forked from CVEProject/cvelist
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
66 changed files
with
3,975 additions
and
3,975 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,82 +1,82 @@ | ||
{ | ||
"CVE_data_meta" : { | ||
"ASSIGNER" : "[email protected]", | ||
"ID" : "CVE-2002-0032", | ||
"STATE" : "PUBLIC" | ||
}, | ||
"affects" : { | ||
"vendor" : { | ||
"vendor_data" : [ | ||
"CVE_data_meta": { | ||
"ASSIGNER": "[email protected]", | ||
"ID": "CVE-2002-0032", | ||
"STATE": "PUBLIC" | ||
}, | ||
"affects": { | ||
"vendor": { | ||
"vendor_data": [ | ||
{ | ||
"product": { | ||
"product_data": [ | ||
{ | ||
"product_name": "n/a", | ||
"version": { | ||
"version_data": [ | ||
{ | ||
"version_value": "n/a" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"vendor_name": "n/a" | ||
} | ||
] | ||
} | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
"data_version": "4.0", | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"product" : { | ||
"product_data" : [ | ||
{ | ||
"product_name" : "n/a", | ||
"version" : { | ||
"version_data" : [ | ||
{ | ||
"version_value" : "n/a" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"vendor_name" : "n/a" | ||
"lang": "eng", | ||
"value": "Yahoo! Messenger 5,0,0,1064 and earlier allows remote attackers to execute arbitrary script as other users via the addview parameter of a ymsgr URI." | ||
} | ||
] | ||
} | ||
}, | ||
"data_format" : "MITRE", | ||
"data_type" : "CVE", | ||
"data_version" : "4.0", | ||
"description" : { | ||
"description_data" : [ | ||
{ | ||
"lang" : "eng", | ||
"value" : "Yahoo! Messenger 5,0,0,1064 and earlier allows remote attackers to execute arbitrary script as other users via the addview parameter of a ymsgr URI." | ||
} | ||
] | ||
}, | ||
"problemtype" : { | ||
"problemtype_data" : [ | ||
{ | ||
"description" : [ | ||
{ | ||
"lang" : "eng", | ||
"value" : "n/a" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references" : { | ||
"reference_data" : [ | ||
{ | ||
"name" : "20020527 Yahoo Messenger - Multiple Vulnerabilities", | ||
"refsource" : "BUGTRAQ", | ||
"url" : "http://online.securityfocus.com/archive/1/274223" | ||
}, | ||
{ | ||
"name" : "CA-2002-16", | ||
"refsource" : "CERT", | ||
"url" : "http://www.cert.org/advisories/CA-2002-16.html" | ||
}, | ||
{ | ||
"name" : "VU#172315", | ||
"refsource" : "CERT-VN", | ||
"url" : "http://www.kb.cert.org/vuls/id/172315" | ||
}, | ||
{ | ||
"name" : "4838", | ||
"refsource" : "BID", | ||
"url" : "http://www.securityfocus.com/bid/4838" | ||
}, | ||
{ | ||
"name" : "yahoo-messenger-script-injection(9184)", | ||
"refsource" : "XF", | ||
"url" : "http://www.iss.net/security_center/static/9184.php" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "eng", | ||
"value": "n/a" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"name": "CA-2002-16", | ||
"refsource": "CERT", | ||
"url": "http://www.cert.org/advisories/CA-2002-16.html" | ||
}, | ||
{ | ||
"name": "20020527 Yahoo Messenger - Multiple Vulnerabilities", | ||
"refsource": "BUGTRAQ", | ||
"url": "http://online.securityfocus.com/archive/1/274223" | ||
}, | ||
{ | ||
"name": "4838", | ||
"refsource": "BID", | ||
"url": "http://www.securityfocus.com/bid/4838" | ||
}, | ||
{ | ||
"name": "VU#172315", | ||
"refsource": "CERT-VN", | ||
"url": "http://www.kb.cert.org/vuls/id/172315" | ||
}, | ||
{ | ||
"name": "yahoo-messenger-script-injection(9184)", | ||
"refsource": "XF", | ||
"url": "http://www.iss.net/security_center/static/9184.php" | ||
} | ||
] | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,82 +1,82 @@ | ||
{ | ||
"CVE_data_meta" : { | ||
"ASSIGNER" : "[email protected]", | ||
