<?xml version='1.0' encoding='UTF-8'?>
<nvd xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://nvd.nist.gov/feeds/cve/1.2" nvd_xml_version="1.2" pub_date="2019-10-08" xsi:schemaLocation="http://nvd.nist.gov/feeds/cve/1.2 https://scap.nist.gov/schema/nvd/nvd-cve-feed_1.2.1.xsd">
  <entry type="CVE" name="CVE-2004-0001" seq="2004-0001" published="2004-02-17" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in the eflags checking in the 32-bit ptrace emulation for the Linux kernel on AMD64 systems allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200402-06.xml">GLSA-200402-06</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/337238" adv="1">VU#337238</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-017.html" adv="1" patch="1">RHSA-2004:017</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9429" adv="1">9429</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14888">linux-ptrace-gain-privilege(14888)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A868">oval:org.mitre.oval:def:868</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.20.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0002" seq="2004-0002" published="2004-03-03" modified="2008-09-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The TCP MSS (maximum segment size) functionality in netinet allows remote attackers to cause a denial of service (resource exhaustion) via (1) a low MTU, which causes a large number of small packets to be produced, or (2) via a large number of packets with a small TCP payload, which cause a large number of calls to the resource-intensive sowakeup function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://lists.freebsd.org/pipermail/cvs-src/2004-January/016271.html" adv="1" patch="1">http://lists.freebsd.org/pipermail/cvs-src/2004-January/016271.html</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="3.0" edition="releng"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.4"/>
        <vers num="3.5" edition="stable"/>
        <vers num="3.5.1" edition="release"/>
        <vers num="3.5.1" edition="stable"/>
        <vers num="4.0" edition="alpha"/>
        <vers num="4.0" edition="releng"/>
        <vers num="4.1"/>
        <vers num="4.1.1" edition="release"/>
        <vers num="4.1.1" edition="stable"/>
        <vers num="4.2" edition="stable"/>
        <vers num="4.3" edition="release"/>
        <vers num="4.3" edition="release_p38"/>
        <vers num="4.3" edition="releng"/>
        <vers num="4.3" edition="stable"/>
        <vers num="4.4" edition="release_p42"/>
        <vers num="4.4" edition="releng"/>
        <vers num="4.4" edition="stable"/>
        <vers num="4.5" edition="release"/>
        <vers num="4.5" edition="release_p32"/>
        <vers num="4.5" edition="releng"/>
        <vers num="4.5" edition="stable"/>
        <vers num="4.6" edition="release"/>
        <vers num="4.6" edition="release_p20"/>
        <vers num="4.6" edition="releng"/>
        <vers num="4.6" edition="stable"/>
        <vers num="4.6.2"/>
        <vers num="4.7" edition="release"/>
        <vers num="4.7" edition="release_p17"/>
        <vers num="4.7" edition="releng"/>
        <vers num="4.7" edition="stable"/>
        <vers num="4.8" edition="pre-release"/>
        <vers num="4.8" edition="release_p6"/>
        <vers num="4.8" edition="releng"/>
        <vers num="4.9" edition="pre-release"/>
        <vers num="5.0" edition="alpha"/>
        <vers num="5.0" edition="release_p14"/>
        <vers num="5.0" edition="releng"/>
        <vers num="5.1" edition="release_p5"/>
        <vers num="5.1" edition="releng"/>
        <vers num="5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0003" seq="2004-0003" published="2004-03-03" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-082.shtml">O-082</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-121.shtml">O-121</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-126.shtml">O-126</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-127.shtml">O-127</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-145.shtml">O-145</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-479">DSA-479</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-480">DSA-480</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-481">DSA-481</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-482">DSA-482</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-489">DSA-489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-491">DSA-491</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-495">DSA-495</ref>
      <ref source="CONFIRM" url="http://www.linuxcompatible.org/print25630.html" adv="1" patch="1">http://www.linuxcompatible.org/print25630.html</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:029">MDKSA-2004:029</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_05_linux_kernel.html">SuSE-SA:2004:005</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-044.html" adv="1" patch="1">RHSA-2004:044</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-065.html">RHSA-2004:065</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-106.html">RHSA-2004:106</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-166.html">RHSA-2004:166</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9570">9570</ref>
      <ref source="TURBO" url="http://www.turbolinux.com/security/2004/TLSA-2004-14.txt">TLSA-2004-14</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15029">linux-r128-gain-priviliges(15029)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1017">oval:org.mitre.oval:def:1017</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A834">oval:org.mitre.oval:def:834</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9204">oval:org.mitre.oval:def:9204</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.22" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0004" seq="2004-0004" published="2004-02-17" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The libCheckSignature function in crypto-utils.lib for OpenCA 0.9.1.6 and earlier only compares the serial of the signer's certificate and the one in the database, which can cause OpenCA to incorrectly accept a signature if the certificate's chain is trusted by OpenCA's chain directory, allowing remote attackers to spoof requests from other users.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107427313700554&amp;w=2">20040116 [OpenCA Advisory] Vulnerability in signature verification</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/336446">VU#336446</ref>
      <ref source="CONFIRM" url="http://www.openca.org/news/CAN-2004-0004.txt" adv="1" patch="1">http://www.openca.org/news/CAN-2004-0004.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9435" adv="1" patch="1">9435</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14847">openca-improper-signature-verification(14847)</ref>
    </refs>
    <vuln_soft>
      <prod name="openca" vendor="openca">
        <vers num="0.9.1.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0005" seq="2004-0005" published="2004-03-03" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Gaim 0.75 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) octal encoding in yahoo_decode that causes a null byte to be written beyond the buffer, (2) octal encoding in yahoo_decode that causes a pointer to reference memory beyond the terminating null byte, (3) a quoted printable string to the gaim_quotedp_decode MIME decoder that causes a null byte to be written beyond the buffer, and (4) quoted printable encoding in gaim_quotedp_decode that causes a pointer to reference memory beyond the terminating null byte.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html">20040126 Advisory 01/2004: 12 x Gaim remote overflows</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000813">CLA-2004:813</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107513690306318&amp;w=2">20040126 Advisory 01/2004: 12 x Gaim remote overflows</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/012004.html" adv="1" patch="1">http://security.e-matters.de/advisories/012004.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-434" adv="1" patch="1">DSA-434</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/190366">VU#190366</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/226974">VU#226974</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/404470">VU#404470</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/655974">VU#655974</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_04_gaim.html">SuSE-SA:2004:004</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008850">1008850</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.361158">SSA:2004-026</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14935">gaim-yahoodecode-offbyone-bo(14935)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14938">gaim-sscanf-oob(14938)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14942">gaim-mime-decoder-bo(14942)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14944">gaim-mime-decoder-oob(14944)</ref>
      <ref source="GENTOO" url="https://security.gentoo.org/glsa/200401-04">GLSA-200401-04</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0006" seq="2004-0006" published="2004-03-03" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc">20040201-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc">20040202-01-U</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html">20040126 Advisory 01/2004: 12 x Gaim remote overflows</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000813">CLA-2004:813</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107513690306318&amp;w=2">20040126 Advisory 01/2004: 12 x Gaim remote overflows</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107522432613022&amp;w=2">20040127 Ultramagnetic Advisory #001:  Multiple vulnerabilities in Gaim code</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/012004.html" adv="1" patch="1">http://security.e-matters.de/advisories/012004.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200401-04.xml" adv="1">GLSA-200401-04</ref>
      <ref source="CONFIRM" url="http://ultramagnetic.sourceforge.net/advisories/001.html" adv="1" patch="1">http://ultramagnetic.sourceforge.net/advisories/001.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-434">DSA-434</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/297198">VU#297198</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/371382">VU#371382</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/444158">VU#444158</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/503030">VU#503030</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/527142">VU#527142</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/871838">VU#871838</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:006">MDKSA-2004:006</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_04_gaim.html">SuSE-SA:2004:004</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-032.html" adv="1" patch="1">RHSA-2004:032</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-033.html">RHSA-2004:033</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-045.html">RHSA-2004:045</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9489">9489</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008850">1008850</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.361158">SSA:2004-026</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14939">gaim-yahoowebpending-cookie-bo(14939)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14940">gaim-login-name-bo(14940)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14941">gaim-login-value-bo(14941)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14943">gaim-yahoopacketread-keyname-bo(14943)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14945">gaim-urlparser-bo(14945)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14947">gaim-http-proxy-bo(14947)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10222">oval:org.mitre.oval:def:10222</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A818">oval:org.mitre.oval:def:818</ref>
