From b11e3148f2ef44ab58e141485e077e366dcf6ab1 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 17 Aug 2022 10:00:58 +0000 Subject: [PATCH] "-Synchronized-Data." --- 1999/0xxx/CVE-1999-0105.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0106.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0111.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0156.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0162.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0163.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0165.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0170.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0171.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0180.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0194.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0195.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0201.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0202.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0214.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0220.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0221.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0224.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0232.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0240.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0249.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0251.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0252.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0285.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0289.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0291.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0452.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0461.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0499.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0505.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0506.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0507.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0510.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0511.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0523.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0525.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0529.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0532.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0534.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0537.json | 62 ++++++++++++++++++++++++++++++++++++ 1999/0xxx/CVE-1999-0541.json | 62 ++++++++++++++++++++++++++++++++++++ 2000/0xxx/CVE-2000-0137.json | 62 ++++++++++++++++++++++++++++++++++++ 2000/0xxx/CVE-2000-0142.json | 62 ++++++++++++++++++++++++++++++++++++ 2000/0xxx/CVE-2000-0143.json | 62 ++++++++++++++++++++++++++++++++++++ 2000/0xxx/CVE-2000-0145.json | 62 ++++++++++++++++++++++++++++++++++++ 2000/0xxx/CVE-2000-0182.json | 62 ++++++++++++++++++++++++++++++++++++ 2000/0xxx/CVE-2000-0220.json | 62 ++++++++++++++++++++++++++++++++++++ 2003/0xxx/CVE-2003-0658.json | 62 ++++++++++++++++++++++++++++++++++++ 2003/0xxx/CVE-2003-0742.json | 62 ++++++++++++++++++++++++++++++++++++ 2003/0xxx/CVE-2003-0769.json | 62 ++++++++++++++++++++++++++++++++++++ 50 files changed, 3100 insertions(+) create mode 100644 1999/0xxx/CVE-1999-0105.json create mode 100644 1999/0xxx/CVE-1999-0106.json create mode 100644 1999/0xxx/CVE-1999-0111.json create mode 100644 1999/0xxx/CVE-1999-0156.json create mode 100644 1999/0xxx/CVE-1999-0162.json create mode 100644 1999/0xxx/CVE-1999-0163.json create mode 100644 1999/0xxx/CVE-1999-0165.json create mode 100644 1999/0xxx/CVE-1999-0170.json create mode 100644 1999/0xxx/CVE-1999-0171.json create mode 100644 1999/0xxx/CVE-1999-0180.json create mode 100644 1999/0xxx/CVE-1999-0194.json create mode 100644 1999/0xxx/CVE-1999-0195.json create mode 100644 1999/0xxx/CVE-1999-0201.json create mode 100644 1999/0xxx/CVE-1999-0202.json create mode 100644 1999/0xxx/CVE-1999-0214.json create mode 100644 1999/0xxx/CVE-1999-0220.json create mode 100644 1999/0xxx/CVE-1999-0221.json create mode 100644 1999/0xxx/CVE-1999-0224.json create mode 100644 1999/0xxx/CVE-1999-0232.json create mode 100644 1999/0xxx/CVE-1999-0240.json create mode 100644 1999/0xxx/CVE-1999-0249.json create mode 100644 1999/0xxx/CVE-1999-0251.json create mode 100644 1999/0xxx/CVE-1999-0252.json create mode 100644 1999/0xxx/CVE-1999-0285.json create mode 100644 1999/0xxx/CVE-1999-0289.json create mode 100644 1999/0xxx/CVE-1999-0291.json create mode 100644 1999/0xxx/CVE-1999-0452.json create mode 100644 1999/0xxx/CVE-1999-0461.json create mode 100644 1999/0xxx/CVE-1999-0499.json create mode 100644 1999/0xxx/CVE-1999-0505.json create mode 100644 1999/0xxx/CVE-1999-0506.json create mode 100644 1999/0xxx/CVE-1999-0507.json create mode 100644 1999/0xxx/CVE-1999-0510.json create mode 100644 1999/0xxx/CVE-1999-0511.json create mode 100644 1999/0xxx/CVE-1999-0523.json create mode 100644 1999/0xxx/CVE-1999-0525.json create mode 100644 1999/0xxx/CVE-1999-0529.json create mode 100644 1999/0xxx/CVE-1999-0532.json create mode 100644 1999/0xxx/CVE-1999-0534.json create mode 100644 1999/0xxx/CVE-1999-0537.json create mode 100644 1999/0xxx/CVE-1999-0541.json create mode 100644 2000/0xxx/CVE-2000-0137.json create mode 100644 2000/0xxx/CVE-2000-0142.json create mode 100644 2000/0xxx/CVE-2000-0143.json create mode 100644 2000/0xxx/CVE-2000-0145.json create mode 100644 2000/0xxx/CVE-2000-0182.json create mode 100644 2000/0xxx/CVE-2000-0220.json create mode 100644 2003/0xxx/CVE-2003-0658.json create mode 100644 2003/0xxx/CVE-2003-0742.json create mode 100644 2003/0xxx/CVE-2003-0769.json diff --git a/1999/0xxx/CVE-1999-0105.json b/1999/0xxx/CVE-1999-0105.json new file mode 100644 index 00000000000..83f3f1b5981 --- /dev/null +++ b/1999/0xxx/CVE-1999-0105.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0105", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0105", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0105" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "finger allows recursive searches by using a long string of @ symbols." