Skip to content

Commit

Permalink
"-Synchronized-Data."
Browse files Browse the repository at this point in the history
  • Loading branch information
cve-team committed Mar 18, 2019
1 parent 7e2be8c commit 77d17a6
Show file tree
Hide file tree
Showing 61 changed files with 4,139 additions and 4,139 deletions.
148 changes: 74 additions & 74 deletions 2004/0xxx/CVE-2004-0370.json
Original file line number Diff line number Diff line change
@@ -1,77 +1,77 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "[email protected]",
"ID" : "CVE-2004-0370",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
"CVE_data_meta": {
"ASSIGNER": "[email protected]",
"ID": "CVE-2004-0370",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
"lang": "eng",
"value": "The setsockopt call in the KAME Project IPv6 implementation, as used in FreeBSD 5.2, does not properly handle certain IPv6 socket options, which could allow attackers to read kernel memory and cause a system panic."
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The setsockopt call in the KAME Project IPv6 implementation, as used in FreeBSD 5.2, does not properly handle certain IPv6 socket options, which could allow attackers to read kernel memory and cause a system panic."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "FreeBSD-SA-04:06",
"refsource" : "FREEBSD",
"url" : "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:06.ipv6.asc"
},
{
"name" : "9992",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/9992"
},
{
"name" : "11233",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/11233"
},
{
"name" : "freebsd-ipv6-dos(15662)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15662"
}
]
}
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "11233",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11233"
},
{
"name": "freebsd-ipv6-dos(15662)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15662"
},
{
"name": "9992",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9992"
},
{
"name": "FreeBSD-SA-04:06",
"refsource": "FREEBSD",
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:06.ipv6.asc"
}
]
}
}
34 changes: 17 additions & 17 deletions 2004/0xxx/CVE-2004-0406.json
Original file line number Diff line number Diff line change
@@ -1,18 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "[email protected]",
"ID" : "CVE-2004-0406",
"STATE" : "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none."
}
]
}
}
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2004-0406",
"ASSIGNER": "[email protected]",
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none."
}
]
}
}
138 changes: 69 additions & 69 deletions 2004/0xxx/CVE-2004-0831.json
Original file line number Diff line number Diff line change
@@ -1,72 +1,72 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "[email protected]",
"ID" : "CVE-2004-0831",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
"CVE_data_meta": {
"ASSIGNER": "[email protected]",
"ID": "CVE-2004-0831",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
"lang": "eng",
"value": "McAfee VirusScan 4.5.1 does not drop SYSTEM privileges before allowing users to browse for files via the \"System Scan\" properties of the System Tray applet, which could allow local users to gain privileges."
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "McAfee VirusScan 4.5.1 does not drop SYSTEM privileges before allowing users to browse for files via the \"System Scan\" properties of the System Tray applet, which could allow local users to gain privileges."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20040915 McAfee VirusScan Privilege Escalation Vulnerability [iDEFENSE]",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=109526269429728&w=2"
},
{
"name" : "20040914 McAfee VirusScan Privilege Escalation Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://www.idefense.com/application/poi/display?id=140&type=vulnerabilities"
},
{
"name" : "mcafee-virusscan-gain-privileges(17367)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17367"
}
]
}
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "mcafee-virusscan-gain-privileges(17367)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17367"
},
{
"name": "20040914 McAfee VirusScan Privilege Escalation Vulnerability",
"refsource": "IDEFENSE",
"url": "http://www.idefense.com/application/poi/display?id=140&type=vulnerabilities"
},
{
"name": "20040915 McAfee VirusScan Privilege Escalation Vulnerability [iDEFENSE]",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=109526269429728&w=2"
}
]
}
}
34 changes: 17 additions & 17 deletions 2004/0xxx/CVE-2004-0861.json
Original file line number Diff line number Diff line change
@@ -1,18 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "[email protected]",
"ID" : "CVE-2004-0861",
"STATE" : "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none."
}
]
}
}
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2004-0861",
"ASSIGNER": "[email protected]",
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none."
}
]
}
}
Loading

0 comments on commit 77d17a6

Please sign in to comment.