE-1999-0734.json new file mode 100644 index 00000000000..7325fd12477 --- /dev/null +++ b/1999/0xxx/CVE-1999-0734.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-1999-0734", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A default configuration of CiscoSecure Access Control Server (ACS) allows remote users to modify the server database without authentication." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "19990819 CiscoSecure Access Control Server for UNIX Remote Administration Vulnerability", + "refsource" : "CISCO", + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-19990819-dbaccess" + }, + { + "name" : "ciscosecure-read-write(3133)", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/3133" + } + ] + } +} diff --git a/1999/1xxx/CVE-1999-1550.json b/1999/1xxx/CVE-1999-1550.json index 8d83d26daf4..dce17ae13e3 100644 --- a/1999/1xxx/CVE-1999-1550.json +++ b/1999/1xxx/CVE-1999-1550.json @@ -58,7 +58,7 @@ "url" : "http://marc.info/?l=bugtraq&m=94217006208374&w=2" }, { - "name" : "19991109 Re: BigIP - bigconf.cgi holes ", + "name" : "19991109 Re: BigIP - bigconf.cgi holes", "refsource" : "BUGTRAQ", "url" : "http://marc.info/?l=bugtraq&m=94217879020184&w=2" }, diff --git a/2000/0xxx/CVE-2000-0243.json b/2000/0xxx/CVE-2000-0243.json index d86da400e37..7d10a928ecf 100644 --- a/2000/0xxx/CVE-2000-0243.json +++ b/2000/0xxx/CVE-2000-0243.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20000324 AnalogX SimpleServer 1.03 Remote Crash\" at: ", + "name" : "20000324 AnalogX SimpleServer 1.03 Remote Crash\" at:", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=web-5645555@post2.rnci.com" }, diff --git a/2000/0xxx/CVE-2000-0324.json b/2000/0xxx/CVE-2000-0324.json index 8fcb112fd4d..e80bcca993d 100644 --- a/2000/0xxx/CVE-2000-0324.json +++ b/2000/0xxx/CVE-2000-0324.json @@ -63,7 +63,7 @@ "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html" }, { - "name" : "20010212 Re: Symantec pcAnywhere 9.0 DoS / Buffer Overflow ", + "name" : "20010212 Re: Symantec pcAnywhere 9.0 DoS / Buffer Overflow", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html" }, diff --git a/2000/0xxx/CVE-2000-0394.json b/2000/0xxx/CVE-2000-0394.json index 262e0a50468..601d71311cd 100644 --- a/2000/0xxx/CVE-2000-0394.json +++ b/2000/0xxx/CVE-2000-0394.json @@ -58,7 +58,7 @@ "url" : "http://marc.info/?l=bugtraq&m=95878603510835&w=2" }, { - "name" : "20000522 RFP2K05 - NetProwler \"Fragmentation\" Issue ", + "name" : "20000522 RFP2K05 - NetProwler \"Fragmentation\" Issue", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=392AD3B3.3E9BE3EA@axent.com" }, diff --git a/2000/0xxx/CVE-2000-0447.json b/2000/0xxx/CVE-2000-0447.json index f7636d00c35..9d58b53b253 100644 --- a/2000/0xxx/CVE-2000-0447.json +++ b/2000/0xxx/CVE-2000-0447.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20000525 DST2K0003 : Buffer Overrun in NAI WebShield SMTP v4.5.44 Managem ent Tool ", + "name" : "20000525 DST2K0003 : Buffer Overrun in NAI WebShield SMTP v4.5.44 Managem ent Tool", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A@exchange.servers.delphis.net" }, diff --git a/2000/0xxx/CVE-2000-0448.json b/2000/0xxx/CVE-2000-0448.json index 5afb5502100..df2acc46715 100644 --- a/2000/0xxx/CVE-2000-0448.json +++ b/2000/0xxx/CVE-2000-0448.