    </refs>
    <vuln_soft>
      <prod name="gaim" vendor="rob_flynn">
        <vers num="0.75" prev="1"/>
      </prod>
      <prod name="ultramagnetic" vendor="ultramagnetic">
        <vers num="0.81" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0007" seq="2004-0007" published="2004-03-03" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the Extract Info Field Function for (1) MSN and (2) YMSG protocol handlers in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html">20040126 Advisory 01/2004: 12 x Gaim remote overflows</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000813">CLA-2004:813</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107513690306318&amp;w=2">20040126 Advisory 01/2004: 12 x Gaim remote overflows</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107522432613022&amp;w=2">20040127 Ultramagnetic Advisory #001:  Multiple vulnerabilities in Gaim code</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/012004.html" adv="1" patch="1">http://security.e-matters.de/advisories/012004.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200401-04.xml">GLSA-200401-04</ref>
      <ref source="CONFIRM" url="http://ultramagnetic.sourceforge.net/advisories/001.html" adv="1" patch="1">http://ultramagnetic.sourceforge.net/advisories/001.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-434" adv="1" patch="1">DSA-434</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/197142">VU#197142</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:006">MDKSA-2004:006</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-032.html">RHSA-2004:032</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-033.html" adv="1" patch="1">RHSA-2004:033</ref>
      <ref source="SUSE" url="http://www.securityfocus.com/advisories/6281">SuSE-SA:2004:004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9489">9489</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008850">1008850</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.361158">SSA:2004-026</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14946">gaim-extractinfo-bo(14946)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A819">oval:org.mitre.oval:def:819</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9906">oval:org.mitre.oval:def:9906</ref>
    </refs>
    <vuln_soft>
      <prod name="gaim" vendor="rob_flynn">
        <vers num="0.74" prev="1"/>
      </prod>
      <prod name="ultramagnetic" vendor="ultramagnetic">
        <vers num="0.81" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0008" seq="2004-0008" published="2004-03-03" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc">20040201-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc">20040202-01-U</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html">20040126 Advisory 01/2004: 12 x Gaim remote overflows</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000813">CLA-2004:813</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107513690306318&amp;w=2">20040126 Advisory 01/2004: 12 x Gaim remote overflows</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107522338611564&amp;w=2">20040127 [slackware-security]  GAIM security update (SSA:2004-026-01)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107522432613022&amp;w=2">20040127 Ultramagnetic Advisory #001:  Multiple vulnerabilities in Gaim code</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/012004.html" adv="1" patch="1">http://security.e-matters.de/advisories/012004.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200401-04.xml">GLSA-200401-04</ref>
      <ref source="CONFIRM" url="http://ultramagnetic.sourceforge.net/advisories/001.html" adv="1" patch="1">http://ultramagnetic.sourceforge.net/advisories/001.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-434">DSA-434</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/779614" adv="1">VU#779614</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:006">MDKSA-2004:006</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-032.html" adv="1" patch="1">RHSA-2004:032</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-033.html">RHSA-2004:033</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-045.html">RHSA-2004:045</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008850">1008850</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14937">gaim-directim-bo(14937)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A820">oval:org.mitre.oval:def:820</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9469">oval:org.mitre.oval:def:9469</ref>
    </refs>
    <vuln_soft>
      <prod name="gaim" vendor="rob_flynn">
        <vers num="0.74" prev="1"/>
      </prod>
      <prod name="ultramagnetic" vendor="ultramagnetic">
        <vers num="0.81" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0009" seq="2004-0009" published="2004-03-03" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Apache-SSL 1.3.28+1.52 and earlier, with SSLVerifyClient set to 1 or 3 and SSLFakeBasicAuth enabled, allows remote attackers to forge a client certificate by using basic authentication with the "one-line DN" of the target user.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016870.html">20040206 [apache-ssl] Apache-SSL security advisory - apache_1.3.28+ssl_1.52 and prior</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107619127531765&amp;w=2">20040206 Apache-SSL security advisory - apache_1.3.28+ssl_1.52 and prior</ref>
      <ref source="CONFIRM" url="http://www.apache-ssl.org/advisory-20040206.txt">http://www.apache-ssl.org/advisory-20040206.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9590" adv="1">9590</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15065">apachessl-default-password(15065)</ref>
    </refs>
    <vuln_soft>
      <prod name="apache-ssl" vendor="apache-ssl">
        <vers num="1.3.28_1.52" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0010" seq="2004-0010" published="2004-03-03" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the ncp_lookup function for ncpfs in Linux kernel 2.4.x allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000820">CLA-2004:820</ref>
      <ref source="FEDORA" url="http://fedoranews.org/updates/FEDORA-2004-079.shtml">FEDORA-2004-079</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-082.shtml">O-082</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-479" adv="1" patch="1">DSA-479</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-480">DSA-480</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-481">DSA-481</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-482">DSA-482</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-489">DSA-489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-491">DSA-491</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-495">DSA-495</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:015">MDKSA-2004:015</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_05_linux_kernel.html">SuSE-SA:2004:005</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-065.html">RHSA-2004:065</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-069.html" adv="1" patch="1">RHSA-2004:069</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-188.html">RHSA-2004:188</ref>
      <ref source="TURBO" url="http://www.securityfocus.com/advisories/6759">TLSA-2004-05</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9691" adv="1" patch="1">9691</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15250">linux-ncplookup-gain-privileges(15250)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1035">oval:org.mitre.oval:def:1035</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11388">oval:org.mitre.oval:def:11388</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A835">oval:org.mitre.oval:def:835</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.24"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0011" seq="2004-0011" published="2004-01-20" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in fsp before 2.81.b18 allows remote users to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-048.shtml">O-048</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-416" adv="1" patch="1">DSA-416</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9377" adv="1" patch="1">9377</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14155">fsp-boundry-error-bo(14155)</ref>
    </refs>
    <vuln_soft>
      <prod name="fsp" vendor="debian">
        <vers num="2.81.b18" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0012" seq="2004-0012" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0013" seq="2004-0013" published="2004-02-03" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">jabber 1.4.2, 1.4.2a, and possibly earlier versions, does not properly handle SSL connections, which allows remote attackers to cause a denial of service (crash).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-414" adv="1" patch="1">DSA-414</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:005" adv="1" patch="1">MDKSA-2004:005</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9376" adv="1">9376</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14158">jabber-ssl-connections-dos(14158)</ref>
    </refs>
    <vuln_soft>
      <prod name="jabber_server" vendor="jabber_software_foundation">
        <vers num="1.4.2a"/>
        <vers num="1.4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0014" seq="2004-0014" published="2004-01-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the nd WebDAV interface 0.8.2 and earlier allows remote web servers to execute arbitrary code via certain long strings.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-412" adv="1" patch="1">DSA-412</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9365" adv="1" patch="1">9365</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008616">1008616</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14141">nd-long-string-bo(14141)</ref>
    </refs>
    <vuln_soft>
      <prod name="nd" vendor="nd">
        <vers num="0.8.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0015" seq="2004-0015" published="2004-02-03" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">vbox3 0.1.8 and earlier does not properly drop privileges before executing a user-provided TCL script, which allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-418" adv="1" patch="1">DSA-418</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9381" adv="1">9381</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14170">vbox3-gain-privileges(14170)</ref>