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0106.json b/1999/0xxx/CVE-1999-0106.json new file mode 100644 index 00000000000..66a0f3d41c4 --- /dev/null +++ b/1999/0xxx/CVE-1999-0106.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0106", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0106", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0106" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Finger redirection allows finger bombs." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0111.json b/1999/0xxx/CVE-1999-0111.json new file mode 100644 index 00000000000..d300ce25a55 --- /dev/null +++ b/1999/0xxx/CVE-1999-0111.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0111", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0111", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0111" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "RIP v1 is susceptible to spoofing." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0156.json b/1999/0xxx/CVE-1999-0156.json new file mode 100644 index 00000000000..3d14f8c7159 --- /dev/null +++ b/1999/0xxx/CVE-1999-0156.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0156", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0156", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0156" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "wu-ftpd FTP daemon allows any user and password combination." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0162.json b/1999/0xxx/CVE-1999-0162.json new file mode 100644 index 00000000000..8fe9861ee3f --- /dev/null +++ b/1999/0xxx/CVE-1999-0162.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0162", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0162", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0162" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The \"established\" keyword in some Cisco IOS software allowed an attacker to bypass filtering." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0163.json b/1999/0xxx/CVE-1999-0163.json new file mode 100644 index 00000000000..e68cefea7c1 --- /dev/null +++ b/1999/0xxx/CVE-1999-0163.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0163", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0163", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0163" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In older versions of Sendmail, an attacker could use a pipe character to execute root commands." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0165.json b/1999/0xxx/CVE-1999-0165.json new file mode 100644 index 00000000000..a240c7616fe --- /dev/null +++ b/1999/0xxx/CVE-1999-0165.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0165", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0165", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0165" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "NFS cache poisoning." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0170.json b/1999/0xxx/CVE-1999-0170.json new file mode 100644 index 00000000000..f23e35b156c --- /dev/null +++ b/1999/0xxx/CVE-1999-0170.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0170", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0170", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0170" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Remote attackers can mount an NFS file system in Ultrix or OSF, even if it is denied on the access list." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0171.json b/1999/0xxx/CVE-1999-0171.json new file mode 100644 index 00000000000..64f9f21aa48 --- /dev/null +++ b/1999/0xxx/CVE-1999-0171.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0171", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0171", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0171" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Denial of service in syslog by sending it a large number of superfluous messages." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0180.json b/1999/0xxx/CVE-1999-0180.json new file mode 100644 index 00000000000..5fe4f621a32 --- /dev/null +++ b/1999/0xxx/CVE-1999-0180.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0180", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0180", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0180" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "in.rshd allows users to login with a NULL username and execute commands." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0194.json b/1999/0xxx/CVE-1999-0194.json new file mode 100644 index 00000000000..5050a9d44d8 --- /dev/null +++ b/1999/0xxx/CVE-1999-0194.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0194", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0194", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0194" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Denial of service in in.comsat allows attackers to generate messages." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0195.json b/1999/0xxx/CVE-1999-0195.json new file mode 100644 index 00000000000..2ff332bb056 --- /dev/null +++ b/1999/0xxx/CVE-1999-0195.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0195", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0195", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0195" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0201.json b/1999/0xxx/CVE-1999-0201.json new file mode 100644 index 00000000000..86946425831 --- /dev/null +++ b/1999/0xxx/CVE-1999-0201.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0201", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0201", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0201" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A quote cwd command on FTP servers can reveal the full path of the home directory of the \"ftp\" user." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0202.json b/1999/0xxx/CVE-1999-0202.json new file mode 100644 index 00000000000..82b2f0e2884 --- /dev/null +++ b/1999/0xxx/CVE-1999-0202.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0202", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0202", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0202" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0214.json b/1999/0xxx/CVE-1999-0214.json new file mode 100644 index 00000000000..b3bd19916bb --- /dev/null +++ b/1999/0xxx/CVE-1999-0214.