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20000525 DST2K0003 : Buffer Overrun in NAI WebShield SMTP v4.5.44 Managem ent Tool ", + "name" : "20000525 DST2K0003 : Buffer Overrun in NAI WebShield SMTP v4.5.44 Managem ent Tool", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A@exchange.servers.delphis.net" }, diff --git a/2000/0xxx/CVE-2000-0585.json b/2000/0xxx/CVE-2000-0585.json index 288b7c52a78..2737813401a 100644 --- a/2000/0xxx/CVE-2000-0585.json +++ b/2000/0xxx/CVE-2000-0585.json @@ -58,7 +58,7 @@ "url" : "http://archives.neohapsis.com/archives/bugtraq/2000-06/0247.html" }, { - "name" : "20000628 dhcp client: remote root exploit in dhcp client ", + "name" : "20000628 dhcp client: remote root exploit in dhcp client", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2000/20000628" }, diff --git a/2000/0xxx/CVE-2000-0640.json b/2000/0xxx/CVE-2000-0640.json index 051bbc3ca6d..0b1771ba811 100644 --- a/2000/0xxx/CVE-2000-0640.json +++ b/2000/0xxx/CVE-2000-0640.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20000708 gnu-pop3d (FTGate problem), Savant Webserver, Guild FTPd ", + "name" : "20000708 gnu-pop3d (FTGate problem), Savant Webserver, Guild FTPd", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0114.html" }, diff --git a/2000/0xxx/CVE-2000-0641.json b/2000/0xxx/CVE-2000-0641.json index 70fb4835bf4..d119c18e1af 100644 --- a/2000/0xxx/CVE-2000-0641.json +++ b/2000/0xxx/CVE-2000-0641.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20000708 gnu-pop3d (FTGate problem), Savant Webserver, Guild FTPd ", + "name" : "20000708 gnu-pop3d (FTGate problem), Savant Webserver, Guild FTPd", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0114.html" }, diff --git a/2000/0xxx/CVE-2000-0911.json b/2000/0xxx/CVE-2000-0911.json index d7f7292374d..ca9b07cf728 100644 --- a/2000/0xxx/CVE-2000-0911.json +++ b/2000/0xxx/CVE-2000-0911.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20000912 (SRADV00003) Arbitrary file disclosure through IMP ", + "name" : "20000912 (SRADV00003) Arbitrary file disclosure through IMP", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/82088" }, diff --git a/2000/1xxx/CVE-2000-1111.json b/2000/1xxx/CVE-2000-1111.json index 211fa51f798..1b706d8d329 100644 --- a/2000/1xxx/CVE-2000-1111.json +++ b/2000/1xxx/CVE-2000-1111.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20001129 Windows 2000 Telnet Service DoS ", + "name" : "20001129 Windows 2000 Telnet Service DoS", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/147914" }, diff --git a/2000/1xxx/CVE-2000-1119.json b/2000/1xxx/CVE-2000-1119.json index d153aae1f74..af1c11e09fa 100644 --- a/2000/1xxx/CVE-2000-1119.json +++ b/2000/1xxx/CVE-2000-1119.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20001201 Fixed local AIX V43 vulnerabilities ", + "name" : "20001201 Fixed local AIX V43 vulnerabilities", "refsource" : "BUGTRAQ", "url" : "http://marc.info/?l=bugtraq&m=97569466809056&w=2" }, diff --git a/2000/1xxx/CVE-2000-1149.json b/2000/1xxx/CVE-2000-1149.json index 0c626a29834..28caacf5d1a 100644 --- a/2000/1xxx/CVE-2000-1149.json +++ b/2000/1xxx/CVE-2000-1149.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20001108 [CORE SDI ADVISORY] MS NT4.0 Terminal Server Edition GINA buffer overflow ", + "name" : "20001108 [CORE SDI ADVISORY] MS NT4.0 Terminal Server Edition GINA buffer overflow", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/143991" }, diff --git a/2001/0xxx/CVE-2001-0122.json b/2001/0xxx/CVE-2001-0122.json index 7ebd4fde2c5..c77046b681b 100644 --- a/2001/0xxx/CVE-2001-0122.json +++ b/2001/0xxx/CVE-2001-0122.