    </refs>
    <vuln_soft>
      <prod name="vbox3" vendor="vbox3">
        <vers num="0.1.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0016" seq="2004-0016" published="2004-02-03" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The calendar module for phpgroupware 0.9.14 does not enforce the "save extension" feature for holiday files, which allows remote attackers to create and execute PHP files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-419" adv="1" patch="1">DSA-419</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9387" adv="1">9387</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/13489">phpgroupware-calendar-file-include(13489)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0017" seq="2004-0017" published="2004-02-03" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in the (1) calendar and (2) infolog modules for phpgroupware 0.9.14 allow remote attackers to perform unauthorized database operations.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-419" adv="1" patch="1">DSA-419</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9386" adv="1">9386</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008662">1008662</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0028" seq="2004-0028" published="2004-02-03" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">jitterbug 1.6.2 does not properly sanitize inputs, which allows remote authenticated users to execute arbitrary commands.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-420" adv="1" patch="1">DSA-420</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9397" adv="1">9397</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14207">jitterbug-execute-code(14207)</ref>
    </refs>
    <vuln_soft>
      <prod name="jitterbug" vendor="samba">
        <vers num="1.6.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0029" seq="2004-0029" published="2004-01-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Lotus Notes Domino 6.0.2 on Linux installs the notes.ini configuration file with world-writable permissions, which allows local users to modify the Notes configuration and gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107340897710308&amp;w=2">20040106 Lotus Notes Domino 6.0.2 (linux) faulty default permissions</ref>
      <ref source="MISC" url="http://www.excluded.org/advisories/advisory05.txt">http://www.excluded.org/advisories/advisory05.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9366" adv="1">9366</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008623">1008623</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14153">lotus-notes-insecure-permissions(14153)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_domino" vendor="ibm">
        <vers num="6.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0030" seq="2004-0030" published="2004-01-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in (1) functions.php, (2) authentication_index.php, and (3) config_gedcom.php for PHPGEDVIEW 2.61 allows remote attackers to execute arbitrary PHP code by modifying the PGV_BASE_DIRECTORY parameter to reference a URL on a remote web server that contains the code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107340840209453&amp;w=2">20040106 Vuln in PHPGEDVIEW 2.61 Multi-Problem</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9368">9368</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008632">1008632</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14159">phpgedview-pgvbasedirectory-file-include(14159)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgedview" vendor="phpgedview">
        <vers num="2.61"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0031" seq="2004-0031" published="2004-01-20" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHPGEDVIEW 2.61 allows remote attackers to reinstall the software and change the administrator password via a direct HTTP request to editconfig.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107340840209453&amp;w=2">20040106 Vuln in PHPGEDVIEW 2.61 Multi-Problem</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14161">phpgedview-modify-admin-password(14161)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgedview" vendor="phpgedview">
        <vers num="2.61"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0032" seq="2004-0032" published="2004-01-20" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php in PHPGEDVIEW 2.61 allows remote attackers to inject arbitrary HTML and web script via the firstname parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107340840209453&amp;w=2">20040106 Vuln in PHPGEDVIEW 2.61 Multi-Problem</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9369">9369</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14160">phpgedview-search-xss(14160)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgedview" vendor="phpgedview">
        <vers num="2.61"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0033" seq="2004-0033" published="2004-01-20" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">admin.php in PHPGEDVIEW 2.61 allows remote attackers to obtain sensitive information via an action parameter with a phpinfo command.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107340840209453&amp;w=2">20040106 Vuln in PHPGEDVIEW 2.61 Multi-Problem</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9371">9371</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14162">phpgedview-admin-info-disclosure(14162)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgedview" vendor="phpgedview">
        <vers num="2.61"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0034" seq="2004-0034" published="2004-01-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Phorum 3.4.5 and earlier allow remote attackers to inject arbitrary HTML or web script via (1) the phorum_check_xss function in common.php, (2) the EditError variable in profile.php, and (3) the Error variable in login.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107340481804110&amp;w=2">20040105 Multiple Vulnerabilities in Phorum 3.4.5</ref>
      <ref source="CONFIRM" url="http://phorum.org/" adv="1">http://phorum.org/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9361" adv="1">9361</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008633">1008633</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14145">phorum-common-xss(14145)</ref>
    </refs>
    <vuln_soft>
      <prod name="phorum" vendor="phorum">
        <vers num="3.4.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0035" seq="2004-0035" published="2004-01-20" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in register.php for Phorum 3.4.5 and earlier allows remote attackers to execute arbitrary SQL commands via the hide_email parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107340481804110&amp;w=2">20040105 Multiple Vulnerabilities in Phorum 3.4.5</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9363" adv="1">9363</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14146">phorum-register-sql-injection(14146)</ref>
    </refs>
    <vuln_soft>
      <prod name="phorum" vendor="phorum">
        <vers num="3.4.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0036" seq="2004-0036" published="2004-01-20" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">SQL injection vulnerability in calendar.php for vBulletin Forum 2.3.x before 2.3.4 allows remote attackers to steal sensitive information via the eventid parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107340358202123&amp;w=2">20040105 vBulletin Forum 2.3.xx calendar.php SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9360">9360</ref>
      <ref source="CONFIRM" url="http://www.vbulletin.com/forum/showthread.php?postid=588825">http://www.vbulletin.com/forum/showthread.php?postid=588825</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14144">vbulletin-calendar-sql-injection(14144)</ref>
    </refs>
    <vuln_soft>
      <prod name="vbulletin" vendor="jelsoft">
        <vers num="2.3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0037" seq="2004-0037" published="2004-01-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">FirstClass Desktop Client 7.1 allows remote attackers to execute arbitrary commands via hyperlinks in FirstClass RTF messages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107340950611167&amp;w=2">20040105 FirstClass Client 7.1: Command Execution via Email Web Link</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9370" adv="1">9370</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008609">1008609</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14151">firstclassclient-execute-code(14151)</ref>
    </refs>
    <vuln_soft>
      <prod name="opentext_firstclass_desktop_client" vendor="opentext">
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0038" seq="2004-0038" published="2004-06-14" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">McAfee ePolicy Orchestrator (ePO) 2.5.1 Patch 13 and 3.0 SP2a Patch 3 allows remote attackers to execute arbitrary commands via certain HTTP POST requests to the spipe/file handler on ePO TCP port 81.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://download.nai.com/products/patches/ePO/v2.x/Patch14.txt" adv="1">http://download.nai.com/products/patches/ePO/v2.x/Patch14.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10200" adv="1" patch="1">10200</ref>
      <ref source="ISS" url="http://xforce.iss.net/xforce/alerts/id/173" adv="1" patch="1">20040510 McAfee ePolicy Orchestrator Remote Compromise Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14166">epolicy-execute-commands(14166)</ref>
    </refs>
    <vuln_soft>
      <prod name="epolicy_orchestrator" vendor="mcafee">
        <vers num="2.5" edition="sp1"/>
        <vers num="2.5.1"/>
        <vers num="3.0" edition="sp2a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0039" seq="2004-0039" published="2004-03-03" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple format string vulnerabilities in HTTP Application Intelligence (AI) component in Check Point Firewall-1 NG-AI R55 and R54, and Check Point Firewall-1 HTTP Security Server included with NG FP1, FP2, and FP3 allows remote attackers to execute arbitrary code via HTTP requests that cause format string specifiers to be used in an error message, as demonstrated using the scheme of a URI.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107604682227031&amp;w=2">20040205 Two checkpoint fw-1/vpn-1 vulns</ref>
      <ref source="CONFIRM" url="http://www.checkpoint.com/techsupport/alerts/security_server.html">http://www.checkpoint.com/techsupport/alerts/security_server.html</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-072.shtml">O-072</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/790771" adv="1" patch="1">VU#790771</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9581" adv="1" patch="1">9581</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-036A.html">TA04-036A</ref>
      <ref source="ISS" url="http://xforce.iss.net/xforce/alerts/id/162">20040204 Checkpoint Firewall-1 HTTP Parsing Format String Vulnerabilities</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14149">fw1-format-string(14149)</ref>
    </refs>
    <vuln_soft>