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0214", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0214", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0214" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Denial of service by sending forged ICMP unreachable packets." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0220.json b/1999/0xxx/CVE-1999-0220.json new file mode 100644 index 00000000000..981403fa67e --- /dev/null +++ b/1999/0xxx/CVE-1999-0220.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0220", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0220", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0220" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Attackers can do a denial of service of IRC by crashing the server." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0221.json b/1999/0xxx/CVE-1999-0221.json new file mode 100644 index 00000000000..caafe706df9 --- /dev/null +++ b/1999/0xxx/CVE-1999-0221.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0221", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0221", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0221" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Denial of service of Ascend routers through port 150 (remote administration)." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0224.json b/1999/0xxx/CVE-1999-0224.json new file mode 100644 index 00000000000..3a95184d8fa --- /dev/null +++ b/1999/0xxx/CVE-1999-0224.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0224", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0224", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0224" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Denial of service in Windows NT messenger service through a long username." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0232.json b/1999/0xxx/CVE-1999-0232.json new file mode 100644 index 00000000000..860ae6d2aa0 --- /dev/null +++ b/1999/0xxx/CVE-1999-0232.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0232", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0232", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0232" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in NCSA WebServer (version 1.5c) gives remote access." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0240.json b/1999/0xxx/CVE-1999-0240.json new file mode 100644 index 00000000000..3e7c1e27564 --- /dev/null +++ b/1999/0xxx/CVE-1999-0240.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0240", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0240", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0240" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Some filters or firewalls allow fragmented SYN packets with IP reserved bits in violation of their implemented policy." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0249.json b/1999/0xxx/CVE-1999-0249.json new file mode 100644 index 00000000000..e64e7997cbc --- /dev/null +++ b/1999/0xxx/CVE-1999-0249.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0249", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0249", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0249" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Windows NT RSHSVC program allows remote users to execute arbitrary commands." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0251.json b/1999/0xxx/CVE-1999-0251.json new file mode 100644 index 00000000000..b037374df63 --- /dev/null +++ b/1999/0xxx/CVE-1999-0251.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0251", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0251", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0251" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Denial of service in talk program allows remote attackers to disrupt a user's display." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0252.json b/1999/0xxx/CVE-1999-0252.json new file mode 100644 index 00000000000..b9986feeb53 --- /dev/null +++ b/1999/0xxx/CVE-1999-0252.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0252", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0252", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0252" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in listserv allows arbitrary command execution." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0285.json b/1999/0xxx/CVE-1999-0285.json new file mode 100644 index 00000000000..ace02944eac --- /dev/null +++ b/1999/0xxx/CVE-1999-0285.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0285", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0285", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0285" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0289.json b/1999/0xxx/CVE-1999-0289.json new file mode 100644 index 00000000000..95288d059b5 --- /dev/null +++ b/1999/0xxx/CVE-1999-0289.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0289", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0289", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0289" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Apache web server for Win32 may provide access to restricted files when a . (dot) is appended to a requested URL." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0291.json b/1999/0xxx/CVE-1999-0291.json new file mode 100644 index 00000000000..2a4e35b8ec8 --- /dev/null +++ b/1999/0xxx/CVE-1999-0291.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0291", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0291", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0291" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The WinGate proxy is installed without a password, which allows remote attackers to redirect connections without authentication." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0452.json b/1999/0xxx/CVE-1999-0452.json new file mode 100644 index 00000000000..714a29d7fa8 --- /dev/null +++ b/1999/0xxx/CVE-1999-0452.