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010108 def-2001-02: IBM Websphere 3.52 Kernel Leak DoS ", + "name" : "20010108 def-2001-02: IBM Websphere 3.52 Kernel Leak DoS", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0079.html" }, diff --git a/2001/0xxx/CVE-2001-0126.json b/2001/0xxx/CVE-2001-0126.json index ecb1b79adeb..1351d72120a 100644 --- a/2001/0xxx/CVE-2001-0126.json +++ b/2001/0xxx/CVE-2001-0126.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010109 Oracle XSQL servlet and xml-stylesheet allow executing java on the web server ", + "name" : "20010109 Oracle XSQL servlet and xml-stylesheet allow executing java on the web server", "refsource" : "BUGTRAQ", "url" : "http://marc.info/?l=bugtraq&m=97906670012796&w=2" }, diff --git a/2001/0xxx/CVE-2001-0136.json b/2001/0xxx/CVE-2001-0136.json index 70423f7fd2c..0979c1adafb 100644 --- a/2001/0xxx/CVE-2001-0136.json +++ b/2001/0xxx/CVE-2001-0136.json @@ -58,12 +58,12 @@ "url" : "http://www.securityfocus.com/archive/1/152206" }, { - "name" : "20010109 Memory leakage in ProFTPd leads to remote DoS (SIZE FTP); (Exploit Code) ", + "name" : "20010109 Memory leakage in ProFTPd leads to remote DoS (SIZE FTP); (Exploit Code)", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0122.html" }, { - "name" : "20010110 Re: Memory leakage in ProFTPd leads to remote DoS (SIZE FTP); (Exploit Code) ", + "name" : "20010110 Re: Memory leakage in ProFTPd leads to remote DoS (SIZE FTP); (Exploit Code)", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0132.html" }, diff --git a/2001/0xxx/CVE-2001-0137.json b/2001/0xxx/CVE-2001-0137.json index ec961fcf0cb..78a59fa01cb 100644 --- a/2001/0xxx/CVE-2001-0137.json +++ b/2001/0xxx/CVE-2001-0137.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010115 Windows Media Player 7 and IE java vulnerability - executing arbitrary programs ", + "name" : "20010115 Windows Media Player 7 and IE java vulnerability - executing arbitrary programs", "refsource" : "BUGTRAQ", "url" : "http://marc.info/?l=bugtraq&m=97958100816503&w=2" }, diff --git a/2001/0xxx/CVE-2001-0482.json b/2001/0xxx/CVE-2001-0482.json index 781edb8cc0f..9a662dfd517 100644 --- a/2001/0xxx/CVE-2001-0482.json +++ b/2001/0xxx/CVE-2001-0482.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010330 Serious Pitbull LX Vulnerability ", + "name" : "20010330 Serious Pitbull LX Vulnerability", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0475.html" }, diff --git a/2001/0xxx/CVE-2001-0486.json b/2001/0xxx/CVE-2001-0486.json index c32680a5301..f2512c4cb7e 100644 --- a/2001/0xxx/CVE-2001-0486.json +++ b/2001/0xxx/CVE-2001-0486.json @@ -73,7 +73,7 @@ "url" : "http://marc.info/?l=bugtraq&m=98865027328391&w=2" }, { - "name" : "20010501 Re: Proof of concept DoS against novell border manager enterprise edition 3.5 ", + "name" : "20010501 Re: Proof of concept DoS against novell border manager enterprise edition 3.5", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0000.html" }, diff --git a/2001/0xxx/CVE-2001-0493.json b/2001/0xxx/CVE-2001-0493.json index deb6fcf1504..fd19aa194ab 100644 --- a/2001/0xxx/CVE-2001-0493.json +++ b/2001/0xxx/CVE-2001-0493.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010424 Advisory for Small HTTP Server ", + "name" : "20010424 Advisory for Small HTTP Server", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0428.html" }, diff --git a/2001/0xxx/CVE-2001-0494.json b/2001/0xxx/CVE-2001-0494.json index 6100c07767a..b89db97f497 100644 --- a/2001/0xxx/CVE-2001-0494.json +++ b/2001/0xxx/CVE-2001-0494.