      <prod name="firewall-1" vendor="checkpoint">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0040" seq="2004-0040" published="2004-03-03" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Check Point VPN-1 Server 4.1 through 4.1 SP6 and Check Point SecuRemote/SecureClient 4.1 through 4.1 build 4200 allows remote attackers to execute arbitrary code via an ISAKMP packet with a large Certificate Request packet.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107604682227031&amp;w=2">20040205 Two checkpoint fw-1/vpn-1 vulns</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-073.shtml">O-073</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/873334" adv="1" patch="1">VU#873334</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9582" adv="1" patch="1">9582</ref>
      <ref source="ISS" url="http://xforce.iss.net/xforce/alerts/id/163">20040204 Checkpoint VPN-1/SecureClient ISAKMP Buffer Overflow</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14150">vpn1-ike-bo(14150)</ref>
    </refs>
    <vuln_soft>
      <prod name="firewall-1" vendor="checkpoint">
        <vers num="4.1" edition="sp1"/>
        <vers num="4.1" edition="sp2"/>
        <vers num="4.1" edition="sp3"/>
        <vers num="4.1" edition="sp4"/>
        <vers num="4.1" edition="sp5"/>
        <vers num="4.1" edition="sp5a"/>
        <vers num="next_generation_fp0"/>
        <vers num="next_generation_fp1"/>
      </prod>
      <prod name="vpn-1" vendor="checkpoint">
        <vers num="4.1" edition="sp5a"/>
        <vers num="next_generation_fp0"/>
        <vers num="next_generation_fp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0041" seq="2004-0041" published="2004-02-03" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The mod_auth_shadow module 1.4 and earlier does not properly enforce the expiration of a user account and password, which could allow remote authenticated users to bypass intended access restrictions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-421" adv="1" patch="1">DSA-421</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9404" adv="1">9404</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008675">1008675</ref>
    </refs>
    <vuln_soft>
      <prod name="mod_auth_shadow" vendor="mod_auth_shadow">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0042" seq="2004-0042" published="2004-02-03" modified="2008-09-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">vsftpd 1.1.3 generates different error messages depending on whether or not a valid username exists, which allows remote attackers to identify valid usernames.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008628">1008628</ref>
    </refs>
    <vuln_soft>
      <prod name="vsftpd" vendor="beasts">
        <vers num="1.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0043" seq="2004-0043" published="2004-02-03" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Yahoo Instant Messenger 5.6.0.1351 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long filename in the download feature.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015334.html">20040108 Yahoo Instant Messenger Long Filename Downloading Buffer Overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107357996802255&amp;w=2">20040108 Yahoo Instant Messenger Long Filename Downloading Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9383">9383</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008651">1008651</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14171">yahoo-messenger-filename-bo(14171)</ref>
    </refs>
    <vuln_soft>
      <prod name="messenger" vendor="yahoo">
        <vers num="5.6.0.1351" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0044" seq="2004-0044" published="2004-02-03" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cisco Personal Assistant 1.4(1) and 1.4(2) disables password authentication when "Allow Only Cisco CallManager Users" is enabled and the Corporate Directory settings refer to the directory service being used by Cisco CallManager, which allows remote attackers to gain access with a valid username.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040108-pa.shtml" adv="1" patch="1">20040108 Cisco Personal Assistant User Password Bypass Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9384">9384</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14172">ciscopersonalassistant-config-file-access(14172)</ref>
    </refs>
    <vuln_soft>
      <prod name="personal_assistant" vendor="cisco">
        <vers num="1.4(1)"/>
        <vers num="1.4(2)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0045" seq="2004-0045" published="2004-02-03" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the ARTpost function in art.c in the control message handling code for INN 2.4.0 may allow remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-01/0063.html" adv="1" patch="1">20040107 [SECURITY] INN: Buffer overflow in control message handling</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-01/0064.html" adv="1" patch="1">20040108 [OpenPKG-SA-2004.001] OpenPKG Security Advisory (inn)</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/759020">VU#759020</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9382" adv="1" patch="1">9382</ref>
      <ref source="SLACKWARE" url="http://www.slackware.org/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.365791">SSA:2004-014-02</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14190">inn-artpost-control-message-bo(14190)</ref>
    </refs>
    <vuln_soft>
      <prod name="inn" vendor="isc">
        <vers num="2.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0046" seq="2004-0046" published="2004-02-03" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in SnapStream PVS LITE allows remote attackers to inject arbitrary web script or HTML via a GET request containing a terminating '"' (double quote) character.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107350313917867&amp;w=2">20040106 SnapStream PVS LITE Cross Site Scripting Vulnerabillity</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008646">1008646</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9375" adv="1">9375</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14164">snapstream-quotation-xss(14164)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0047" seq="2004-0047" published="2004-03-03" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple programs in trr19 1.0 do not properly drop privileges before executing a system command, which could allow local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-430" adv="1" patch="1">DSA-430</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9520" adv="1">9520</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008875">1008875</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14975">trr19-gain-privileges(14975)</ref>
    </refs>
    <vuln_soft>
      <prod name="trr19" vendor="yamamoto_hirotaka">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0049" seq="2004-0049" published="2004-02-17" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Helix Universal Server/Proxy 9 and Mobile Server 10 allow remote attackers to cause a denial of service via certain HTTP POST messages to the Administration System port.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://seclists.org/lists/vulnwatch/2004/Jan-Mar/0057.html">20040318 ptl-2004-02: RealNetworks Helix Server 9 Administration Server Buffer Overflow</ref>
      <ref source="CONFIRM" url="http://service.real.com/help/faq/security/040112_dos/" adv="1" patch="1">http://service.real.com/help/faq/security/040112_dos/</ref>
      <ref source="CONFIRM" url="http://service.real.com/help/faq/security/security022604.html">http://service.real.com/help/faq/security/security022604.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/357834">20040318 ptl-2004-02: RealNetworks Helix Server 9 Administration Server Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9421" adv="1">9421</ref>
    </refs>
    <vuln_soft>
      <prod name="helix_universal_mobile_server" vendor="realnetworks">
        <vers num="10.1.1.120" prev="1"/>
      </prod>
      <prod name="helix_universal_server" vendor="realnetworks">
        <vers num="9.0.2.881" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0050" seq="2004-0050" published="2004-06-14" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Verity Ultraseek before 5.2.2 allows remote attackers to obtain the full pathname of the document root via an MS-DOS device name in the web search option, such as (1) NUL, (2) CON, (3) AUX, (4) COM1, (5) COM2, and others.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q2/0024.html" adv="1">20040505 Corsaire Security Advisory - Verity Ultraseek path disclosure issue</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020952.html">20040505 Corsaire Security Advisory - Verity Ultraseek path disclosure issue</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108377388114888&amp;w=2">20040505 Corsaire Security Advisory - Verity Ultraseek path disclosure issue</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16066">ultraseek-error-path-disclosure(16066)</ref>
    </refs>
    <vuln_soft>
      <prod name="ultraseek" vendor="verity">
        <vers num="5.2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0051" seq="2004-0051" published="2004-10-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109517788100063&amp;w=2">20040914 Corsaire Security Advisory - Multiple vendor MIME Content-Transfer-Encoding mechanism issue</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" adv="1">http://www.uniras.gov.uk/vuls/2004/380375/mime.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17337">mime-contenttransfer-filter-bypass(17337)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailsweeper" vendor="clearswift">
        <vers num="4.3.7"/>
        <vers num="4.3.8"/>
        <vers num="4.3.10"/>
        <vers num="4.3.11"/>
        <vers num="4.3.13"/>
        <vers num="4.3.14"/>
        <vers num="4.3.15"/>
      </prod>
      <prod name="internet_gatekeeper" vendor="f-secure">
        <vers num="6.3"/>
        <vers num="6.4"/>
        <vers num="6.31"/>
        <vers num="6.32"/>
      </prod>
      <prod name="ripmime" vendor="paul_l_daniels">
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.3.2.0"/>
        <vers num="1.3.2.2"/>
        <vers num="1.3.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0052" seq="2004-0052" published="2004-10-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard separator characters, or use standard separators incorrectly, within MIME headers, fields, parameters, or values, which may be interpreted differently by mail clients.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109517669115891&amp;w=2">20040914 Corsaire Security Advisory - Multiple vendor MIME separator issue</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" adv="1">http://www.uniras.gov.uk/vuls/2004/380375/mime.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17334">mime-separator-filtering-bypass(17334)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailsweeper" vendor="clearswift">
        <vers num="4.3.7"/>
        <vers num="4.3.8"/>
        <vers num="4.3.10"/>
        <vers num="4.3.11"/>
        <vers num="4.3.13"/>
