From 8a44456dc4ea3705f7623b2ba2af8178ec5b902e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 18 Mar 2019 02:34:13 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2004/0xxx/CVE-2004-0244.json | 170 ++++++------- 2004/0xxx/CVE-2004-0266.json | 140 +++++------ 2004/0xxx/CVE-2004-0398.json | 290 +++++++++++----------- 2004/0xxx/CVE-2004-0690.json | 210 ++++++++-------- 2004/0xxx/CVE-2004-0783.json | 280 +++++++++++----------- 2004/1xxx/CVE-2004-1026.json | 170 ++++++------- 2004/1xxx/CVE-2004-1577.json | 130 +++++----- 2004/1xxx/CVE-2004-1758.json | 180 +++++++------- 2004/1xxx/CVE-2004-1896.json | 180 +++++++------- 2004/2xxx/CVE-2004-2351.json | 150 ++++++------ 2008/2xxx/CVE-2008-2496.json | 150 ++++++------ 2008/2xxx/CVE-2008-2657.json | 34 +-- 2008/2xxx/CVE-2008-2771.json | 150 ++++++------ 2008/3xxx/CVE-2008-3149.json | 160 ++++++------- 2008/3xxx/CVE-2008-3840.json | 150 ++++++------ 2008/6xxx/CVE-2008-6491.json | 140 +++++------ 2008/6xxx/CVE-2008-6495.json | 150 ++++++------ 2008/6xxx/CVE-2008-6589.json | 170 ++++++------- 2008/7xxx/CVE-2008-7234.json | 220 ++++++++--------- 2013/2xxx/CVE-2013-2134.json | 180 +++++++------- 2013/2xxx/CVE-2013-2338.json | 130 +++++----- 2013/2xxx/CVE-2013-2490.json | 34 +-- 2013/2xxx/CVE-2013-2777.json | 250 +++++++++---------- 2017/11xxx/CVE-2017-11496.json | 180 +++++++------- 2017/11xxx/CVE-2017-11570.json | 120 +++++----- 2017/14xxx/CVE-2017-14030.json | 130 +++++----- 2017/14xxx/CVE-2017-14130.json | 150 ++++++------ 2017/14xxx/CVE-2017-14338.json | 34 +-- 2017/14xxx/CVE-2017-14793.json | 34 +-- 2017/15xxx/CVE-2017-15126.json | 190 +++++++-------- 2017/15xxx/CVE-2017-15267.json | 160 ++++++------- 2017/15xxx/CVE-2017-15567.json | 120 +++++----- 2017/8xxx/CVE-2017-8064.json | 170 ++++++------- 2017/8xxx/CVE-2017-8392.json | 130 +++++----- 2017/9xxx/CVE-2017-9919.json | 120 +++++----- 2017/9xxx/CVE-2017-9945.json | 130 +++++----- 2018/0xxx/CVE-2018-0619.json | 120 +++++----- 2018/1000xxx/CVE-2018-1000018.json | 134 +++++------ 2018/1000xxx/CVE-2018-1000109.json | 124 +++++----- 2018/1000xxx/CVE-2018-1000181.json | 126 +++++----- 2018/12xxx/CVE-2018-12359.json | 372 ++++++++++++++--------------- 2018/13xxx/CVE-2018-13808.json | 34 +-- 2018/16xxx/CVE-2018-16407.json | 140 +++++------ 2018/16xxx/CVE-2018-16423.json | 140 +++++------ 2018/16xxx/CVE-2018-16498.json | 34 +-- 2018/16xxx/CVE-2018-16615.json | 34 +-- 2018/16xxx/CVE-2018-16826.json | 34 +-- 2018/16xxx/CVE-2018-16853.json | 182 +++++++------- 2018/4xxx/CVE-2018-4149.json | 140 +++++------ 2018/4xxx/CVE-2018-4275.json | 34 +-- 2018/4xxx/CVE-2018-4565.json | 34 +-- 2018/4xxx/CVE-2018-4770.json | 34 +-- 2018/4xxx/CVE-2018-4948.json | 140 +++++------ 2019/9xxx/CVE-2019-9850.json | 18 ++ 54 files changed, 3689 insertions(+), 3671 deletions(-) create mode 100644 2019/9xxx/CVE-2019-9850.json diff --git a/2004/0xxx/CVE-2004-0244.json b/2004/0xxx/CVE-2004-0244.json index fcaf3cf68b1..3e75b4bc752 100644 --- a/2004/0xxx/CVE-2004-0244.json +++ b/2004/0xxx/CVE-2004-0244.json @@ -1,87 +1,87 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2004-0244", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Cisco 6000, 6500, and 7600 series systems with Multilayer Switch Feature Card 2 (MSFC2) and a FlexWAN or OSM module allow local users to cause a denial of service (hang or reset) by sending a layer 2 frame packet that encapsulates a layer 3 packet, but has inconsistent length values with that packet." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2004-0244", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20040203 Cisco 6000/6500/7600 Crafted Layer 2 Frame Vulnerability", - "refsource" : "CISCO", - "url" : "http://www.cisco.com/warp/public/707/cisco-sa-20040203-cat6k.shtml" - }, - { - "name" : "VU#810062", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/810062" - }, - { - "name" : "oval:org.mitre.oval:def:5828", - "refsource" : "OVAL", - "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5828" - }, - { - "name" : "10780", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/10780" - }, - { - "name" : "9562", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/9562" - }, - { - "name" : "cisco-malformed-frame-dos(15013)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15013" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Cisco 6000, 6500, and 7600 series systems with Multilayer Switch Feature Card 2 (MSFC2) and a FlexWAN or OSM module allow local users to cause a denial of service (hang or reset) by sending a layer 2 frame packet that encapsulates a layer 3 packet, but has inconsistent length values with that packet." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "10780", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/10780" + }, + { + "name": "9562", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/9562" + }, + { + "name": "cisco-malformed-frame-dos(15013)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15013" + }, + { + "name": "20040203 Cisco 6000/6500/7600 Crafted Layer 2 Frame Vulnerability", + "refsource": "CISCO", + "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040203-cat6k.shtml" + }, + { + "name": "oval:org.mitre.oval:def:5828", + "refsource": "OVAL", + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5828" + }, + { + "name": "VU#810062", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/810062" + } + ] + } +} \ No newline at end of file diff --git a/2004/0xxx/CVE-2004-0266.json b/2004/0xxx/CVE-2004-0266.json index 0bc1043cd41..9e34611d796 100644 --- a/2004/0xxx/CVE-2004-0266.json +++ b/2004/0xxx/CVE-2004-0266.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2004-0266", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "SQL injection vulnerability in the \"public message\" capability (public_message) for Php-Nuke 6.x to 7.1.0 allows remote attackers to obtain the administrator password via the c_mid parameter." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2004-0266", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20040208 [waraxe-2004-SA#003] - SQL injection in Php-Nuke 7.1.0", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=107635110327066&w=2" - }, - { - "name" : "phpnuke-publicmessage-sql-injection(15080)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15080" - }, - { - "name" : "9615", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/9615" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SQL injection vulnerability in the \"public message\" capability (public_message) for Php-Nuke 6.x to 7.1.0 allows remote attackers to obtain the administrator password via the c_mid parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "phpnuke-publicmessage-sql-injection(15080)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15080" + }, + { + "name": "9615", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/9615" + }, + { + "name": "20040208 [waraxe-2004-SA#003] - SQL injection in Php-Nuke 7.1.0", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=107635110327066&w=2" + } + ] + } +} \ No newline at end of file diff --git a/2004/0xxx/CVE-2004-0398.json b/2004/0xxx/CVE-2004-0398.json index b7792be310e..3cad8dab199 100644 --- a/2004/0xxx/CVE-2004-0398.json +++ b/2004/0xxx/CVE-2004-0398.json @@ -1,147 +1,147 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2004-0398", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Heap-based buffer overflow in the ne_rfc1036_parse date parsing function for the neon library (libneon) 0.24.5 and earlier, as used by cadaver before 0.22, allows remote WebDAV servers to execute arbitrary code on the client." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2004-0398", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20040519 Advisory 06/2004: libneon date parsing vulnerability", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=108498433632333&w=2" - }, - { - "name" : "20040519 Advisory 06/2004: libneon date parsing vulnerability", - "refsource" : "FULLDISC", - "url" : "http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0982.html" - }, - { - "name" : "CLA-2004:841", - "refsource" : "CONECTIVA", - "url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000841" - }, - { - "name" : "RHSA-2004:191", - "refsource" : "REDHAT", - "url" : "http://www.redhat.com/support/errata/RHSA-2004-191.html" - }, - { - "name" : "DSA-506", - "refsource" : "DEBIAN", - "url" : "http://www.debian.org/security/2004/dsa-506" - }, - { - "name" : "DSA-507", - "refsource" : "DEBIAN", - "url" : "http://www.debian.org/security/2004/dsa-507" - }, - { - "name" : "FEDORA-2004-1552", - "refsource" : "FEDORA", - "url" : "https://bugzilla.fedora.us/show_bug.cgi?id=1552" - }, - { - "name" : "GLSA-200405-13", - "refsource" : "GENTOO", - "url" : "http://security.gentoo.org/glsa/glsa-200405-13.xml" - }, - { - "name" : "GLSA-200405-15", - "refsource" : "GENTOO", - "url" : "http://security.gentoo.org/glsa/glsa-200405-15.xml" - }, - { - "name" : "MDKSA-2004:049", - "refsource" : "MANDRAKE", - "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:049" - }, - { - "name" : "20040519 [OpenPKG-SA-2004.024] OpenPKG Security Advisory (neon)", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=108500057108022&w=2" - }, - { - "name" : "O-148", - "refsource" : "CIAC", - "url" : "http://www.ciac.org/ciac/bulletins/o-148.shtml" - }, - { - "name" : "10385", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/10385" - }, - { - "name" : "6302", - "refsource" : "OSVDB", - "url" : "http://www.osvdb.org/6302" - }, - { - "name" : "11638", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/11638" - }, - { - "name" : "11650", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/11650" - }, - { - "name" : "11673", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/11673" - }, - { - "name" : "neon-library-nerfc1036parse-bo(16192)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/16192" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Heap-based buffer overflow in the ne_rfc1036_parse date parsing function for the neon library (libneon) 0.24.5 and earlier, as used by cadaver before 0.22, allows remote WebDAV servers to execute arbitrary code on the client." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "11638", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/11638" + }, + { + "name": "11673", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/11673" + }, + { + "name": "6302", + "refsource": "OSVDB", + "url": "http://www.osvdb.org/6302" + }, + { + "name": "20040519 Advisory 06/2004: libneon date parsing vulnerability", + "refsource": "FULLDISC", + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0982.html" + }, + { + "name": "11650", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/11650" + }, + { + "name": "20040519 [OpenPKG-SA-2004.024] OpenPKG Security Advisory (neon)", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=108500057108022&w=2" + }, + { + "name": "GLSA-200405-13", + "refsource": "GENTOO", + "url": "http://security.gentoo.org/glsa/glsa-200405-13.xml" + }, + { + "name": "O-148", + "refsource": "CIAC", + "url": "http://www.ciac.org/ciac/bulletins/o-148.shtml" + }, + { + "name": "GLSA-200405-15", + "refsource": "GENTOO", + "url": "http://security.gentoo.org/glsa/glsa-200405-15.xml" + }, + { + "name": "MDKSA-2004:049", + "refsource": "MANDRAKE", + "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:049" + }, + { + "name": "10385", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/10385" + }, + { + "name": "DSA-506", + "refsource": "DEBIAN", + "url": "http://www.debian.org/security/2004/dsa-506" + }, + { + "name": "FEDORA-2004-1552", + "refsource": "FEDORA", + "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1552" + }, + { + "name": "neon-library-nerfc1036parse-bo(16192)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16192" + }, + { + "name": "DSA-507", + "refsource": "DEBIAN", + "url": "http://www.debian.org/security/2004/dsa-507" + }, + { + "name": "CLA-2004:841", + "refsource": "CONECTIVA", + "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000841" + }, + { + "name": "20040519 Advisory 06/2004: libneon date parsing vulnerability", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=108498433632333&w=2" + }, + { + "name": "RHSA-2004:191", + "refsource": "REDHAT", + "url": "http://www.redhat.com/support/errata/RHSA-2004-191.html" + } + ] + } +} \ No newline at end of file diff --git a/2004/0xxx/CVE-2004-0690.json b/2004/0xxx/CVE-2004-0690.json index b9ce8fca28d..c271f21c36c 100644 --- a/2004/0xxx/CVE-2004-0690.json +++ b/2004/0xxx/CVE-2004-0690.json @@ -1,107 +1,107 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2004-0690", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "The DCOPServer in KDE 3.2.3 and earlier allows local users to gain unauthorized access via a symlink attack on DCOP files in the /tmp directory." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2004-0690", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20040811 KDE Security Advisories: Temporary File and Konqueror Frame Injection Vulnerabilities", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=109225538901170&w=2" - }, - { - "name" : "http://www.kde.org/info/security/advisory-20040811-2.txt", - "refsource" : "CONFIRM", - "url" : "http://www.kde.org/info/security/advisory-20040811-2.txt" - }, - { - "name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261386", - "refsource" : "MISC", - "url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261386" - }, - { - "name" : "CLA-2004:864", - "refsource" : "CONECTIVA", - "url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000864" - }, - { - "name" : "200408-13", - "refsource" : "GENTOO", - "url" : "http://security.gentoo.org/glsa/glsa-200408-13.xml" - }, - { - "name" : "MDKSA-2004:086", - "refsource" : "MANDRAKE", - "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:086" - }, - { - "name" : "VU#330638", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/330638" - }, - { - "name" : "10924", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/10924" - }, - { - "name" : "12276", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/12276" - }, - { - "name" : "kde-dcopserver-symlink(16962)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/16962" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The DCOPServer in KDE 3.2.3 and earlier allows local users to gain unauthorized access via a symlink attack on DCOP files in the /tmp directory." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "CLA-2004:864", + "refsource": "CONECTIVA", + "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000864" + }, + { + "name": "kde-dcopserver-symlink(16962)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16962" + }, + { + "name": "12276", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/12276" + }, + { + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261386", + "refsource": "MISC", + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261386" + }, + { + "name": "MDKSA-2004:086", + "refsource": "MANDRAKE", + "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:086" + }, + { + "name": "http://www.kde.org/info/security/advisory-20040811-2.txt", + "refsource": "CONFIRM", + "url": "http://www.kde.org/info/security/advisory-20040811-2.txt" + }, + { + "name": "VU#330638", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/330638" + }, + { + "name": "10924", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/10924" + }, + { + "name": "200408-13", + "refsource": "GENTOO", + "url": "http://security.gentoo.org/glsa/glsa-200408-13.xml" + }, + { + "name": "20040811 KDE Security Advisories: Temporary File and Konqueror Frame Injection Vulnerabilities", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=109225538901170&w=2" + } + ] + } +} \ No newline at end of file diff --git a/2004/0xxx/CVE-2004-0783.json b/2004/0xxx/CVE-2004-0783.json index fd83e89595c..5bc6304096e 100644 --- a/2004/0xxx/CVE-2004-0783.json +++ b/2004/0xxx/CVE-2004-0783.json @@ -1,142 +1,142 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2004-0783", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, may allow remote attackers to execute arbitrary code via a certain color string. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0688)." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2004-0783", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20040915 CESA-2004-005: gtk+ XPM decoder", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=109528994916275&w=2" - }, - { - "name" : "http://scary.beasts.org/security/CESA-2004-005.txt", - "refsource" : "MISC", - "url" : "http://scary.beasts.org/security/CESA-2004-005.txt" - }, - { - "name" : "CLA-2004:875", - "refsource" : "CONECTIVA", - "url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875" - }, - { - "name" : "FLSA:2005", - "refsource" : "FEDORA", - "url" : "https://bugzilla.fedora.us/show_bug.cgi?id=2005" - }, - { - "name" : "FLSA-2005:155510", - "refsource" : "FEDORA", - "url" : "http://www.securityfocus.com/archive/1/419771/100/0/threaded" - }, - { - "name" : "MDKSA-2004:095", - "refsource