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010424 IPSwitch IMail 6.06 SMTP Remote System Access Vulnerability ", + "name" : "20010424 IPSwitch IMail 6.06 SMTP Remote System Access Vulnerability", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0433.html" }, diff --git a/2001/0xxx/CVE-2001-0495.json b/2001/0xxx/CVE-2001-0495.json index 96a13c7110b..08972081cdf 100644 --- a/2001/0xxx/CVE-2001-0495.json +++ b/2001/0xxx/CVE-2001-0495.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010426 Vulnerability in WebXQ Server ", + "name" : "20010426 Vulnerability in WebXQ Server", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0490.html" }, diff --git a/2001/0xxx/CVE-2001-0526.json b/2001/0xxx/CVE-2001-0526.json index ae011df1914..8fa40188b11 100644 --- a/2001/0xxx/CVE-2001-0526.json +++ b/2001/0xxx/CVE-2001-0526.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010528 [synnergy] - Solaris mailtool(1) buffer overflow vulnerability ", + "name" : "20010528 [synnergy] - Solaris mailtool(1) buffer overflow vulnerability", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0258.html" }, diff --git a/2001/0xxx/CVE-2001-0527.json b/2001/0xxx/CVE-2001-0527.json index acd50a486a4..2c799c4a1e0 100644 --- a/2001/0xxx/CVE-2001-0527.json +++ b/2001/0xxx/CVE-2001-0527.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010515 DCForum Password File Manipukation Vulnerability (qDefense Advisory Number QDAV-5-2000-2) ", + "name" : "20010515 DCForum Password File Manipukation Vulnerability (qDefense Advisory Number QDAV-5-2000-2)", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0122.html" }, diff --git a/2001/0xxx/CVE-2001-0529.json b/2001/0xxx/CVE-2001-0529.json index da49052638a..b76397507d5 100644 --- a/2001/0xxx/CVE-2001-0529.json +++ b/2001/0xxx/CVE-2001-0529.json @@ -53,12 +53,12 @@ "references" : { "reference_data" : [ { - "name" : "20010604 SSH allows deletion of other users files... ", + "name" : "20010604 SSH allows deletion of other users files...", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0322.html" }, { - "name" : "20010604 Re: SSH allows deletion of other users files... ", + "name" : "20010604 Re: SSH allows deletion of other users files...", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0007.html" }, diff --git a/2001/0xxx/CVE-2001-0530.json b/2001/0xxx/CVE-2001-0530.json index 4cce3d53ad3..80804a747e9 100644 --- a/2001/0xxx/CVE-2001-0530.json +++ b/2001/0xxx/CVE-2001-0530.json @@ -53,12 +53,12 @@ "references" : { "reference_data" : [ { - "name" : "20010528 Vulnerability discovered in SpearHead NetGap ", + "name" : "20010528 Vulnerability discovered in SpearHead NetGap", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0256.html" }, { - "name" : "20010607 SpearHead Security NetGAP ", + "name" : "20010607 SpearHead Security NetGAP", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0047.html" }, diff --git a/2001/0xxx/CVE-2001-0558.json b/2001/0xxx/CVE-2001-0558.json index 2758acac73c..9481e765854 100644 --- a/2001/0xxx/CVE-2001-0558.json +++ b/2001/0xxx/CVE-2001-0558.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010507 Advisory for Jana server ", + "name" : "20010507 Advisory for Jana server", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0086.html" }, diff --git a/2001/0xxx/CVE-2001-0560.json b/2001/0xxx/CVE-2001-0560.json index 0c0f2f556e9..9e05fd21ab9 100644 --- a/2001/0xxx/CVE-2001-0560.json +++ b/2001/0xxx/CVE-2001-0560.