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0452", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0452", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0452" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A service or application has a backdoor password that was placed there by the developer." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0461.json b/1999/0xxx/CVE-1999-0461.json new file mode 100644 index 00000000000..a3bca381f09 --- /dev/null +++ b/1999/0xxx/CVE-1999-0461.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0461", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0461", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0461" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0499.json b/1999/0xxx/CVE-1999-0499.json new file mode 100644 index 00000000000..a4193863f96 --- /dev/null +++ b/1999/0xxx/CVE-1999-0499.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0499", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0499", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0499" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "NETBIOS share information may be published through SNMP registry keys in NT." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0505.json b/1999/0xxx/CVE-1999-0505.json new file mode 100644 index 00000000000..74456ac054e --- /dev/null +++ b/1999/0xxx/CVE-1999-0505.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0505", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0505", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0505" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A Windows NT domain user or administrator account has a guessable password." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0506.json b/1999/0xxx/CVE-1999-0506.json new file mode 100644 index 00000000000..091031dbf19 --- /dev/null +++ b/1999/0xxx/CVE-1999-0506.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0506", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0506", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0506" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A Windows NT domain user or administrator account has a default, null, blank, or missing password." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0507.json b/1999/0xxx/CVE-1999-0507.json new file mode 100644 index 00000000000..48853f73180 --- /dev/null +++ b/1999/0xxx/CVE-1999-0507.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0507", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0507", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0507" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An account on a router, firewall, or other network device has a guessable password." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0510.json b/1999/0xxx/CVE-1999-0510.json new file mode 100644 index 00000000000..ffab5809f90 --- /dev/null +++ b/1999/0xxx/CVE-1999-0510.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0510", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0510", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0510" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A router or firewall allows source routed packets from arbitrary hosts." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0511.json b/1999/0xxx/CVE-1999-0511.json new file mode 100644 index 00000000000..ecfb8b1773b --- /dev/null +++ b/1999/0xxx/CVE-1999-0511.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0511", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0511", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0511" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IP forwarding is enabled on a machine which is not a router or firewall." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0523.json b/1999/0xxx/CVE-1999-0523.json new file mode 100644 index 00000000000..fc96cf0f413 --- /dev/null +++ b/1999/0xxx/CVE-1999-0523.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0523", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0523", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0523" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "ICMP echo (ping) is allowed from arbitrary hosts." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0525.json b/1999/0xxx/CVE-1999-0525.json new file mode 100644 index 00000000000..17c4267392e --- /dev/null +++ b/1999/0xxx/CVE-1999-0525.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0525", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0525", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0525" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IP traceroute is allowed from arbitrary hosts." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0529.json b/1999/0xxx/CVE-1999-0529.json new file mode 100644 index 00000000000..f814d1de525 --- /dev/null +++ b/1999/0xxx/CVE-1999-0529.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0529", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0529", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0529" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A router or firewall forwards packets that claim to come from IANA reserved or private addresses, e.g. 10.x.x.x, 127.x.x.x, 217.x.x.x, etc." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0532.json b/1999/0xxx/CVE-1999-0532.json new file mode 100644 index 00000000000..0654885d6d2 --- /dev/null +++ b/1999/0xxx/CVE-1999-0532.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0532", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0532", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0532" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A DNS server allows zone transfers." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0534.json b/1999/0xxx/CVE-1999-0534.json new file mode 100644 index 00000000000..0cfa519e801 --- /dev/null +++ b/1999/0xxx/CVE-1999-0534.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0534", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0534", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0534" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0537.json b/1999/0xxx/CVE-1999-0537.json new file mode 100644 index 00000000000..18051e617fa --- /dev/null +++ b/1999/0xxx/CVE-1999-0537.