"ID" : "CVE-2002-0438", | ||
"STATE" : "PUBLIC" | ||
}, | ||
"affects" : { | ||
"vendor" : { | ||
"vendor_data" : [ | ||
"CVE_data_meta": { | ||
"ASSIGNER": "[email protected]", | ||
"ID": "CVE-2002-0438", | ||
"STATE": "PUBLIC" | ||
}, | ||
"affects": { | ||
"vendor": { | ||
"vendor_data": [ | ||
{ | ||
"product": { | ||
"product_data": [ | ||
{ | ||
"product_name": "n/a", | ||
"version": { | ||
"version_data": [ | ||
{ | ||
"version_value": "n/a" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"vendor_name": "n/a" | ||
} | ||
] | ||
} | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
"data_version": "4.0", | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"product" : { | ||
"product_data" : [ | ||
{ | ||
"product_name" : "n/a", | ||
"version" : { | ||
"version_data" : [ | ||
{ | ||
"version_value" : "n/a" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"vendor_name" : "n/a" | ||
"lang": "eng", | ||
"value": "ZyXEL ZyWALL 10 before 3.50 allows remote attackers to cause a denial of service via an ARP packet with the firewall's IP address and an incorrect MAC address, which causes the firewall to disable the LAN interface." | ||
} | ||
] | ||
} | ||
}, | ||
"data_format" : "MITRE", | ||
"data_type" : "CVE", | ||
"data_version" : "4.0", | ||
"description" : { | ||
"description_data" : [ | ||
{ | ||
"lang" : "eng", | ||
"value" : "ZyXEL ZyWALL 10 before 3.50 allows remote attackers to cause a denial of service via an ARP packet with the firewall's IP address and an incorrect MAC address, which causes the firewall to disable the LAN interface." | ||
} | ||
] | ||
}, | ||
"problemtype" : { | ||
"problemtype_data" : [ | ||
{ | ||
"description" : [ | ||
{ | ||
"lang" : "eng", | ||
"value" : "n/a" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references" : { | ||
"reference_data" : [ | ||
{ | ||
"name" : "20020311 ZyXEL ZyWALL10 DoS", | ||
"refsource" : "BUGTRAQ", | ||
"url" : "http://www.securityfocus.com/archive/1/261411" | ||
}, | ||
{ | ||
"name" : "ftp://ftp.zyxel.com/public/zywall10/firmware/zywall10_V3.50(WA.2)C0_Standard.zip", | ||
"refsource" : "MISC", | ||
"url" : "ftp://ftp.zyxel.com/public/zywall10/firmware/zywall10_V3.50(WA.2)C0_Standard.zip" | ||
}, | ||
{ | ||
"name" : "zyxel-zywall10-arp-dos(8436)", | ||
"refsource" : "XF", | ||
"url" : "http://www.iss.net/security_center/static/8436.php" | ||
}, | ||
{ | ||
"name" : "4272", | ||
"refsource" : "BID", | ||
"url" : "http://www.securityfocus.com/bid/4272" | ||
}, | ||
{ | ||
"name" : "20020312 [VulnWatch] ZyXEL ZyWALL10 DoS", | ||
"refsource" : "VULNWATCH", | ||
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0067.html" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "eng", | ||
"value": "n/a" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"name": "ftp://ftp.zyxel.com/public/zywall10/firmware/zywall10_V3.50(WA.2)C0_Standard.zip", | ||
"refsource": "MISC", | ||
"url": "ftp://ftp.zyxel.com/public/zywall10/firmware/zywall10_V3.50(WA.2)C0_Standard.zip" | ||
}, | ||
{ | ||
"name": "zyxel-zywall10-arp-dos(8436)", | ||
"refsource": "XF", | ||
"url": "http://www.iss.net/security_center/static/8436.php" | ||
}, | ||
{ | ||
"name": "4272", | ||
"refsource": "BID", | ||
"url": "http://www.securityfocus.com/bid/4272" | ||
}, | ||
{ | ||
"name": "20020311 ZyXEL ZyWALL10 DoS", | ||
"refsource": "BUGTRAQ", | ||
"url": "http://www.securityfocus.com/archive/1/261411" | ||
}, | ||
{ | ||
"name": "20020312 [VulnWatch] ZyXEL ZyWALL10 DoS", | ||
"refsource": "VULNWATCH", | ||
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0067.html" | ||
} | ||
] | ||
} | ||
} |
Oops, something went wrong.