        <vers num="4.3.14"/>
        <vers num="4.3.15"/>
      </prod>
      <prod name="internet_gatekeeper" vendor="f-secure">
        <vers num="6.3"/>
        <vers num="6.4"/>
        <vers num="6.31"/>
        <vers num="6.32"/>
      </prod>
      <prod name="ripmime" vendor="paul_l_daniels">
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.3.2.0"/>
        <vers num="1.3.2.2"/>
        <vers num="1.3.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0053" seq="2004-0053" published="2004-10-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use fields that use RFC2047 encoding, which may be interpreted differently by mail clients.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109520704408739&amp;w=2">20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2047 encoding issue</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" adv="1">http://www.uniras.gov.uk/vuls/2004/380375/mime.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17331">mime-rfc2047-filtering-bypass(17331)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailsweeper" vendor="clearswift">
        <vers num="4.3.7"/>
        <vers num="4.3.8"/>
        <vers num="4.3.10"/>
        <vers num="4.3.11"/>
        <vers num="4.3.13"/>
        <vers num="4.3.14"/>
        <vers num="4.3.15"/>
      </prod>
      <prod name="internet_gatekeeper" vendor="f-secure">
        <vers num="6.3"/>
        <vers num="6.4"/>
        <vers num="6.31"/>
        <vers num="6.32"/>
      </prod>
      <prod name="ripmime" vendor="paul_l_daniels">
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.3.2.0"/>
        <vers num="1.3.2.2"/>
        <vers num="1.3.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0054" seq="2004-0054" published="2004-02-17" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple vulnerabilities in the H.323 protocol implementation for Cisco IOS 11.3T through 12.2T allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT" url="http://www.cert.org/advisories/CA-2004-01.html" adv="1" patch="1">CA-2004-01</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml" adv="1" patch="1">20040113 Vulnerabilities in H.323 Message Processing</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/749342" adv="1" patch="1">VU#749342</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9406">9406</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008685">1008685</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/vuls/2004/006489/h323.htm">http://www.uniras.gov.uk/vuls/2004/006489/h323.htm</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4884">oval:org.mitre.oval:def:4884</ref>
    </refs>
    <vuln_soft>
      <prod name="ios" vendor="cisco">
        <vers num="11.3t"/>
        <vers num="12.0"/>
        <vers num="12.0s"/>
        <vers num="12.0t"/>
        <vers num="12.1"/>
        <vers num="12.1e"/>
        <vers num="12.1t"/>
        <vers num="12.2"/>
        <vers num="12.2s"/>
        <vers num="12.2t"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0055" seq="2004-0055" published="2004-02-17" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The print_attr_string function in print-radius.c for tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a RADIUS attribute with a large length value.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CALDERA" url="ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2004-008.0.txt">CSSA-2004-008.0</ref>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.9/SCOSA-2004.9.txt">SCOSA-2004.9</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc">20040103-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc">20040202-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000832">CLSA-2003:832</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html">APPLE-SA-2004-02-23</ref>
      <ref source="TRUSTIX" url="http://lwn.net/Alerts/66445/">2004-0004</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107577418225627&amp;w=2">20040131 [FLSA-2004:1222] Updated tcpdump resolves security vulnerabilites (resend with correct paths)</ref>
      <ref source="MLIST" url="http://marc.info/?l=tcpdump-workers&amp;m=107325073018070&amp;w=2">[tcpdump-workers] multiple vulnerabilities in tcpdump 3.8.1</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-425">DSA-425</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/955526" adv="1">VU#955526</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:008">MDKSA-2004:008</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00006.html">FEDORA-2004-090</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00009.html">FEDORA-2004-092</ref>
      <ref source="MLIST" url="http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00015.html">[fedora-announce-list] 20040311 Re: [SECURITY] Fedora Core 1 Update: tcpdump-3.7.2-8.fc1.1</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-legacy-list/2004-January/msg00726.html">FLSA:1222</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-008.html" adv="1" patch="1">RHSA-2004:008</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/7090" adv="1" patch="1">7090</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008735">1008735</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A850">oval:org.mitre.oval:def:850</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A853">oval:org.mitre.oval:def:853</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9989">oval:org.mitre.oval:def:9989</ref>
    </refs>
    <vuln_soft>
      <prod name="tcpdump" vendor="lbl">
        <vers num="3.5.2"/>
        <vers num="3.6.2"/>
        <vers num="3.7"/>
        <vers num="3.7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0056" seq="2004-0056" published="2004-02-17" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple vulnerabilities in the H.323 protocol implementation for Nortel Networks Business Communications Manager (BCM), Succession 1000 IP Trunk and IP Peer Networking, and 802.11 Wireless IP Gateway allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT" url="http://www.cert.org/advisories/CA-2004-01.html" adv="1" patch="1">CA-2004-01</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/749342" adv="1" patch="1">VU#749342</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9406">9406</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008687">1008687</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/vuls/2004/006489/h323.htm">http://www.uniras.gov.uk/vuls/2004/006489/h323.htm</ref>
    </refs>
    <vuln_soft>
      <prod name="business_communications_manager" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="802.11_wireless_ip_gateway" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="succession_communication_server_1000" vendor="nortel">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0057" seq="2004-0057" published="2004-02-17" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The rawprint function in the ISAKMP decoding routines (print-isakmp.c) for tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (segmentation fault) via malformed ISAKMP packets that cause invalid "len" or "loc" values to be used in a loop, a different vulnerability than CVE-2003-0989.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CALDERA" url="ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2004-008.0.txt">CSSA-2004-008.0</ref>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.9/SCOSA-2004.9.txt">SCOSA-2004.9</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc">20040103-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc">20040202-01-U</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html">APPLE-SA-2004-02-23</ref>
      <ref source="TRUSTIX" url="http://lwn.net/Alerts/66445/">2004-0004</ref>
      <ref source="ENGARDE" url="http://lwn.net/Alerts/66805/">ESA-20040119-002</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107577418225627&amp;w=2">20040131 [FLSA-2004:1222] Updated tcpdump resolves security vulnerabilites (resend with correct paths)</ref>
      <ref source="MLIST" url="http://marc.info/?l=tcpdump-workers&amp;m=107325073018070&amp;w=2">[tcpdump-workers] multiple vulnerabilities in tcpdump 3.8.1</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-425" adv="1" patch="1">DSA-425</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/174086">VU#174086</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:008">MDKSA-2004:008</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00006.html">FEDORA-2004-090</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00009.html">FEDORA-2004-092</ref>
      <ref source="MLIST" url="http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00015.html">[fedora-announce-list] 20040311 Re: [SECURITY] Fedora Core 1 Update: tcpdump-3.7.2-8.fc1.1</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-legacy-list/2004-January/msg00726.html">FLSA:1222</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-007.html" adv="1" patch="1">RHSA-2004:007</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-008.html">RHSA-2004:008</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/350238/30/21640/threaded">20040119 [ESA-20040119-002] 'tcpdump' multiple vulnerabilities.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9423" adv="1" patch="1">9423</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008716">1008716</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14837">tcpdump-rawprint-isakmp-dos(14837)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11197">oval:org.mitre.oval:def:11197</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A851">oval:org.mitre.oval:def:851</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A854">oval:org.mitre.oval:def:854</ref>
    </refs>
    <vuln_soft>
      <prod name="tcpdump" vendor="lbl">
        <vers num="3.8.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0058" seq="2004-0058" published="2004-02-17" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Antivir / Linux 2.0.9-9, and possibly earlier versions, allows local users to overwrite arbitrary files via a symlink attack on the .pid_antivir_$$ temporary file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107402026023763&amp;w=2">20040113 symlink vul for Antivir / Linux Version 2.0.9-9 (maybe lower)</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008702">1008702</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14214">antivir-tmpfile-insecure(14214)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.0.9.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0059" seq="2004-0059" published="2004-02-17" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in upload capability of WWW File Share Pro 2.42 and earlier allows remote attackers to overwrite arbitrary files via .. (dot dot) sequences in the filename parameter of a Content-Disposition: header.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107411794303201&amp;w=2">20040114 Multiple vulnerabilities in WWW Fileshare Pro &lt;= 2.42</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008779">1008779</ref>
    </refs>
    <vuln_soft>
      <prod name="www_file_share_pro" vendor="lionmax_software">