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0537", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0537", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0537" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A configuration in a web browser such as Internet Explorer or Netscape Navigator allows execution of active content such as ActiveX, Java, Javascript, etc." + } + ] + } +} \ No newline at end of file diff --git a/1999/0xxx/CVE-1999-0541.json b/1999/0xxx/CVE-1999-0541.json new file mode 100644 index 00000000000..74ce945eade --- /dev/null +++ b/1999/0xxx/CVE-1999-0541.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-1999-0541", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-1999-0541", + "url": "https://www.cve.org/CVERecord?id=CVE-1999-0541" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A password for accessing a WWW URL is guessable." + } + ] + } +} \ No newline at end of file diff --git a/2000/0xxx/CVE-2000-0137.json b/2000/0xxx/CVE-2000-0137.json new file mode 100644 index 00000000000..21d5d4d7e15 --- /dev/null +++ b/2000/0xxx/CVE-2000-0137.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2000-0137", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0137", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0137" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The CartIt shopping cart application allows remote users to modify sensitive purchase information via hidden form fields." + } + ] + } +} \ No newline at end of file diff --git a/2000/0xxx/CVE-2000-0142.json b/2000/0xxx/CVE-2000-0142.json new file mode 100644 index 00000000000..3391b6ae7e4 --- /dev/null +++ b/2000/0xxx/CVE-2000-0142.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2000-0142", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0142", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0142" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The authentication protocol in Timbuktu Pro 2.0b650 allows remote attackers to cause a denial of service via connections to port 407 and 1417." + } + ] + } +} \ No newline at end of file diff --git a/2000/0xxx/CVE-2000-0143.json b/2000/0xxx/CVE-2000-0143.json new file mode 100644 index 00000000000..a3222563e7e --- /dev/null +++ b/2000/0xxx/CVE-2000-0143.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2000-0143", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP." + } + ] + } +} \ No newline at end of file diff --git a/2000/0xxx/CVE-2000-0145.json b/2000/0xxx/CVE-2000-0145.json new file mode 100644 index 00000000000..3153e20f401 --- /dev/null +++ b/2000/0xxx/CVE-2000-0145.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2000-0145", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0145", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0145" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The libguile.so library file used by gnucash in Debian GNU/Linux is installed with world-writable permissions." + } + ] + } +} \ No newline at end of file diff --git a/2000/0xxx/CVE-2000-0182.json b/2000/0xxx/CVE-2000-0182.json new file mode 100644 index 00000000000..32f89694589 --- /dev/null +++ b/2000/0xxx/CVE-2000-0182.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2000-0182", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0182", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0182" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "iPlanet Web Server 4.1 allows remote attackers to cause a denial of service via a large number of GET commands, which consumes memory and causes a kernel panic." + } + ] + } +} \ No newline at end of file diff --git a/2000/0xxx/CVE-2000-0220.json b/2000/0xxx/CVE-2000-0220.json new file mode 100644 index 00000000000..2d997089324 --- /dev/null +++ b/2000/0xxx/CVE-2000-0220.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2000-0220", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0220", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0220" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "ZoneAlarm sends sensitive system and network information in cleartext to the Zone Labs server if a user requests more information about an event." + } + ] + } +} \ No newline at end of file diff --git a/2003/0xxx/CVE-2003-0658.json b/2003/0xxx/CVE-2003-0658.json new file mode 100644 index 00000000000..efaac356320 --- /dev/null +++ b/2003/0xxx/CVE-2003-0658.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2003-0658", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2003-0658", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2003-0658" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Docview before 1.1-18 in Caldera OpenLinux 3.1.1, SCO Linux 4.0, OpenServer 5.0.7, configures the Apache web server in a way that allows remote attackers to read arbitrary publicly readable files via a certain URL, possibly related to rewrite rules." + } + ] + } +} \ No newline at end of file diff --git a/2003/0xxx/CVE-2003-0742.json b/2003/0xxx/CVE-2003-0742.json new file mode 100644 index 00000000000..d0d157467d9 --- /dev/null +++ b/2003/0xxx/CVE-2003-0742.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2003-0742", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2003-0742", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2003-0742" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SCO Internet Manager (mana) allows local users to execute arbitrary programs by setting the REMOTE_ADDR environment variable to cause menu.mana to run as if it were called from ncsa_httpd, then modifying the PATH environment variable to point to a malicious \"hostname\" program." + } + ] + } +} \ No newline at end of file diff --git a/2003/0xxx/CVE-2003-0769.json b/2003/0xxx/CVE-2003-0769.json new file mode 100644 index 00000000000..143ddc0a668 --- /dev/null +++ b/2003/0xxx/CVE-2003-0769.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2003-0769", + "ASSIGNER": "cve@mitre.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2003-0769", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2003-0769" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS) vulnerability in the ICQ Web Front guestbook (guestbook.html) allows remote attackers to insert arbitrary web script and HTML via the message field." + } + ] + } +} \ No newline at end of file