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010210 vixie cron possible local root compromise ", + "name" : "20010210 vixie cron possible local root compromise", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0197.html" }, diff --git a/2001/0xxx/CVE-2001-0563.json b/2001/0xxx/CVE-2001-0563.json index 41e81e80e58..65576ba214a 100644 --- a/2001/0xxx/CVE-2001-0563.json +++ b/2001/0xxx/CVE-2001-0563.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010507 Advisory for Electrocomm 2.0 ", + "name" : "20010507 Advisory for Electrocomm 2.0", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0049.html" }, diff --git a/2001/0xxx/CVE-2001-0564.json b/2001/0xxx/CVE-2001-0564.json index 50081ceca46..88f93152058 100644 --- a/2001/0xxx/CVE-2001-0564.json +++ b/2001/0xxx/CVE-2001-0564.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010225 APC web/snmp/telnet management card dos ", + "name" : "20010225 APC web/snmp/telnet management card dos", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0436.html" }, diff --git a/2001/0xxx/CVE-2001-0565.json b/2001/0xxx/CVE-2001-0565.json index 68374578944..d5271b33151 100644 --- a/2001/0xxx/CVE-2001-0565.json +++ b/2001/0xxx/CVE-2001-0565.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010502 Solaris mailx Vulnerability ", + "name" : "20010502 Solaris mailx Vulnerability", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0016.html" }, diff --git a/2001/0xxx/CVE-2001-0585.json b/2001/0xxx/CVE-2001-0585.json index fbb84b1541a..126c7f0c4f7 100644 --- a/2001/0xxx/CVE-2001-0585.json +++ b/2001/0xxx/CVE-2001-0585.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010320 def-2001-13: NTMail Web Services DoS ", + "name" : "20010320 def-2001-13: NTMail Web Services DoS", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0248.html" }, diff --git a/2001/0xxx/CVE-2001-0586.json b/2001/0xxx/CVE-2001-0586.json index 0b1e1c32e27..2e11fc7fb80 100644 --- a/2001/0xxx/CVE-2001-0586.json +++ b/2001/0xxx/CVE-2001-0586.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010330 STAT Security Advisory: Trend Micro's ScanMail for Exchange store s passwords in registry unprotected ", + "name" : "20010330 STAT Security Advisory: Trend Micro's ScanMail for Exchange store s passwords in registry unprotected", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/ntbugtraq/2001-q1/0049.html" }, diff --git a/2001/0xxx/CVE-2001-0589.json b/2001/0xxx/CVE-2001-0589.json index 36c1ed7c174..d28c64fa68e 100644 --- a/2001/0xxx/CVE-2001-0589.json +++ b/2001/0xxx/CVE-2001-0589.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010326 Netscreen: DMZ Network Receives Some \"Denied\" Traffic ", + "name" : "20010326 Netscreen: DMZ Network Receives Some \"Denied\" Traffic", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html" }, diff --git a/2001/0xxx/CVE-2001-0590.json b/2001/0xxx/CVE-2001-0590.json index ffecc08cc71..18b879797d4 100644 --- a/2001/0xxx/CVE-2001-0590.json +++ b/2001/0xxx/CVE-2001-0590.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010403 Re: Tomcat may reveal script source code by URL trickery ", + "name" : "20010403 Re: Tomcat may reveal script source code by URL trickery", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html" }, diff --git a/2001/0xxx/CVE-2001-0591.json b/2001/0xxx/CVE-2001-0591.json index 6ad9df6ba3e..b9d99edda58 100644 --- a/2001/0xxx/CVE-2001-0591.json +++ b/2001/0xxx/CVE-2001-0591.