- Synchronized data.

This commit is contained in:
CVE Team 2018-11-15 17:06:22 -05:00
parent ffb18bd6fc
commit 71d424342e
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
61 changed files with 183 additions and 62 deletions

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-1999-0734",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "A default configuration of CiscoSecure Access Control Server (ACS) allows remote users to modify the server database without authentication."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "19990819 CiscoSecure Access Control Server for UNIX Remote Administration Vulnerability",
"refsource" : "CISCO",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-19990819-dbaccess"
},
{
"name" : "ciscosecure-read-write(3133)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/3133"
}
]
}
}

View File

@ -58,7 +58,7 @@
"url" : "http://marc.info/?l=bugtraq&m=94217006208374&w=2" "url" : "http://marc.info/?l=bugtraq&m=94217006208374&w=2"
}, },
{ {
"name" : "19991109 Re: BigIP - bigconf.cgi holes ", "name" : "19991109 Re: BigIP - bigconf.cgi holes",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=94217879020184&w=2" "url" : "http://marc.info/?l=bugtraq&m=94217879020184&w=2"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20000324 AnalogX SimpleServer 1.03 Remote Crash\" at: ", "name" : "20000324 AnalogX SimpleServer 1.03 Remote Crash\" at:",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=web-5645555@post2.rnci.com" "url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=web-5645555@post2.rnci.com"
}, },

View File

@ -63,7 +63,7 @@
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html"
}, },
{ {
"name" : "20010212 Re: Symantec pcAnywhere 9.0 DoS / Buffer Overflow ", "name" : "20010212 Re: Symantec pcAnywhere 9.0 DoS / Buffer Overflow",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html"
}, },

View File

@ -58,7 +58,7 @@
"url" : "http://marc.info/?l=bugtraq&m=95878603510835&w=2" "url" : "http://marc.info/?l=bugtraq&m=95878603510835&w=2"
}, },
{ {
"name" : "20000522 RFP2K05 - NetProwler \"Fragmentation\" Issue ", "name" : "20000522 RFP2K05 - NetProwler \"Fragmentation\" Issue",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=392AD3B3.3E9BE3EA@axent.com" "url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=392AD3B3.3E9BE3EA@axent.com"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20000525 DST2K0003 : Buffer Overrun in NAI WebShield SMTP v4.5.44 Managem ent Tool ", "name" : "20000525 DST2K0003 : Buffer Overrun in NAI WebShield SMTP v4.5.44 Managem ent Tool",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A@exchange.servers.delphis.net" "url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A@exchange.servers.delphis.net"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20000525 DST2K0003 : Buffer Overrun in NAI WebShield SMTP v4.5.44 Managem ent Tool ", "name" : "20000525 DST2K0003 : Buffer Overrun in NAI WebShield SMTP v4.5.44 Managem ent Tool",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A@exchange.servers.delphis.net" "url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A@exchange.servers.delphis.net"
}, },

View File

@ -58,7 +58,7 @@
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-06/0247.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2000-06/0247.html"
}, },
{ {
"name" : "20000628 dhcp client: remote root exploit in dhcp client ", "name" : "20000628 dhcp client: remote root exploit in dhcp client",
"refsource" : "DEBIAN", "refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2000/20000628" "url" : "http://www.debian.org/security/2000/20000628"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20000708 gnu-pop3d (FTGate problem), Savant Webserver, Guild FTPd ", "name" : "20000708 gnu-pop3d (FTGate problem), Savant Webserver, Guild FTPd",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0114.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0114.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20000708 gnu-pop3d (FTGate problem), Savant Webserver, Guild FTPd ", "name" : "20000708 gnu-pop3d (FTGate problem), Savant Webserver, Guild FTPd",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0114.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0114.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20000912 (SRADV00003) Arbitrary file disclosure through IMP ", "name" : "20000912 (SRADV00003) Arbitrary file disclosure through IMP",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/82088" "url" : "http://www.securityfocus.com/archive/1/82088"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20001129 Windows 2000 Telnet Service DoS ", "name" : "20001129 Windows 2000 Telnet Service DoS",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/147914" "url" : "http://www.securityfocus.com/archive/1/147914"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20001201 Fixed local AIX V43 vulnerabilities ", "name" : "20001201 Fixed local AIX V43 vulnerabilities",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=97569466809056&w=2" "url" : "http://marc.info/?l=bugtraq&m=97569466809056&w=2"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20001108 [CORE SDI ADVISORY] MS NT4.0 Terminal Server Edition GINA buffer overflow ", "name" : "20001108 [CORE SDI ADVISORY] MS NT4.0 Terminal Server Edition GINA buffer overflow",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/143991" "url" : "http://www.securityfocus.com/archive/1/143991"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010108 def-2001-02: IBM Websphere 3.52 Kernel Leak DoS ", "name" : "20010108 def-2001-02: IBM Websphere 3.52 Kernel Leak DoS",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0079.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0079.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010109 Oracle XSQL servlet and xml-stylesheet allow executing java on the web server ", "name" : "20010109 Oracle XSQL servlet and xml-stylesheet allow executing java on the web server",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=97906670012796&w=2" "url" : "http://marc.info/?l=bugtraq&m=97906670012796&w=2"
}, },

