diff --git a/1999/0xxx/CVE-1999-0060.json b/1999/0xxx/CVE-1999-0060.json new file mode 100644 index 00000000000..3b4d9e56183 --- /dev/null +++ b/1999/0xxx/CVE-1999-0060.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0060", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.ascend.com/2695.html", + "url": "http://www.ascend.com/2695.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0064.json b/1999/0xxx/CVE-1999-0064.json new file mode 100644 index 00000000000..94a2cec061b --- /dev/null +++ b/1999/0xxx/CVE-1999-0064.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0064", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://marc.info/?l=bugtraq&m=87602167418428&w=2", + "url": "https://marc.info/?l=bugtraq&m=87602167418428&w=2" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in AIX lquerylv program gives root access to local users." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0074.json b/1999/0xxx/CVE-1999-0074.json new file mode 100644 index 00000000000..54813ebbe8e --- /dev/null +++ b/1999/0xxx/CVE-1999-0074.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0074", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0074", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0074" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Listening TCP ports are sequentially allocated, allowing spoofing attacks." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0080.json b/1999/0xxx/CVE-1999-0080.json new file mode 100644 index 00000000000..7f1d008d68c --- /dev/null +++ b/1999/0xxx/CVE-1999-0080.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0080", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://archive.nanog.org/mailinglist/mailarchives/old_archive/1995-11/msg00385.html", + "url": "https://archive.nanog.org/mailinglist/mailarchives/old_archive/1995-11/msg00385.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the \"site exec\" command." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0081.json b/1999/0xxx/CVE-1999-0081.json new file mode 100644 index 00000000000..0cc486c57cf --- /dev/null +++ b/1999/0xxx/CVE-1999-0081.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0081", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0081", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0081" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "wu-ftp allows files to be overwritten via the rnfr command." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0083.json b/1999/0xxx/CVE-1999-0083.json new file mode 100644 index 00000000000..d470434f903 --- /dev/null +++ b/1999/0xxx/CVE-1999-0083.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0083", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0083", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0083" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "getcwd() file descriptor leak in FTP." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0119.json b/1999/0xxx/CVE-1999-0119.json new file mode 100644 index 00000000000..e1c5ee41d5a --- /dev/null +++ b/1999/0xxx/CVE-1999-0119.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0119", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows NT 4.0 beta allows users to read and delete shares." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0129.json b/1999/0xxx/CVE-1999-0129.json new file mode 100644 index 00000000000..7d6bbc48786 --- /dev/null +++ b/1999/0xxx/CVE-1999-0129.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0129", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.cert.org/advisories/CA-1996-25.html", + "url": "http://www.cert.org/advisories/CA-1996-25.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0197.json b/1999/0xxx/CVE-1999-0197.json new file mode 100644 index 00000000000..412743bfa41 --- /dev/null +++ b/1999/0xxx/CVE-1999-0197.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0197", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8378", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8378" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "finger 0@host on some systems may print information on some user accounts." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0198.json b/1999/0xxx/CVE-1999-0198.json new file mode 100644 index 00000000000..212d2cc91a9 --- /dev/null +++ b/1999/0xxx/CVE-1999-0198.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0198", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8378", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8378" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "finger .@host on some systems may print information on some user accounts." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0200.json b/1999/0xxx/CVE-1999-0200.json new file mode 100644 index 00000000000..b12bccb83f6 --- /dev/null +++ b/1999/0xxx/CVE-1999-0200.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0200", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.microsoft.com/technet/support/kb.asp?ID=137853", + "url": "http://www.microsoft.com/technet/support/kb.asp?ID=137853" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows NT FTP server (WFTP) with the guest account enabled without a password allows an attacker to log into the FTP server using any username and password." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0213.json b/1999/0xxx/CVE-1999-0213.json new file mode 100644 index 00000000000..fdca72cff61 --- /dev/null +++ b/1999/0xxx/CVE-1999-0213.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0213", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/9749", + "url": "http://www.securityfocus.com/archive/1/9749" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "libnsl in Solaris allowed an attacker to perform a denial of service of rpcbind." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0222.json b/1999/0xxx/CVE-1999-0222.json new file mode 100644 index 00000000000..b1964cdc693 --- /dev/null +++ b/1999/0xxx/CVE-1999-0222.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0222", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/60159", + "url": "http://www.securityfocus.com/archive/1/60159" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Denial of service in Cisco IOS web server allows attackers to reboot the router using a long URL." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0243.json b/1999/0xxx/CVE-1999-0243.json new file mode 100644 index 00000000000..2f528d17fbf --- /dev/null +++ b/1999/0xxx/CVE-1999-0243.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0243", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.geocrawler.com/archives/3/92/1996/9/0/2217716/", + "url": "http://www.geocrawler.com/archives/3/92/1996/9/0/2217716/" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Linux cfingerd could be exploited to gain root access." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0253.json b/1999/0xxx/CVE-1999-0253.json new file mode 100644 index 00000000000..ba77838f73f --- /dev/null +++ b/1999/0xxx/CVE-1999-0253.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0253", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/1814", + "url": "http://www.securityfocus.com/bid/1814" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IIS 3.0 with the iis-fix hotfix installed allows remote intruders to read source code for ASP programs by using a %2e instead of a . (dot) in the URL." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0258.json b/1999/0xxx/CVE-1999-0258.json new file mode 100644 index 00000000000..75cb1e6110e --- /dev/null +++ b/1999/0xxx/CVE-1999-0258.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0258", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://marc.info/?l=ntbugtraq&m=88901842000424&w=2", + "url": "https://marc.info/?l=ntbugtraq&m=88901842000424&w=2" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Bonk variation of teardrop IP fragmentation denial of service." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0287.json b/1999/0xxx/CVE-1999-0287.json new file mode 100644 index 00000000000..9fe2aa49129 --- /dev/null +++ b/1999/0xxx/CVE-1999-0287.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0287", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://marc.info/?l=ntbugtraq&m=92368828704896&w=2", + "url": "https://marc.info/?l=ntbugtraq&m=92368828704896&w=2" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Vulnerability in the Wguest CGI program." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0330.json b/1999/0xxx/CVE-1999-0330.json new file mode 100644 index 00000000000..40b7590a50c --- /dev/null +++ b/1999/0xxx/CVE-1999-0330.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0330", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://marc.info/?l=bugtraq&m=87602558319119&w=2", + "url": "https://marc.info/?l=bugtraq&m=87602558319119&w=2" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Linux bdash game has a buffer overflow that allows local users to gain root access." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0345.json b/1999/0xxx/CVE-1999-0345.json new file mode 100644 index 00000000000..05741c2c2fb --- /dev/null +++ b/1999/0xxx/CVE-1999-0345.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0345", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.securityfocus.com/archive/1/62170", + "url": "http://www.securityfocus.com/archive/1/62170" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0391.json b/1999/0xxx/CVE-1999-0391.json new file mode 100644 index 00000000000..217eb3158b8 --- /dev/null +++ b/1999/0xxx/CVE-1999-0391.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0391", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://marc.info/?l=bugtraq&m=91552769809542&w=2", + "url": "https://marc.info/?l=bugtraq&m=91552769809542&w=2" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0394.json b/1999/0xxx/CVE-1999-0394.json new file mode 100644 index 00000000000..e8a654ceda3 --- /dev/null +++ b/1999/0xxx/CVE-1999-0394.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0394", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://marc.info/?l=bugtraq&m=91651770630788&w=2", + "url": "https://marc.info/?l=bugtraq&m=91651770630788&w=2" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "DPEC Online Courseware allows an attacker to change another user's password without knowing the original password." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0454.json b/1999/0xxx/CVE-1999-0454.json new file mode 100644 index 00000000000..e410d6826e7 --- /dev/null +++ b/1999/0xxx/CVE-1999-0454.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0454", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0495.json b/1999/0xxx/CVE-1999-0495.json new file mode 100644 index 00000000000..200fee21646 --- /dev/null +++ b/1999/0xxx/CVE-1999-0495.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0495", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/837", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/837" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A remote attacker can gain access to a file system using .. (dot dot) when accessing SMB shares." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0509.json b/1999/0xxx/CVE-1999-0509.json new file mode 100644 index 00000000000..2f1d4d56353 --- /dev/null +++ b/1999/0xxx/CVE-1999-0509.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0509", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/146", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/146" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a WWW site, which allows remote attackers to execute arbitrary commands." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0520.json b/1999/0xxx/CVE-1999-0520.json new file mode 100644 index 00000000000..e3e4f4208d4 --- /dev/null +++ b/1999/0xxx/CVE-1999-0520.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0520", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A system-critical NETBIOS/SMB share has inappropriate access control." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0521.json b/1999/0xxx/CVE-1999-0521.json new file mode 100644 index 00000000000..b78a5943285 --- /dev/null +++ b/1999/0xxx/CVE-1999-0521.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0521", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.cert.org/advisories/CA-1992-13.html", + "url": "http://www.cert.org/advisories/CA-1992-13.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An NIS domain name is easily guessable." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0527.json b/1999/0xxx/CVE-1999-0527.json new file mode 100644 index 00000000000..f67ef80510d --- /dev/null +++ b/1999/0xxx/CVE-1999-0527.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0527", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6253", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6253" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as \"ls\" can be overwritten." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0528.json b/1999/0xxx/CVE-1999-0528.json new file mode 100644 index 00000000000..be5ba860258 --- /dev/null +++ b/1999/0xxx/CVE-1999-0528.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0528", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8372", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8372" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0530.json b/1999/0xxx/CVE-1999-0530.json new file mode 100644 index 00000000000..f4b4bab4d02 --- /dev/null +++ b/1999/0xxx/CVE-1999-0530.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0530", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/778", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/778" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A system is operating in \"promiscuous\" mode which allows it to perform packet sniffing." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0539.json b/1999/0xxx/CVE-1999-0539.json new file mode 100644 index 00000000000..e925f23a67e --- /dev/null +++ b/1999/0xxx/CVE-1999-0539.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0539", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/723", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/723" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A trust relationship exists between two Unix hosts." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0547.json b/1999/0xxx/CVE-1999-0547.json new file mode 100644 index 00000000000..441869a6f9f --- /dev/null +++ b/1999/0xxx/CVE-1999-0547.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0547", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/315", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/315" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An SSH server allows authentication through the .rhosts file." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0556.json b/1999/0xxx/CVE-1999-0556.json new file mode 100644 index 00000000000..19b913f6b74 --- /dev/null +++ b/1999/0xxx/CVE-1999-0556.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0556", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/876", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/876" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Two or more Unix accounts have the same UID." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0572.json b/1999/0xxx/CVE-1999-0572.json new file mode 100644 index 00000000000..393eb0e5df4 --- /dev/null +++ b/1999/0xxx/CVE-1999-0572.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0572", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/178", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/178" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": ".reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0578.json b/1999/0xxx/CVE-1999-0578.json new file mode 100644 index 00000000000..3c081e17ed5 --- /dev/null +++ b/1999/0xxx/CVE-1999-0578.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0578", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0579.json b/1999/0xxx/CVE-1999-0579.json new file mode 100644 index 00000000000..0e91f66e35d --- /dev/null +++ b/1999/0xxx/CVE-1999-0579.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0579", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0583.json b/1999/0xxx/CVE-1999-0583.json new file mode 100644 index 00000000000..3519ba49a1f --- /dev/null +++ b/1999/0xxx/CVE-1999-0583.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0583", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1284", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1284" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "There is a one-way or two-way trust relationship between Windows NT domains." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0584.json b/1999/0xxx/CVE-1999-0584.json new file mode 100644 index 00000000000..5dbb87fc2cd --- /dev/null +++ b/1999/0xxx/CVE-1999-0584.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0584", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/195", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/195" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A Windows NT file system is not NTFS." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0590.json b/1999/0xxx/CVE-1999-0590.json new file mode 100644 index 00000000000..3c69a4f5af0 --- /dev/null +++ b/1999/0xxx/CVE-1999-0590.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0590", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://ciac.llnl.gov/ciac/bulletins/j-043.shtml", + "url": "http://ciac.llnl.gov/ciac/bulletins/j-043.shtml" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A system does not present an appropriate legal message or warning to a user who is accessing it." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0592.json b/1999/0xxx/CVE-1999-0592.json new file mode 100644 index 00000000000..e72b03fc8e0 --- /dev/null +++ b/1999/0xxx/CVE-1999-0592.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0592", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1353", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1353" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Logon box of a Windows NT system displays the name of the last user who logged in." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0594.json b/1999/0xxx/CVE-1999-0594.json new file mode 100644 index 00000000000..25260fa24d9 --- /dev/null +++ b/1999/0xxx/CVE-1999-0594.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0594", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1294", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1294" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A Windows NT system does not restrict access to removable media drives such as a floppy disk drive or CDROM drive." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0595.json b/1999/0xxx/CVE-1999-0595.json new file mode 100644 index 00000000000..921f1a9e1ca --- /dev/null +++ b/1999/0xxx/CVE-1999-0595.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0595", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/216", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/216" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0596.json b/1999/0xxx/CVE-1999-0596.json new file mode 100644 index 00000000000..d64471a9bfb --- /dev/null +++ b/1999/0xxx/CVE-1999-0596.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0596", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2577", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2577" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A Windows NT log file has an inappropriate maximum size or retention period." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0597.json b/1999/0xxx/CVE-1999-0597.json new file mode 100644 index 00000000000..8e64f0ba779 --- /dev/null +++ b/1999/0xxx/CVE-1999-0597.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0597", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1343", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1343" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A Windows NT account policy does not forcibly disconnect remote users from the server when their logon hours expire." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0598.json b/1999/0xxx/CVE-1999-0598.json new file mode 100644 index 00000000000..e0ce948991d --- /dev/null +++ b/1999/0xxx/CVE-1999-0598.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0598", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html", + "url": "http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A network intrusion detection system (IDS) does not properly handle packets that are sent out of order, allowing an attacker to escape detection." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0599.json b/1999/0xxx/CVE-1999-0599.json new file mode 100644 index 00000000000..a93c9c10fce --- /dev/null +++ b/1999/0xxx/CVE-1999-0599.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0599", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html", + "url": "http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A network intrusion detection system (IDS) does not properly handle packets with improper sequence numbers." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0600.json b/1999/0xxx/CVE-1999-0600.json new file mode 100644 index 00000000000..9b6ff46e6ca --- /dev/null +++ b/1999/0xxx/CVE-1999-0600.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0600", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html", + "url": "http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A network intrusion detection system (IDS) does not verify the checksum on a packet." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0601.json b/1999/0xxx/CVE-1999-0601.json new file mode 100644 index 00000000000..d3f8394c53d --- /dev/null +++ b/1999/0xxx/CVE-1999-0601.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0601", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html", + "url": "http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A network intrusion detection system (IDS) does not properly handle data within TCP handshake packets." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0602.json b/1999/0xxx/CVE-1999-0602.json new file mode 100644 index 00000000000..10f8335fcec --- /dev/null +++ b/1999/0xxx/CVE-1999-0602.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0602", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html", + "url": "http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A network intrusion detection system (IDS) does not properly reassemble fragmented packets." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0630.json b/1999/0xxx/CVE-1999-0630.json new file mode 100644 index 00000000000..1c79952fa41 --- /dev/null +++ b/1999/0xxx/CVE-1999-0630.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0630", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp", + "url": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The NT Alerter and Messenger services are running." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0651.json b/1999/0xxx/CVE-1999-0651.json new file mode 100644 index 00000000000..ba3bde302c1 --- /dev/null +++ b/1999/0xxx/CVE-1999-0651.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0651", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2995", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2995" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The rsh/rlogin service is running." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0667.json b/1999/0xxx/CVE-1999-0667.json new file mode 100644 index 00000000000..4105b67cc6b --- /dev/null +++ b/1999/0xxx/CVE-1999-0667.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0667", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://marc.info/?l=bugtraq&m=87602880019797&w=2", + "url": "https://marc.info/?l=bugtraq&m=87602880019797&w=2" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0748.json b/1999/0xxx/CVE-1999-0748.json new file mode 100644 index 00000000000..9780ad1d700 --- /dev/null +++ b/1999/0xxx/CVE-1999-0748.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0748", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://www.redhat.com/support/errata/RHSA1999017_01.html", + "url": "http://www.redhat.com/support/errata/RHSA1999017_01.html" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflows in Red Hat net-tools package." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0767.json b/1999/0xxx/CVE-1999-0767.json new file mode 100644 index 00000000000..c058851adb1 --- /dev/null +++ b/1999/0xxx/CVE-1999-0767.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0767", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://marc.info/?l=bugtraq&m=87602167420557&w=2", + "url": "https://marc.info/?l=bugtraq&m=87602167420557&w=2" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in Solaris libc, ufsrestore, and rcp via LC_MESSAGES environmental variable." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0846.json b/1999/0xxx/CVE-1999-0846.json new file mode 100644 index 00000000000..55ac5e8fe31 --- /dev/null +++ b/1999/0xxx/CVE-1999-0846.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0846", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://marc.info/?l=bugtraq&m=94398020817351&w=2", + "url": "https://marc.info/?l=bugtraq&m=94398020817351&w=2" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Denial of service in MDaemon 2.7 via a large number of connection attempts." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0847.json b/1999/0xxx/CVE-1999-0847.json new file mode 100644 index 00000000000..c4010e5a333 --- /dev/null +++ b/1999/0xxx/CVE-1999-0847.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0847", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://marc.info/?l=bugtraq&m=94407791819019&w=2", + "url": "https://marc.info/?l=bugtraq&m=94407791819019&w=2" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in free internet chess server (FICS) program, xboard." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0856.json b/1999/0xxx/CVE-1999-0856.json new file mode 100644 index 00000000000..921058e3ebd --- /dev/null +++ b/1999/0xxx/CVE-1999-0856.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0856", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://marc.info/?l=bugtraq&m=94416739411280&w=2", + "url": "https://marc.info/?l=bugtraq&m=94416739411280&w=2" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "login in Slackware 7.0 allows remote attackers to identify valid users on the system by reporting an encryption error when an account is locked or does not exist." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0868.json b/1999/0xxx/CVE-1999-0868.json new file mode 100644 index 00000000000..c3f7eeea30d --- /dev/null +++ b/1999/0xxx/CVE-1999-0868.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0868", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cs.ait.ac.th/joomla3/index.php/security-advisories?CERT/CA97/msg00027.shtml", + "url": "https://www.cs.ait.ac.th/joomla3/index.php/security-advisories?CERT/CA97/msg00027.shtml" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN." + } + ] + } +} \ No newline at end of file diff --git a/2000/0xxx/CVE-2000-0017.json b/2000/0xxx/CVE-2000-0017.json new file mode 100644 index 00000000000..3d6e1d20099 --- /dev/null +++ b/2000/0xxx/CVE-2000-0017.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2000-0017", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://marc.info/?l=bugtraq&m=94580196627059&w=2", + "url": "https://marc.info/?l=bugtraq&m=94580196627059&w=2" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in Linux linuxconf package allows remote attackers to gain root privileges via a long parameter." + } + ] + } +} \ No newline at end of file diff --git a/2000/0xxx/CVE-2000-0115.json b/2000/0xxx/CVE-2000-0115.json new file mode 100644 index 00000000000..28b76eef701 --- /dev/null +++ b/2000/0xxx/CVE-2000-0115.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2000-0115", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://marc.info/?l=ntbugtraq&m=94881904724731&w=2", + "url": "https://marc.info/?l=ntbugtraq&m=94881904724731&w=2" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IIS allows local users to cause a denial of service via invalid regular expressions in a Visual Basic script in an ASP page." + } + ] + } +} \ No newline at end of file diff --git a/2001/0xxx/CVE-2001-0352.json b/2001/0xxx/CVE-2001-0352.json new file mode 100644 index 00000000000..4215ecdd610 --- /dev/null +++ b/2001/0xxx/CVE-2001-0352.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2001-0352", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6232", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6232" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SNMP agents in 3Com AirConnect AP-4111 and Symbol 41X1 Access Point allow remote attackers to obtain the WEP encryption key by reading it from a MIB when the value should be write-only, via (1) dot11WEPDefaultKeyValue in the dot11WEPDefaultKeysTable of the IEEE 802.11b MIB, or (2) ap128bWepKeyValue in the ap128bWEPKeyTable in the Symbol MIB." + } + ] + } +} \ No newline at end of file