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010212 Patch for Potential Vulnerability in the execution of JSPs outside doc_root ", + "name" : "20010212 Patch for Potential Vulnerability in the execution of JSPs outside doc_root", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0239.html" }, diff --git a/2001/0xxx/CVE-2001-0593.json b/2001/0xxx/CVE-2001-0593.json index 5219e2f93c1..948ad04c88b 100644 --- a/2001/0xxx/CVE-2001-0593.json +++ b/2001/0xxx/CVE-2001-0593.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010327 advisory ", + "name" : "20010327 advisory", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0395.html" }, diff --git a/2001/0xxx/CVE-2001-0595.json b/2001/0xxx/CVE-2001-0595.json index b5f3504f6c8..2eef8736ab7 100644 --- a/2001/0xxx/CVE-2001-0595.json +++ b/2001/0xxx/CVE-2001-0595.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010411 [LSD] Solaris kcsSUNWIOsolf.so and dtsession vulnerabilities ", + "name" : "20010411 [LSD] Solaris kcsSUNWIOsolf.so and dtsession vulnerabilities", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0203.html" }, diff --git a/2001/0xxx/CVE-2001-0612.json b/2001/0xxx/CVE-2001-0612.json index 8671b2e2300..429cb3107c3 100644 --- a/2001/0xxx/CVE-2001-0612.json +++ b/2001/0xxx/CVE-2001-0612.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010516 Remote Desktop DoS ", + "name" : "20010516 Remote Desktop DoS", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0158.html" }, diff --git a/2001/0xxx/CVE-2001-0613.json b/2001/0xxx/CVE-2001-0613.json index 8e8b006efce..6d3996f4845 100644 --- a/2001/0xxx/CVE-2001-0613.json +++ b/2001/0xxx/CVE-2001-0613.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010515 OmniHTTPd Pro Denial of Service Vulnerability ", + "name" : "20010515 OmniHTTPd Pro Denial of Service Vulnerability", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0131.html" }, diff --git a/2001/0xxx/CVE-2001-0625.json b/2001/0xxx/CVE-2001-0625.json index 3c08be738a2..44338c5bb9b 100644 --- a/2001/0xxx/CVE-2001-0625.json +++ b/2001/0xxx/CVE-2001-0625.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010525 Security Bug in InoculateIT for Linux (fwd) ", + "name" : "20010525 Security Bug in InoculateIT for Linux (fwd)", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0245.html" }, diff --git a/2001/0xxx/CVE-2001-0627.json b/2001/0xxx/CVE-2001-0627.json index f1591f18406..1b81ebcf4d5 100644 --- a/2001/0xxx/CVE-2001-0627.json +++ b/2001/0xxx/CVE-2001-0627.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010522 [SRT2001-09] - vi and crontab -e /tmp issues ", + "name" : "20010522 [SRT2001-09] - vi and crontab -e /tmp issues", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0220.html" }, diff --git a/2001/0xxx/CVE-2001-0629.json b/2001/0xxx/CVE-2001-0629.json index fa9ded95a3d..99a5bb8d684 100644 --- a/2001/0xxx/CVE-2001-0629.json +++ b/2001/0xxx/CVE-2001-0629.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010523 HP OpenView NNM v6.1 buffer overflow ", + "name" : "20010523 HP OpenView NNM v6.1 buffer overflow", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0226.html" }, diff --git a/2001/0xxx/CVE-2001-0630.json b/2001/0xxx/CVE-2001-0630.json index bb86178265c..4f3e6287c15 100644 --- a/2001/0xxx/CVE-2001-0630.json +++ b/2001/0xxx/CVE-2001-0630.