View File

@ -58,12 +58,12 @@
"url" : "http://www.securityfocus.com/archive/1/152206" "url" : "http://www.securityfocus.com/archive/1/152206"
}, },
{ {
"name" : "20010109 Memory leakage in ProFTPd leads to remote DoS (SIZE FTP); (Exploit Code) ", "name" : "20010109 Memory leakage in ProFTPd leads to remote DoS (SIZE FTP); (Exploit Code)",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0122.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0122.html"
}, },
{ {
"name" : "20010110 Re: Memory leakage in ProFTPd leads to remote DoS (SIZE FTP); (Exploit Code) ", "name" : "20010110 Re: Memory leakage in ProFTPd leads to remote DoS (SIZE FTP); (Exploit Code)",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0132.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0132.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010115 Windows Media Player 7 and IE java vulnerability - executing arbitrary programs ", "name" : "20010115 Windows Media Player 7 and IE java vulnerability - executing arbitrary programs",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=97958100816503&w=2" "url" : "http://marc.info/?l=bugtraq&m=97958100816503&w=2"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010330 Serious Pitbull LX Vulnerability ", "name" : "20010330 Serious Pitbull LX Vulnerability",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0475.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0475.html"
}, },

View File

@ -73,7 +73,7 @@
"url" : "http://marc.info/?l=bugtraq&m=98865027328391&w=2" "url" : "http://marc.info/?l=bugtraq&m=98865027328391&w=2"
}, },
{ {
"name" : "20010501 Re: Proof of concept DoS against novell border manager enterprise edition 3.5 ", "name" : "20010501 Re: Proof of concept DoS against novell border manager enterprise edition 3.5",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0000.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0000.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010424 Advisory for Small HTTP Server ", "name" : "20010424 Advisory for Small HTTP Server",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0428.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0428.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010424 IPSwitch IMail 6.06 SMTP Remote System Access Vulnerability ", "name" : "20010424 IPSwitch IMail 6.06 SMTP Remote System Access Vulnerability",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0433.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0433.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010426 Vulnerability in WebXQ Server ", "name" : "20010426 Vulnerability in WebXQ Server",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0490.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0490.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010528 [synnergy] - Solaris mailtool(1) buffer overflow vulnerability ", "name" : "20010528 [synnergy] - Solaris mailtool(1) buffer overflow vulnerability",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0258.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0258.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010515 DCForum Password File Manipukation Vulnerability (qDefense Advisory Number QDAV-5-2000-2) ", "name" : "20010515 DCForum Password File Manipukation Vulnerability (qDefense Advisory Number QDAV-5-2000-2)",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0122.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0122.html"
}, },

View File

@ -53,12 +53,12 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010604 SSH allows deletion of other users files... ", "name" : "20010604 SSH allows deletion of other users files...",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0322.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0322.html"
}, },
{ {
"name" : "20010604 Re: SSH allows deletion of other users files... ", "name" : "20010604 Re: SSH allows deletion of other users files...",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0007.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0007.html"
}, },

View File

@ -53,12 +53,12 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010528 Vulnerability discovered in SpearHead NetGap ", "name" : "20010528 Vulnerability discovered in SpearHead NetGap",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0256.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0256.html"
}, },
{ {
"name" : "20010607 SpearHead Security NetGAP ", "name" : "20010607 SpearHead Security NetGAP",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0047.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0047.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010507 Advisory for Jana server ", "name" : "20010507 Advisory for Jana server",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0086.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0086.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010210 vixie cron possible local root compromise ", "name" : "20010210 vixie cron possible local root compromise",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0197.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0197.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010507 Advisory for Electrocomm 2.0 ", "name" : "20010507 Advisory for Electrocomm 2.0",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0049.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0049.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010225 APC web/snmp/telnet management card dos ", "name" : "20010225 APC web/snmp/telnet management card dos",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0436.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0436.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010502 Solaris mailx Vulnerability ", "name" : "20010502 Solaris mailx Vulnerability",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0016.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0016.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010320 def-2001-13: NTMail Web Services DoS ", "name" : "20010320 def-2001-13: NTMail Web Services DoS",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0248.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0248.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010330 STAT Security Advisory: Trend Micro's ScanMail for Exchange store s passwords in registry unprotected ", "name" : "20010330 STAT Security Advisory: Trend Micro's ScanMail for Exchange store s passwords in registry unprotected",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/ntbugtraq/2001-q1/0049.html" "url" : "http://archives.neohapsis.com/archives/ntbugtraq/2001-q1/0049.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010326 Netscreen: DMZ Network Receives Some \"Denied\" Traffic ", "name" : "20010326 Netscreen: DMZ Network Receives Some \"Denied\" Traffic",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010403 Re: Tomcat may reveal script source code by URL trickery ", "name" : "20010403 Re: Tomcat may reveal script source code by URL trickery",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010212 Patch for Potential Vulnerability in the execution of JSPs outside doc_root ", "name" : "20010212 Patch for Potential Vulnerability in the execution of JSPs outside doc_root",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0239.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0239.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010327 advisory ", "name" : "20010327 advisory",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0395.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-03/0395.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010411 [LSD] Solaris kcsSUNWIOsolf.so and dtsession vulnerabilities ", "name" : "20010411 [LSD] Solaris kcsSUNWIOsolf.so and dtsession vulnerabilities",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0203.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0203.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010516 Remote Desktop DoS ", "name" : "20010516 Remote Desktop DoS",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0158.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0158.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010515 OmniHTTPd Pro Denial of Service Vulnerability ", "name" : "20010515 OmniHTTPd Pro Denial of Service Vulnerability",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0131.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0131.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010525 Security Bug in InoculateIT for Linux (fwd) ", "name" : "20010525 Security Bug in InoculateIT for Linux (fwd)",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0245.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0245.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010522 [SRT2001-09] - vi and crontab -e /tmp issues ", "name" : "20010522 [SRT2001-09] - vi and crontab -e /tmp issues",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0220.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0220.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010523 HP OpenView NNM v6.1 buffer overflow ", "name" : "20010523 HP OpenView NNM v6.1 buffer overflow",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0226.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0226.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010523 Vulnerability in viewsrc.cgi ", "name" : "20010523 Vulnerability in viewsrc.cgi",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0231.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0231.html"
}, },