        <vers num="2.42" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0060" seq="2004-0060" published="2004-02-17" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">WWW File Share Pro 2.42 and earlier allows remote attackers to cause a denial of service (crash) via a large POST request.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107411794303201&amp;w=2">20040114 Multiple vulnerabilities in WWW Fileshare Pro &lt;= 2.42</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008779">1008779</ref>
    </refs>
    <vuln_soft>
      <prod name="www_file_share_pro" vendor="lionmax_software">
        <vers num="2.42" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0061" seq="2004-0061" published="2004-02-17" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">WWW File Share Pro 2.42 and earlier allows remote attackers to bypass directory access restrictions via (1) a URL with a trailing . (dot), or (2) a URI with a leading slash or backslash character.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107411794303201&amp;w=2">20040114 Multiple vulnerabilities in WWW Fileshare Pro &lt;= 2.42</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008779">1008779</ref>
    </refs>
    <vuln_soft>
      <prod name="www_file_share_pro" vendor="lionmax_software">
        <vers num="2.42" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0062" seq="2004-0062" published="2004-02-17" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the rnd arithmetic rounding function for various versions of FishCart before 3.1 allows remote attackers to "cause negative totals" via an order with a large quantity.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107411850203994&amp;w=2">20040114 FishCart Integer Overflow / Rounding Error</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008731">1008731</ref>
    </refs>
    <vuln_soft>
      <prod name="fishcart" vendor="fishnet">
        <vers num="3.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0063" seq="2004-0063" published="2004-02-17" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The SPP_VerifyPVV function in nCipher payShield SPP library 1.3.12, 1.5.18 and 1.6.18 returns a Status_OK value even if the HSM returns a different status code, which could cause applications to make incorrect security-critical decisions, e.g. by accepting an invalid PIN number.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107411819503569&amp;w=2">20040114 nCipher Advisory #8: payShield library may verify bad requests</ref>
      <ref source="CONFIRM" url="http://www.ncipher.com/support/advisories/advisory8_payshield.html" adv="1">http://www.ncipher.com/support/advisories/advisory8_payshield.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9422">9422</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14832">payshield-incorrect-request-verification(14832)</ref>
    </refs>
    <vuln_soft>
      <prod name="payshield_spp_library" vendor="ncipher">
        <vers num="1.3.12"/>
        <vers num="1.5.18"/>
        <vers num="1.6.18"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0064" seq="2004-0064" published="2004-02-17" modified="2016-10-17" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The SuSEconfig.gnome-filesystem script for YaST in SuSE 9.0 allows local users to overwrite arbitrary files via a symlink attack on files within the tmp.SuSEconfig.gnome-filesystem.$RANDOM temporary directory.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107402658600437&amp;w=2">20040113 SuSE linux 9.0 YaST config Skribt [exploit]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9411" adv="1">9411</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008703">1008703</ref>
    </refs>
    <vuln_soft>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0065" seq="2004-0065" published="2004-02-17" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in phpGedView before 2.65 allow remote attackers to execute arbitrary SQL via (1) timeline.php and (2) placelist.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107394912715478&amp;w=2">20040112 More phpGedView Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11910">11910</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11925">11925</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgedview" vendor="phpgedview">
        <vers num="2.65" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0066" seq="2004-0066" published="2004-02-17" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">phpGedView before 2.65 allows remote attackers to obtain the absolute path of the web server via malformed parameters to (1) indilist.php, (2) famlist.php, (3) placelist.php, (4) imageview.php, (5) timeline.php, (6) clippings.php, (7) login.php, and (8) gdbi.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107394912715478&amp;w=2">20040112 More phpGedView Vulnerabilities</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14215">phpgedview-path-disclosure(14215)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgedview" vendor="phpgedview">
        <vers num="2.65" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0067" seq="2004-0067" published="2004-02-17" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in phpGedView before 2.65 allow remote attackers to inject arbitrary HTML or web script via (1) descendancy.php, (2) index.php, (3) individual.php, (4) login.php, (5) relationship.php, (6) source.php, (7) imageview.php, (8) calendar.php, (9) gedrecord.php, (10) login.php, and (11) gdbi_interface.php.  NOTE: some aspects of vector 10 were later reported to affect 4.1.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107394912715478&amp;w=2">20040112 More phpGedView Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1018613">1018613</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/477881/100/0/threaded">20070827 PhpGedView login page multiple XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11868">11868</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11880">11880</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11882">11882</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11888">11888</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11890">11890</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11891">11891</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11894">11894</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11903">11903</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11904">11904</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11905">11905</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11906">11906</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11907">11907</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2007/2995" adv="1">ADV-2007-2995</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14212">phpgedview-multiple-xss(14212)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/36285">phpgedview-login-xss(36285)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgedview" vendor="phpgedview">
        <vers num="2.65" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0068" seq="2004-0068" published="2004-02-17" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in config.php for PhpDig 1.6.5 and earlier allows remote attackers to execute arbitrary PHP code by modifying the $relative_script_path parameter to reference a URL on a remote web server that contains the code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107412194008671&amp;w=2">20040114 PhpDig 1.6.x: remote command execution</ref>
      <ref source="CONFIRM" url="http://www.phpdig.net/showthread.php?s=58bcc71c822830ec3bbdaae6d56846e0&amp;threadid=393" patch="1">http://www.phpdig.net/showthread.php?s=58bcc71c822830ec3bbdaae6d56846e0&amp;threadid=393</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9424" adv="1" patch="1">9424</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14826">phpdig-config-file-include(14826)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpdig" vendor="phpdig.net">
        <vers num="1.6.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0069" seq="2004-0069" published="2004-02-17" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in HD Soft Windows FTP Server 1.6 and earlier allows remote attackers to execute arbitrary code via format string specifiers in the username, which is processed by the wscanf function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107367110805273&amp;w=2">20040108 Windows FTP Server Format String Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107401398014761&amp;w=2">20040113 exploit for HD Soft Windows FTP Server 1.6</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9385" adv="1">9385</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008658">1008658</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_ftp_server" vendor="hd_soft">
        <vers num="1.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0070" seq="2004-0070" published="2004-02-17" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in module.php for ezContents allows remote attackers to execute arbitrary PHP code by modifying the link parameter to reference a URL on a remote web server that contains the code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107392588915627&amp;w=2">20040110 Remote Code Execution in ezContents</ref>
      <ref source="CONFIRM" url="http://www.ezcontents.org/forum/viewtopic.php?t=361">http://www.ezcontents.org/forum/viewtopic.php?t=361</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9396" adv="1">9396</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14199">ezcontents-php-file-include(14199)</ref>
    </refs>
    <vuln_soft>
      <prod name="ezcontents" vendor="visualshapers">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0071" seq="2004-0071" published="2004-02-17" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in buildManPage in class.manpagelookup.php for PHP Man Page Lookup 1.2.0 allows remote attackers to read arbitrary files via the command parameter ($cmd variable) to index.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107392764118403&amp;w=2">20040110 PHP Manpage lookup directory transversal / file disclosing</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9395">9395</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008689">1008689</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14203">manpagelookup-directory-traversal(14203)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0072" seq="2004-0072" published="2004-02-17" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Accipiter Direct Server 6.0 allows remote attackers to read arbitrary files via encoded \.. (backslash .., "%5c%2e%2e") sequences in an HTTP request.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0274.html">20040109 Directory Traversal in Accipiter Direct Server 6.0</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107392576215418&amp;w=2">20040109 Directory Traversal in Accipiter Direct Server 6.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9389" adv="1" patch="1">9389</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14198">accipterdirectserver-directory-traversal(14198)</ref>
    </refs>
    <vuln_soft>
