forked from CVEProject/cvelist
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
65 changed files
with
4,358 additions
and
4,358 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,87 +1,87 @@ | ||
{ | ||
"CVE_data_meta" : { | ||
"ASSIGNER" : "cve@mitre.org", | ||
"ID" : "CVE-2003-0166", | ||
"STATE" : "PUBLIC" | ||
}, | ||
"affects" : { | ||
"vendor" : { | ||
"vendor_data" : [ | ||
"CVE_data_meta": { | ||
"ASSIGNER": "cve@mitre.org", | ||
"ID": "CVE-2003-0166", | ||
"STATE": "PUBLIC" | ||
}, | ||
"affects": { | ||
"vendor": { | ||
"vendor_data": [ | ||
{ | ||
"product": { | ||
"product_data": [ | ||
{ | ||
"product_name": "n/a", | ||
"version": { | ||
"version_data": [ | ||
{ | ||
"version_value": "n/a" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"vendor_name": "n/a" | ||
} | ||
] | ||
} | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
"data_version": "4.0", | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"product" : { | ||
"product_data" : [ | ||
{ | ||
"product_name" : "n/a", | ||
"version" : { | ||
"version_data" : [ | ||
{ | ||
"version_value" : "n/a" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"vendor_name" : "n/a" | ||
"lang": "eng", | ||
"value": "Integer signedness error in emalloc() function for PHP before 4.3.2 allow remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via negative arguments to functions such as (1) socket_recv, (2) socket_recvfrom, and possibly other functions." | ||
} | ||
] | ||
} | ||
}, | ||
"data_format" : "MITRE", | ||
"data_type" : "CVE", | ||
"data_version" : "4.0", | ||
"description" : { | ||
"description_data" : [ | ||
{ | ||
"lang" : "eng", | ||
"value" : "Integer signedness error in emalloc() function for PHP before 4.3.2 allow remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via negative arguments to functions such as (1) socket_recv, (2) socket_recvfrom, and possibly other functions." | ||
} | ||
] | ||
}, | ||
"problemtype" : { | ||
"problemtype_data" : [ | ||
{ | ||
"description" : [ | ||
{ | ||
"lang" : "eng", | ||
"value" : "n/a" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references" : { | ||
"reference_data" : [ | ||
{ | ||
"name" : "20030326 @(#)Mordred Labs advisory - Integer overflow in PHP memory allocator", | ||
"refsource" : "BUGTRAQ", | ||
"url" : "http://marc.info/?l=bugtraq&m=104869828526885&w=2" | ||
}, | ||
{ | ||
"name" : "20030327 RE: FUD-ALARM: @(#)Mordred Labs advisory - Integer overflow in PHP memory allocator", | ||
"refsource" : "BUGTRAQ", | ||
"url" : "http://marc.info/?l=bugtraq&m=104878100719467&w=2" | ||
}, | ||
{ | ||
"name" : "20030402 Inaccurate Reports Concerning PHP Vulnerabilities", | ||
"refsource" : "BUGTRAQ", | ||
"url" : "http://marc.info/?l=bugtraq&m=104931415307111&w=2" | ||
}, | ||
{ | ||
"name" : "CLSA-2003:691", | ||
"refsource" : "CONECTIVA", | ||
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000691" | ||
}, | ||
{ | ||
"name" : "7197", | ||
"refsource" : "BID", | ||
"url" : "http://www.securityfocus.com/bid/7197" | ||
}, | ||
{ | ||
"name" : "7198", | ||
"refsource" : "BID", | ||
"url" : "http://www.securityfocus.com/bid/7198" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "eng", | ||
"value": "n/a" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"name": "20030402 Inaccurate Reports Concerning PHP Vulnerabilities", | ||
"refsource": "BUGTRAQ", | ||
"url": "http://marc.info/?l=bugtraq&m=104931415307111&w=2" | ||
}, | ||
{ | ||
"name": "CLSA-2003:691", | ||
"refsource": "CONECTIVA", | ||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000691" | ||
}, | ||
{ | ||
"name": "20030327 RE: FUD-ALARM: @(#)Mordred Labs advisory - Integer overflow in PHP memory allocator", | ||