View File

@ -53,12 +53,12 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010221 FirstClass Internetgateway \"stupidity\" ", "name" : "20010221 FirstClass Internetgateway \"stupidity\"",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0376.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0376.html"
}, },
{ {
"name" : "20010226 Re: [Fwd: FirstClass Internetgateway \"stupidity\"] ", "name" : "20010226 Re: [Fwd: FirstClass Internetgateway \"stupidity\"]",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0440.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0440.html"
}, },

View File

@ -53,12 +53,12 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010220 Advisory: Chili!Soft ASP Multiple Vulnerabilities ", "name" : "20010220 Advisory: Chili!Soft ASP Multiple Vulnerabilities",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0378.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0378.html"
}, },
{ {
"name" : "20010226 Re: Advisory: Chili!Soft ASP Multiple Vulnerabilities ", "name" : "20010226 Re: Advisory: Chili!Soft ASP Multiple Vulnerabilities",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0443.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0443.html"
}, },

View File

@ -63,7 +63,7 @@
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0381.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0381.html"
}, },
{ {
"name" : "20010423 Re: SECURITY.NNOV: The Bat! <cr> bug ", "name" : "20010423 Re: SECURITY.NNOV: The Bat! <cr> bug",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0410.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0410.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010515 3COM OfficeConnect DSL router vulneratibilities ", "name" : "20010515 3COM OfficeConnect DSL router vulneratibilities",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0115.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0115.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010503 Cisco HSRP Weakness/DoS ", "name" : "20010503 Cisco HSRP Weakness/DoS",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0035.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0035.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010605 SECURITY.NNOV: Netscape 4.7x Messanger user information retrival ", "name" : "20010605 SECURITY.NNOV: Netscape 4.7x Messanger user information retrival",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0014.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0014.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010608 potential buffer overflow in xinetd-2.1.8.9pre11-1 ", "name" : "20010608 potential buffer overflow in xinetd-2.1.8.9pre11-1",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0064.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0064.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010702 BisonFTP Server V4R1 *.bdl upload Directory Traversal ", "name" : "20010702 BisonFTP Server V4R1 *.bdl upload Directory Traversal",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-07/0025.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-07/0025.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010527 def-2001-27: GuildFTPD Buffer Overflow and Memory Leak DoS ", "name" : "20010527 def-2001-27: GuildFTPD Buffer Overflow and Memory Leak DoS",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0254.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0254.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010527 def-2001-27: GuildFTPD Buffer Overflow and Memory Leak DoS ", "name" : "20010527 def-2001-27: GuildFTPD Buffer Overflow and Memory Leak DoS",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0254.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0254.html"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "20010626 Advisory ", "name" : "20010626 Advisory",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0353.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0353.html"
}, },

View File

@ -58,7 +58,7 @@
"url" : "http://marc.info/?l=bugtraq&m=99358249631139&w=2" "url" : "http://marc.info/?l=bugtraq&m=99358249631139&w=2"
}, },
{ {
"name" : "20011007 OS X 10.1 and localized desktop folder still vulnerable ", "name" : "20011007 OS X 10.1 and localized desktop folder still vulnerable",
"refsource" : "BUGTRAQ", "refsource" : "BUGTRAQ",
"url" : "http://online.securityfocus.com/archive/1/219166" "url" : "http://online.securityfocus.com/archive/1/219166"
}, },

View File

@ -53,7 +53,7 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "CSSA-2001-SCO.15 ", "name" : "CSSA-2001-SCO.15",
"refsource" : "CALDERA", "refsource" : "CALDERA",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-08/0391.html" "url" : "http://archives.neohapsis.com/archives/bugtraq/2001-08/0391.html"
}, },

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-19298",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-19299",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-19300",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}