      <prod name="accipiter_direct_server" vendor="accipiter">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0073" seq="2004-0073" published="2004-02-17" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in (1) config.php and (2) config_page.php for EasyDynamicPages 2.0 allows remote attackers to execute arbitrary PHP code by modifying the edp_relative_path parameter to reference a URL on a remote web server that contains a malicious serverdata.php script.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107307457327707&amp;w=2">20040102 include() vuln in EasyDynamicPages v.2.0</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008584">1008584</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9338" adv="1" patch="1">9338</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14136">easydynamicpages-php-file-include(14136)</ref>
    </refs>
    <vuln_soft>
      <prod name="easydynamicpages" vendor="stoitsov">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0074" seq="2004-0074" published="2004-02-17" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in xsok 1.02 allows local users to gain privileges via (1) a long LANG environment variable, or (2) a long -xsokdir command line argument, a different vulnerability than CVE-2003-0949.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107307407027259&amp;w=2">20040102 xsok local games exploit</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107332542918529&amp;w=2">20040103 xsok local games exploit (2)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9341" adv="1" patch="1">9341</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9352" adv="1">9352</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14906">xsok-long-xsokdir-bo(14906)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14910">xsok-lang-bo(14910)</ref>
    </refs>
    <vuln_soft>
      <prod name="xsok" vendor="michael_bischoff">
        <vers num="1.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0075" seq="2004-0075" published="2004-03-15" modified="2017-10-09" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Vicam USB driver in Linux before 2.4.25 does not use the copy_from_user function when copying data from userspace to kernel space, which crosses security boundaries and allows local users to cause a denial of service.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000846">CLA-2004:846</ref>
      <ref source="MANDRAKE" url="http://frontal2.mandriva.com/security/advisories?name=MDKSA-2004:015">MDKSA-2004:015</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-082.shtml">O-082</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_05_linux_kernel.html">SuSE-SA:2004:005</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-065.html" adv="1" patch="1">RHSA-2004:065</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-293.html">RHSA-2005:293</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9690" adv="1" patch="1">9690</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15246">linux-vicam-dos(15246)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A836">oval:org.mitre.oval:def:836</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0076" seq="2004-0076" published="2004-08-18" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was removed from consideration by its Candidate Numbering Authority.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0077" seq="2004-0077" published="2004-03-03" modified="2018-05-02" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0040.html">20040218 Second critical mremap() bug found in all Linux kernels</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000820">CLA-2004:820</ref>
      <ref source="FEDORA" url="http://fedoranews.org/updates/FEDORA-2004-079.shtml">FEDORA-2004-079</ref>
      <ref source="MANDRAKE" url="http://frontal2.mandriva.com/security/advisories?name=MDKSA-2004:015">MDKSA-2004:015</ref>
      <ref source="MISC" url="http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt">http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107711762014175&amp;w=2">20040218 Second critical mremap() bug found in all Linux kernels</ref>
      <ref source="TRUSTIX" url="http://marc.info/?l=bugtraq&amp;m=107712137732553&amp;w=2">2004-0007</ref>
      <ref source="TRUSTIX" url="http://marc.info/?l=bugtraq&amp;m=107755871932680&amp;w=2">2004-0008</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200403-02.xml" adv="1" patch="1">GLSA-200403-02</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-082.shtml">O-082</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-438">DSA-438</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-439" adv="1" patch="1">DSA-439</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-440">DSA-440</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-441">DSA-441</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-442">DSA-442</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-444">DSA-444</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-450">DSA-450</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-453">DSA-453</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-454">DSA-454</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-456">DSA-456</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-466">DSA-466</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-470">DSA-470</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-475">DSA-475</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-514">DSA-514</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/981222">VU#981222</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_05_linux_kernel.html">SuSE-SA:2004:005</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-065.html">RHSA-2004:065</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-066.html">RHSA-2004:066</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-069.html">RHSA-2004:069</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-106.html">RHSA-2004:106</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9686" adv="1" patch="1">9686</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.404734">SSA:2004-049</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15244">linux-mremap-gain-privileges(15244)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A825">oval:org.mitre.oval:def:825</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A837">oval:org.mitre.oval:def:837</ref>
    </refs>
    <vuln_soft>
      <prod name="bigmem_kernel" vendor="redhat">
        <vers num="2.4.20-8" edition=":i686"/>
      </prod>
      <prod name="kernel" vendor="redhat">
        <vers num="2.4.20-8" edition=":athlon"/>
        <vers num="2.4.20-8" edition=":athlon_smp"/>
        <vers num="2.4.20-8" edition=":i386"/>
        <vers num="2.4.20-8" edition=":i686"/>
        <vers num="2.4.20-8" edition=":i686_smp"/>
      </prod>
      <prod name="kernel_doc" vendor="redhat">
        <vers num="2.4.20-8" edition=":i386"/>
      </prod>
      <prod name="kernel_source" vendor="redhat">
        <vers num="2.4.20-8" edition=":i386_src"/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
        <vers num="2.2.9"/>
        <vers num="2.2.10"/>
        <vers num="2.2.11"/>
        <vers num="2.2.12"/>
        <vers num="2.2.13"/>
        <vers num="2.2.14"/>
        <vers num="2.2.15" edition="pre16"/>
        <vers num="2.2.15_pre20"/>
        <vers num="2.2.16" edition="pre6"/>
        <vers num="2.2.17"/>
        <vers num="2.2.18"/>
        <vers num="2.2.19"/>
        <vers num="2.2.20"/>
        <vers num="2.2.21"/>
        <vers num="2.2.22"/>
        <vers num="2.2.23"/>
        <vers num="2.2.24"/>
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.24"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="netwosix_linux" vendor="netwosix">
        <vers num="1.0"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0078" seq="2004-0078" published="2004-03-03" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the index menu code (menu_pad_string of menu.c) for Mutt 1.4.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain mail messages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CALDERA" url="ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-013.0.txt">CSSA-2004-013.0</ref>
      <ref source="CONFIRM" url="http://bugs.debian.org/126336">http://bugs.debian.org/126336</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107651677817933&amp;w=2">20040211 Mutt-1.4.2 fixes buffer overflow.</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107696262905039&amp;w=2">20040215 LNSA-#2004-0001: mutt remote crash</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107884956930903&amp;w=2">20040309 [OpenPKG-SA-2004.005] OpenPKG Security Advisory (mutt)</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:010">MDKSA-2004:010</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-050.html" adv="1" patch="1">RHSA-2004:050</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-051.html" adv="1" patch="1">RHSA-2004:051</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9641" adv="1" patch="1">9641</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.405053">SSA:2004-043</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15134">mutt-index-menu-bo(15134)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A811">oval:org.mitre.oval:def:811</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A838">oval:org.mitre.oval:def:838</ref>
    </refs>
    <vuln_soft>
      <prod name="mutt" vendor="mutt">
        <vers num="1.2.1"/>
        <vers num="1.2.5"/>
        <vers num="1.2.5.1"/>
        <vers num="1.2.5.4"/>
        <vers num="1.2.5.5"/>
        <vers num="1.2.5.12"/>
        <vers num="1.2.5.12_ol"/>
        <vers num="1.3.12"/>
        <vers num="1.3.12.1"/>
        <vers num="1.3.16"/>
        <vers num="1.3.17"/>
        <vers num="1.3.22"/>
        <vers num="1.3.24"/>
        <vers num="1.3.25"/>
        <vers num="1.3.27"/>
        <vers num="1.3.28"/>
        <vers num="1.4.0"/>
        <vers num="1.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0079" seq="2004-0079" published="2004-11-23" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc">FreeBSD-SA-04:05</ref>
      <ref source="NETBSD" url="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc">NetBSD-SA2004-005</ref>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt">SCOSA-2004.10</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000834">CLA-2004:834</ref>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=61798">http://docs.info.apple.com/article.html?artnum=61798</ref>
      <ref source="FEDORA" url="http://fedoranews.org/updates/FEDORA-2004-095.shtml">FEDORA-2004-095</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html">APPLE-SA-2005-08-17</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html">APPLE-SA-2005-08-15</ref>
      <ref source="CONFIRM" url="http://lists.apple.com/mhonarc/security-announce/msg00045.html">http://lists.apple.com/mhonarc/security-announce/msg00045.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107953412903636&amp;w=2">20040317 New OpenSSL releases fix denial of service attacks [17 March 2004]</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=108403806509920&amp;w=2">SSRT4717</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200403-03.xml">GLSA-200403-03</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524">57524</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm">http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm</ref>