" : "MANDRAKE", - "url" : "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095" - }, - { - "name" : "MDKSA-2004:096", - "refsource" : "MANDRAKE", - "url" : "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096" - }, - { - "name" : "MDKSA-2005:214", - "refsource" : "MANDRIVA", - "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214" - }, - { - "name" : "RHSA-2004:447", - "refsource" : "REDHAT", - "url" : "http://www.redhat.com/support/errata/RHSA-2004-447.html" - }, - { - "name" : "RHSA-2004:466", - "refsource" : "REDHAT", - "url" : "http://www.redhat.com/support/errata/RHSA-2004-466.html" - }, - { - "name" : "101776", - "refsource" : "SUNALERT", - "url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1" - }, - { - "name" : "VU#369358", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/369358" - }, - { - "name" : "11195", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/11195" - }, - { - "name" : "oval:org.mitre.oval:def:1786", - "refsource" : "OVAL", - "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1786" - }, - { - "name" : "oval:org.mitre.oval:def:9348", - "refsource" : "OVAL", - "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9348" - }, - { - "name" : "17657", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/17657" - }, - { - "name" : "gtk-xpm-xpmextractcolor-bo(17385)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17385" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, may allow remote attackers to execute arbitrary code via a certain color string. NOTE: this identifier is ONLY for gtk+. It was incorrectly referenced in an advisory for a different issue (CVE-2004-0688)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "101776", + "refsource": "SUNALERT", + "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1" + }, + { + "name": "FLSA:2005", + "refsource": "FEDORA", + "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2005" + }, + { + "name": "http://scary.beasts.org/security/CESA-2004-005.txt", + "refsource": "MISC", + "url": "http://scary.beasts.org/security/CESA-2004-005.txt" + }, + { + "name": "oval:org.mitre.oval:def:9348", + "refsource": "OVAL", + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9348" + }, + { + "name": "oval:org.mitre.oval:def:1786", + "refsource": "OVAL", + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1786" + }, + { + "name": "RHSA-2004:466", + "refsource": "REDHAT", + "url": "http://www.redhat.com/support/errata/RHSA-2004-466.html" + }, + { + "name": "20040915 CESA-2004-005: gtk+ XPM decoder", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=109528994916275&w=2" + }, + { + "name": "gtk-xpm-xpmextractcolor-bo(17385)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17385" + }, + { + "name": "VU#369358", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/369358" + }, + { + "name": "MDKSA-2005:214", + "refsource": "MANDRIVA", + "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214" + }, + { + "name": "FLSA-2005:155510", + "refsource": "FEDORA", + "url": "http://www.securityfocus.com/archive/1/419771/100/0/threaded" + }, + { + "name": "MDKSA-2004:095", + "refsource": "MANDRAKE", + "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095" + }, + { + "name": "MDKSA-2004:096", + "refsource": "MANDRAKE", + "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096" + }, + { + "name": "11195", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/11195" + }, + { + "name": "RHSA-2004:447", + "refsource": "REDHAT", + "url": "http://www.redhat.com/support/errata/RHSA-2004-447.html" + }, + { + "name": "CLA-2004:875", + "refsource": "CONECTIVA", + "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000875" + }, + { + "name": "17657", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/17657" + } + ] + } +} \ No newline at end of file diff --git a/2004/1xxx/CVE-2004-1026.json b/2004/1xxx/CVE-2004-1026.json index cfc43696845..b3d69c96444 100644 --- a/2004/1xxx/CVE-2004-1026.json +++ b/2004/1xxx/CVE-2004-1026.json @@ -1,87 +1,87 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2004-1026", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Multiple integer overflows in the image handler for imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2004-1026", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "DSA-628", - "refsource" : "DEBIAN", - "url" : "http://www.debian.org/security/2005/dsa-628" - }, - { - "name" : "GLSA-200412-03", - "refsource" : "GENTOO", - "url" : "http://www.gentoo.org/security/en/glsa/glsa-200412-03.xml" - }, - { - "name" : "MDKSA-2005:007", - "refsource" : "MANDRAKE", - "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:007" - }, - { - "name" : "RHSA-2004:651", - "refsource" : "REDHAT", - "url" : "http://www.redhat.com/support/errata/RHSA-2004-651.html" - }, - { - "name" : "11830", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/11830" - }, - { - "name" : "oval:org.mitre.oval:def:10771", - "refsource" : "OVAL", - "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10771" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Multiple integer overflows in the image handler for imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "MDKSA-2005:007", + "refsource": "MANDRAKE", + "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:007" + }, + { + "name": "oval:org.mitre.oval:def:10771", + "refsource": "OVAL", + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10771" + }, + { + "name": "11830", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/11830" + }, + { + "name": "RHSA-2004:651", + "refsource": "REDHAT", + "url": "http://www.redhat.com/support/errata/RHSA-2004-651.html" + }, + { + "name": "GLSA-200412-03", + "refsource": "GENTOO", + "url": "http://www.gentoo.org/security/en/glsa/glsa-200412-03.xml" + }, + { + "name": "DSA-628", + "refsource": "DEBIAN", + "url": "http://www.debian.org/security/2005/dsa-628" + } + ] + } +} \ No newline at end of file diff --git a/2004/1xxx/CVE-2004-1577.json b/2004/1xxx/CVE-2004-1577.json index ec43741450e..d7c965ad354 100644 --- a/2004/1xxx/CVE-2004-1577.json +++ b/2004/1xxx/CVE-2004-1577.json @@ -1,67 +1,67 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2004-1577", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "index.php in PHP Links allows remote attackers to gain sensitive information via an invalid show parameter, which reveals the full path in an error message." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2004-1577", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20041003 Full path disclosure in PHP Links", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=109693280416747&w=2" - }, - { - "name" : "phplinks-path-disclosure(17588)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17588" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "index.php in PHP Links allows remote attackers to gain sensitive information via an invalid show parameter, which reveals the full path in an error message." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20041003 Full path disclosure in PHP Links", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=109693280416747&w=2" + }, + { + "name": "phplinks-path-disclosure(17588)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17588" + } + ] + } +} \ No newline at end of file diff --git a/2004/1xxx/CVE-2004-1758.json b/2004/1xxx/CVE-2004-1758.json index 4a9f115a4b8..7a038d2f276 100644 --- a/2004/1xxx/CVE-2004-1758.json +++ b/2004/1xxx/CVE-2004-1758.json @@ -1,92 +1,92 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2004-1758", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "BEA WebLogic Server and WebLogic Express version 8.1 up to SP2, 7.0 up to SP4, and 6.1 up to SP6 may store the database username and password for an untargeted JDBC connection pool in plaintext in config.xml, which allows local users to gain privileges." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2004-1758", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_53.00.jsp", - "refsource" : "CONFIRM", - "url" : "http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_53.00.jsp" - }, - { - "name" : "VU#920238", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/920238" - }, - { - "name" : "10131", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/10131" - }, - { - "name" : "5297", - "refsource" : "OSVDB", - "url" : "http://www.osvdb.org/5297" - }, - { - "name" : "1009764", - "refsource" : "SECTRACK", - "url" : "http://securitytracker.com/id?1009764" - }, - { - "name" : "11357", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/11357" - }, - { - "name" : "bea-configxml-plaintext-password(15860)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15860" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "BEA