"refsource": "BUGTRAQ", | ||
"url": "http://marc.info/?l=bugtraq&m=104878100719467&w=2" | ||
}, | ||
{ | ||
"name": "7198", | ||
"refsource": "BID", | ||
"url": "http://www.securityfocus.com/bid/7198" | ||
}, | ||
{ | ||
"name": "20030326 @(#)Mordred Labs advisory - Integer overflow in PHP memory allocator", | ||
"refsource": "BUGTRAQ", | ||
"url": "http://marc.info/?l=bugtraq&m=104869828526885&w=2" | ||
}, | ||
{ | ||
"name": "7197", | ||
"refsource": "BID", | ||
"url": "http://www.securityfocus.com/bid/7197" | ||
} | ||
] | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,72 +1,72 @@ | ||
{ | ||
"CVE_data_meta" : { | ||
"ASSIGNER" : "cve@mitre.org", | ||
"ID" : "CVE-2003-0339", | ||
"STATE" : "PUBLIC" | ||
}, | ||
"affects" : { | ||
"vendor" : { | ||
"vendor_data" : [ | ||
"CVE_data_meta": { | ||
"ASSIGNER": "cve@mitre.org", | ||
"ID": "CVE-2003-0339", | ||
"STATE": "PUBLIC" | ||
}, | ||
"affects": { | ||
"vendor": { | ||
"vendor_data": [ | ||
{ | ||
"product": { | ||
"product_data": [ | ||
{ | ||
"product_name": "n/a", | ||
"version": { | ||
"version_data": [ | ||
{ | ||
"version_value": "n/a" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"vendor_name": "n/a" | ||
} | ||
] | ||
} | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
"data_version": "4.0", | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"product" : { | ||
"product_data" : [ | ||
{ | ||
"product_name" : "n/a", | ||
"version" : { | ||
"version_data" : [ | ||
{ | ||
"version_value" : "n/a" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"vendor_name" : "n/a" | ||
"lang": "eng", | ||
"value": "Multiple heap-based buffer overflows in WsMp3 daemon (WsMp3d) 0.0.10 and earlier allow remote attackers to execute arbitrary code via long HTTP requests." | ||
} | ||
] | ||
} | ||
}, | ||
"data_format" : "MITRE", | ||
"data_type" : "CVE", | ||
"data_version" : "4.0", | ||
"description" : { | ||
"description_data" : [ | ||
{ | ||
"lang" : "eng", | ||
"value" : "Multiple heap-based buffer overflows in WsMp3 daemon (WsMp3d) 0.0.10 and earlier allow remote attackers to execute arbitrary code via long HTTP requests." | ||
} | ||
] | ||
}, | ||
"problemtype" : { | ||
"problemtype_data" : [ | ||
{ | ||
"description" : [ | ||
{ | ||
"lang" : "eng", | ||
"value" : "n/a" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references" : { | ||
"reference_data" : [ | ||
{ | ||
"name" : "20030522 WsMp3d remote exploit.", | ||
"refsource" : "BUGTRAQ", | ||
"url" : "http://marc.info/?l=bugtraq&m=105361764807746&w=2" | ||
}, | ||
{ | ||
"name" : "20030521 Remote Heap Corruption Overflow vulnerability in WsMp3d.", | ||
"refsource" : "BUGTRAQ", | ||
"url" : "http://marc.info/?l=bugtraq&m=105353178019353&w=2" | ||
}, | ||
{ | ||
"name" : "20030521 Remote Heap Corruption Overflow vulnerability in WsMp3d.", | ||
"refsource" : "VULNWATCH", | ||
"url" : "http://marc.info/?l=bugtraq&m=105353178019353&w=2" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "eng", | ||
"value": "n/a" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"name": "20030521 Remote Heap Corruption Overflow vulnerability in WsMp3d.", | ||
"refsource": "BUGTRAQ", | ||
"url": "http://marc.info/?l=bugtraq&m=105353178019353&w=2" | ||
}, | ||
{ | ||
"name": "20030521 Remote Heap Corruption Overflow vulnerability in WsMp3d.", | ||
"refsource": "VULNWATCH", | ||
"url": "http://marc.info/?l=bugtraq&m=105353178019353&w=2" | ||
}, | ||
{ | ||
"name": "20030522 WsMp3d remote exploit.", | ||
"refsource": "BUGTRAQ", | ||
"url": "http://marc.info/?l=bugtraq&m=105361764807746&w=2" | ||
} | ||
] | ||
} | ||
} |
Oops, something went wrong.