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010523 Vulnerability in viewsrc.cgi ", + "name" : "20010523 Vulnerability in viewsrc.cgi", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0231.html" }, diff --git a/2001/0xxx/CVE-2001-0631.json b/2001/0xxx/CVE-2001-0631.json index 4e640fb2c0c..27d123f0abc 100644 --- a/2001/0xxx/CVE-2001-0631.json +++ b/2001/0xxx/CVE-2001-0631.json @@ -53,12 +53,12 @@ "references" : { "reference_data" : [ { - "name" : "20010221 FirstClass Internetgateway \"stupidity\" ", + "name" : "20010221 FirstClass Internetgateway \"stupidity\"", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0376.html" }, { - "name" : "20010226 Re: [Fwd: FirstClass Internetgateway \"stupidity\"] ", + "name" : "20010226 Re: [Fwd: FirstClass Internetgateway \"stupidity\"]", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0440.html" }, diff --git a/2001/0xxx/CVE-2001-0634.json b/2001/0xxx/CVE-2001-0634.json index 913ec44b1a0..af45dfd7143 100644 --- a/2001/0xxx/CVE-2001-0634.json +++ b/2001/0xxx/CVE-2001-0634.json @@ -53,12 +53,12 @@ "references" : { "reference_data" : [ { - "name" : "20010220 Advisory: Chili!Soft ASP Multiple Vulnerabilities ", + "name" : "20010220 Advisory: Chili!Soft ASP Multiple Vulnerabilities", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0378.html" }, { - "name" : "20010226 Re: Advisory: Chili!Soft ASP Multiple Vulnerabilities ", + "name" : "20010226 Re: Advisory: Chili!Soft ASP Multiple Vulnerabilities", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0443.html" }, diff --git a/2001/0xxx/CVE-2001-0675.json b/2001/0xxx/CVE-2001-0675.json index f284cfee1b3..df90cecedc5 100644 --- a/2001/0xxx/CVE-2001-0675.json +++ b/2001/0xxx/CVE-2001-0675.json @@ -63,7 +63,7 @@ "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0381.html" }, { - "name" : "20010423 Re: SECURITY.NNOV: The Bat! bug ", + "name" : "20010423 Re: SECURITY.NNOV: The Bat! bug", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0410.html" }, diff --git a/2001/0xxx/CVE-2001-0740.json b/2001/0xxx/CVE-2001-0740.json index 86e2f4a9f96..bea3077cabf 100644 --- a/2001/0xxx/CVE-2001-0740.json +++ b/2001/0xxx/CVE-2001-0740.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010515 3COM OfficeConnect DSL router vulneratibilities ", + "name" : "20010515 3COM OfficeConnect DSL router vulneratibilities", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0115.html" }, diff --git a/2001/0xxx/CVE-2001-0741.json b/2001/0xxx/CVE-2001-0741.json index 4114e099e28..fe72b3f6947 100644 --- a/2001/0xxx/CVE-2001-0741.json +++ b/2001/0xxx/CVE-2001-0741.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010503 Cisco HSRP Weakness/DoS ", + "name" : "20010503 Cisco HSRP Weakness/DoS", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0035.html" }, diff --git a/2001/0xxx/CVE-2001-0745.json b/2001/0xxx/CVE-2001-0745.json index 0e016f80d19..3ca0cdf7b74 100644 --- a/2001/0xxx/CVE-2001-0745.json +++ b/2001/0xxx/CVE-2001-0745.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010605 SECURITY.NNOV: Netscape 4.7x Messanger user information retrival ", + "name" : "20010605 SECURITY.NNOV: Netscape 4.7x Messanger user information retrival", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0014.html" }, diff --git a/2001/0xxx/CVE-2001-0763.json b/2001/0xxx/CVE-2001-0763.json index c98093d4cf1..d3ea4ea489f 100644 --- a/2001/0xxx/CVE-2001-0763.json +++ b/2001/0xxx/CVE-2001-0763.