WebLogic Server and WebLogic Express version 8.1 up to SP2, 7.0 up to SP4, and 6.1 up to SP6 may store the database username and password for an untargeted JDBC connection pool in plaintext in config.xml, which allows local users to gain privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "1009764", + "refsource": "SECTRACK", + "url": "http://securitytracker.com/id?1009764" + }, + { + "name": "http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_53.00.jsp", + "refsource": "CONFIRM", + "url": "http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_53.00.jsp" + }, + { + "name": "VU#920238", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/920238" + }, + { + "name": "5297", + "refsource": "OSVDB", + "url": "http://www.osvdb.org/5297" + }, + { + "name": "10131", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/10131" + }, + { + "name": "11357", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/11357" + }, + { + "name": "bea-configxml-plaintext-password(15860)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15860" + } + ] + } +} \ No newline at end of file diff --git a/2004/1xxx/CVE-2004-1896.json b/2004/1xxx/CVE-2004-1896.json index 9b43c918d46..641f3f7d83e 100644 --- a/2004/1xxx/CVE-2004-1896.json +++ b/2004/1xxx/CVE-2004-1896.json @@ -1,92 +1,92 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2004-1896", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Heap-based buffer overflow in in_mod.dll in Nullsoft Winamp 2.91 through 5.02 allows remote attackers to execute arbitrary code via a Fasttracker 2 (.xm) mod media file." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2004-1896", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20040405 NGSSoftware Insight Security Research Advisory", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=108118289208693&w=2" - }, - { - "name" : "http://www.nextgenss.com/advisories/winampheap.txt", - "refsource" : "MISC", - "url" : "http://www.nextgenss.com/advisories/winampheap.txt" - }, - { - "name" : "10045", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/10045" - }, - { - "name" : "4944", - "refsource" : "OSVDB", - "url" : "http://www.osvdb.org/4944" - }, - { - "name" : "1009660", - "refsource" : "SECTRACK", - "url" : "http://securitytracker.com/id?1009660" - }, - { - "name" : "11285", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/11285" - }, - { - "name" : "winamp-inmod-bo(15727)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15727" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Heap-based buffer overflow in in_mod.dll in Nullsoft Winamp 2.91 through 5.02 allows remote attackers to execute arbitrary code via a Fasttracker 2 (.xm) mod media file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "4944", + "refsource": "OSVDB", + "url": "http://www.osvdb.org/4944" + }, + { + "name": "http://www.nextgenss.com/advisories/winampheap.txt", + "refsource": "MISC", + "url": "http://www.nextgenss.com/advisories/winampheap.txt" + }, + { + "name": "1009660", + "refsource": "SECTRACK", + "url": "http://securitytracker.com/id?1009660" + }, + { + "name": "10045", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/10045" + }, + { + "name": "20040405 NGSSoftware Insight Security Research Advisory", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=108118289208693&w=2" + }, + { + "name": "winamp-inmod-bo(15727)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15727" + }, + { + "name": "11285", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/11285" + } + ] + } +} \ No newline at end of file diff --git a/2004/2xxx/CVE-2004-2351.json b/2004/2xxx/CVE-2004-2351.json index 67e19ff644f..4cb42bf9a3c 100644 --- a/2004/2xxx/CVE-2004-2351.json +++ b/2004/2xxx/CVE-2004-2351.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2004-2351", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Cross-site scripting (XSS) vulnerability in GBook for Php-Nuke 1.0 allows remote attackers to inject arbitrary web script or HTML via multiple parameters, including (1) name, (2) email, (3) city, and (4) message, which do not use the