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010608 potential buffer overflow in xinetd-2.1.8.9pre11-1 ", + "name" : "20010608 potential buffer overflow in xinetd-2.1.8.9pre11-1", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0064.html" }, diff --git a/2001/0xxx/CVE-2001-0765.json b/2001/0xxx/CVE-2001-0765.json index b8e6a222a22..da30837ce69 100644 --- a/2001/0xxx/CVE-2001-0765.json +++ b/2001/0xxx/CVE-2001-0765.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010702 BisonFTP Server V4R1 *.bdl upload Directory Traversal ", + "name" : "20010702 BisonFTP Server V4R1 *.bdl upload Directory Traversal", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-07/0025.html" }, diff --git a/2001/0xxx/CVE-2001-0769.json b/2001/0xxx/CVE-2001-0769.json index 97d4de39b05..738474d1ce3 100644 --- a/2001/0xxx/CVE-2001-0769.json +++ b/2001/0xxx/CVE-2001-0769.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010527 def-2001-27: GuildFTPD Buffer Overflow and Memory Leak DoS ", + "name" : "20010527 def-2001-27: GuildFTPD Buffer Overflow and Memory Leak DoS", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0254.html" }, diff --git a/2001/0xxx/CVE-2001-0770.json b/2001/0xxx/CVE-2001-0770.json index 9caae0f06ca..1b48a835fd0 100644 --- a/2001/0xxx/CVE-2001-0770.json +++ b/2001/0xxx/CVE-2001-0770.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010527 def-2001-27: GuildFTPD Buffer Overflow and Memory Leak DoS ", + "name" : "20010527 def-2001-27: GuildFTPD Buffer Overflow and Memory Leak DoS", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0254.html" }, diff --git a/2001/0xxx/CVE-2001-0784.json b/2001/0xxx/CVE-2001-0784.json index 19743eaaeef..558ca077056 100644 --- a/2001/0xxx/CVE-2001-0784.json +++ b/2001/0xxx/CVE-2001-0784.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "20010626 Advisory ", + "name" : "20010626 Advisory", "refsource" : "BUGTRAQ", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0353.html" }, diff --git a/2001/0xxx/CVE-2001-0806.json b/2001/0xxx/CVE-2001-0806.json index 34af029dc3e..db5d2df1a18 100644 --- a/2001/0xxx/CVE-2001-0806.json +++ b/2001/0xxx/CVE-2001-0806.json @@ -58,7 +58,7 @@ "url" : "http://marc.info/?l=bugtraq&m=99358249631139&w=2" }, { - "name" : "20011007 OS X 10.1 and localized desktop folder still vulnerable ", + "name" : "20011007 OS X 10.1 and localized desktop folder still vulnerable", "refsource" : "BUGTRAQ", "url" : "http://online.securityfocus.com/archive/1/219166" }, diff --git a/2001/1xxx/CVE-2001-1153.json b/2001/1xxx/CVE-2001-1153.json index 0a9ff7e7859..5ebf22da917 100644 --- a/2001/1xxx/CVE-2001-1153.json +++ b/2001/1xxx/CVE-2001-1153.json @@ -53,7 +53,7 @@ "references" : { "reference_data" : [ { - "name" : "CSSA-2001-SCO.15 ", + "name" : "CSSA-2001-SCO.15", "refsource" : "CALDERA", "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-08/0391.html" }, diff --git a/2018/19xxx/CVE-2018-19298.json b/2018/19xxx/CVE-2018-19298.json new file mode 100644 index 00000000000..bf7a8693672 --- /dev/null +++ b/2018/19xxx/CVE-2018-19298.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19298", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19299.json b/2018/19xxx/CVE-2018-19299.json new file mode 100644 index 00000000000..4242b67618e --- /dev/null +++ b/2018/19xxx/CVE-2018-19299.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19299", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19300.json b/2018/19xxx/CVE-2018-19300.json new file mode 100644 index 00000000000..02b78a08931 --- /dev/null +++ b/2018/19xxx/CVE-2018-19300.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19300", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}