      <ref source="CONFIRM" url="http://support.lexmark.com/index?page=content&amp;id=TE88&amp;locale=EN&amp;userlocale=EN_US">http://support.lexmark.com/index?page=content&amp;id=TE88&amp;locale=EN&amp;userlocale=EN_US</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-101.shtml">O-101</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml">20040317 Cisco OpenSSL Implementation Vulnerability</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-465">DSA-465</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/288574">VU#288574</ref>
      <ref source="ENGARDE" url="http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html">ESA-20040317-003</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:023">MDKSA-2004:023</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_07_openssl.html">SuSE-SA:2004:007</ref>
      <ref source="CONFIRM" url="http://www.openssl.org/news/secadv_20040317.txt">http://www.openssl.org/news/secadv_20040317.txt</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html">FEDORA-2005-1042</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-120.html">RHSA-2004:120</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-121.html">RHSA-2004:121</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-139.html">RHSA-2004:139</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-829.html">RHSA-2005:829</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-830.html">RHSA-2005:830</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9899" adv="1">9899</ref>
      <ref source="SLACKWARE" url="http://www.slackware.org/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.455961">SSA:2004-077</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0012">2004-0012</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/vuls/2004/224012/index.htm">http://www.uniras.gov.uk/vuls/2004/224012/index.htm</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-078A.html" adv="1">TA04-078A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15505">openssl-dochangecipherspec-dos(15505)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621">oval:org.mitre.oval:def:2621</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770">oval:org.mitre.oval:def:5770</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870">oval:org.mitre.oval:def:870</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975">oval:org.mitre.oval:def:975</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779">oval:org.mitre.oval:def:9779</ref>
    </refs>
    <vuln_soft>
      <prod name="webstar" vendor="4d">
        <vers num="4.0"/>
        <vers num="5.2"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
        <vers num="5.3"/>
        <vers num="5.3.1"/>
      </prod>
      <prod name="intuity_audix" vendor="avaya">
        <vers num="" edition=":lx"/>
        <vers num="5.1.46"/>
        <vers num="s3210"/>
        <vers num="s3400"/>
      </prod>
      <prod name="vsu" vendor="avaya">
        <vers num="5"/>
        <vers num="5x"/>
        <vers num="100_r2.0.1"/>
        <vers num="500"/>
        <vers num="2000_r2.0.1"/>
        <vers num="5000_r2.0.1"/>
        <vers num="7500_r2.0.1"/>
        <vers num="10000_r2.0.1"/>
      </prod>
      <prod name="firewall-1" vendor="checkpoint">
        <vers num="" edition=":vsx-ng-ai"/>
        <vers num="2.0" edition=":gx"/>
        <vers num="next_generation_fp0"/>
        <vers num="next_generation_fp1"/>
        <vers num="next_generation_fp2"/>
      </prod>
      <prod name="provider-1" vendor="checkpoint">
        <vers num="4.1" edition="sp1"/>
        <vers num="4.1" edition="sp2"/>
        <vers num="4.1" edition="sp3"/>
        <vers num="4.1" edition="sp4"/>
      </prod>
      <prod name="vpn-1" vendor="checkpoint">
        <vers num="next_generation_fp0"/>
        <vers num="next_generation_fp1"/>
        <vers num="next_generation_fp2"/>
        <vers num="vsx_ng_with_application_intelligence"/>
      </prod>
      <prod name="access_registrar" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="application_and_content_networking_software" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="ciscoworks_common_management_foundation" vendor="cisco">
        <vers num="2.1"/>
      </prod>
      <prod name="ciscoworks_common_services" vendor="cisco">
        <vers num="2.2"/>
      </prod>
      <prod name="css11000_content_services_switch" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="css_secure_content_accelerator" vendor="cisco">
        <vers num="1.0"/>
        <vers num="2.0"/>
      </prod>
      <prod name="okena_stormwatch" vendor="cisco">
        <vers num="3.2"/>
      </prod>
      <prod name="pix_firewall" vendor="cisco">
        <vers num="6.2.2_.111"/>
      </prod>
      <prod name="threat_response" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="webns" vendor="cisco">
        <vers num="6.10"/>
        <vers num="6.10_b4"/>
        <vers num="7.1_0.1.02"/>
        <vers num="7.1_0.2.06"/>
        <vers num="7.2_0.0.03"/>
        <vers num="7.10"/>
        <vers num="7.10_.0.06s"/>
      </prod>
      <prod name="wbem" vendor="hp">
        <vers num="a.01.05.08"/>
        <vers num="a.02.00.00"/>
        <vers num="a.02.00.01"/>
      </prod>
      <prod name="speed_technologies_litespeed_web_server" vendor="lite">
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2_rc1"/>
        <vers num="1.2_rc2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3_rc1"/>
        <vers num="1.3_rc2"/>
        <vers num="1.3_rc3"/>
      </prod>
      <prod name="instant_virtual_extranet" vendor="neoteris">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.3.1"/>
      </prod>
      <prod name="edirectory" vendor="novell">
        <vers num="8.0"/>
        <vers num="8.5"/>
        <vers num="8.5.12a"/>
        <vers num="8.5.27"/>
        <vers num="8.6.2"/>
        <vers num="8.7"/>
        <vers num="8.7.1" edition="sp1"/>
      </prod>
      <prod name="imanager" vendor="novell">
        <vers num="1.5"/>
        <vers num="2.0"/>
      </prod>
      <prod name="openssl" vendor="openssl">
        <vers num="0.9.6c"/>
        <vers num="0.9.6d"/>
        <vers num="0.9.6e"/>
        <vers num="0.9.6f"/>
        <vers num="0.9.6g"/>
        <vers num="0.9.6h"/>
        <vers num="0.9.6i"/>
        <vers num="0.9.6j"/>
        <vers num="0.9.6k"/>
        <vers num="0.9.7" edition="beta1"/>
        <vers num="0.9.7" edition="beta2"/>
        <vers num="0.9.7" edition="beta3"/>
        <vers num="0.9.7a"/>
        <vers num="0.9.7b"/>
        <vers num="0.9.7c"/>
      </prod>
      <prod name="openssl" vendor="redhat">
        <vers num="0.9.6-15" edition=":i386"/>
        <vers num="0.9.6b-3" edition=":i386"/>
        <vers num="0.9.7a-2" edition=":i386"/>
        <vers num="0.9.7a-2" edition=":i386_dev"/>
        <vers num="0.9.7a-2" edition=":i386_perl"/>
      </prod>
      <prod name="bsafe_ssl-j_sdk" vendor="rsa">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.1"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
      <prod name="servercluster" vendor="stonesoft">
        <vers num="2.5"/>
        <vers num="2.5.2"/>
      </prod>
      <prod name="stonebeat_fullcluster" vendor="stonesoft">
        <vers num="1_2.0"/>
        <vers num="1_3.0"/>
        <vers num="2.0"/>
        <vers num="2.5"/>
        <vers num="3.0"/>
      </prod>
      <prod name="stonebeat_securitycluster" vendor="stonesoft">
        <vers num="2.0"/>
        <vers num="2.5"/>
      </prod>
      <prod name="stonebeat_webcluster" vendor="stonesoft">
        <vers num="2.0"/>
        <vers num="2.5"/>
      </prod>
      <prod name="stonegate" vendor="stonesoft">
        <vers num="1.5.17"/>
        <vers num="1.5.18"/>
        <vers num="1.6.2"/>
        <vers num="1.6.3"/>
        <vers num="1.7"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="2.0.1"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.4"/>
      </prod>
      <prod name="stonegate_vpn_client" vendor="stonesoft">
        <vers num="1.7"/>
        <vers num="1.7.2"/>
        <vers num="2.0"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
      </prod>
      <prod name="tarantella_enterprise" vendor="tarantella">
        <vers num="3.20"/>
        <vers num="3.30"/>
        <vers num="3.40"/>
      </prod>
      <prod name="gsx_server" vendor="vmware">
        <vers num="2.0"/>
        <vers num="2.0.1_build_2129"/>
        <vers num="2.5.1"/>
        <vers num="2.5.1_build_5336"/>
        <vers num="3.0_build_7592"/>
      </prod>
      <prod name="converged_communications_server" vendor="avaya">
        <vers num="2.0"/>
      </prod>
      <prod name="s8300" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8500" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8700" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="sg200" vendor="avaya">
        <vers num="4.4"/>
        <vers num="4.31.29"/>
      </prod>
      <prod name="sg203" vendor="avaya">
        <vers num="4.4"/>
        <vers num="4.31.29"/>
      </prod>
      <prod name="sg208" vendor="avaya">
        <vers num="4.4"/>
      </prod>
      <prod name="sg5" vendor="avaya">
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.4"/>
      </prod>
      <prod name="proxysg" vendor="bluecoat">
        <vers num=""/>
      </prod>
      <prod name="call_manager" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="content_services_switch_11500" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="firewall_services_module" vendor="cisco">
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1_(3.005)"/>
        <vers num="2.1_(0.208)"/>
      </prod>
      <prod name="gss_4480_global_site_selector" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="gss_4490_global_site_selector" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="mds_9000" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="secure_content_accelerator" vendor="cisco">
        <vers num="10000"/>
      </prod>
      <prod name="aaa_server" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="apache-based_web_server" vendor="hp">
        <vers num="2.0.43.00"/>
        <vers num="2.0.43.04"/>
      </prod>
      <prod name="sidewinder" vendor="securecomputing">
        <vers num="5.2"/>
        <vers num="5.2.0.01"/>
        <vers num="5.2.0.02"/>
        <vers num="5.2.0.03"/>
        <vers num="5.2.0.04"/>
        <vers num="5.2.1"/>
        <vers num="5.2.1.02"/>
      </prod>
      <prod name="crypto_accelerator_4000" vendor="sun">
        <vers num="1.0"/>
      </prod>
      <prod name="clientless_vpn_gateway_4400" vendor="symantec">
        <vers num="5.0"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.3.3"/>
      </prod>
      <prod name="cacheos_ca_sa" vendor="bluecoat">
        <vers num="4.1.10"/>
        <vers num="4.1.12"/>
      </prod>
      <prod name="ios" vendor="cisco">
        <vers num="12.1(11)e"/>
        <vers num="12.1(11b)e"/>
        <vers num="12.1(11b)e12"/>
        <vers num="12.1(11b)e14"/>
        <vers num="12.1(13)e9"/>
        <vers num="12.1(19)e1"/>
        <vers num="12.2(14)sy"/>
        <vers num="12.2(14)sy1"/>
        <vers num="12.2sy"/>
        <vers num="12.2za"/>
      </prod>
      <prod name="pix_firewall_software" vendor="cisco">
        <vers num="6.0"/>
        <vers num="6.0(1)"/>
        <vers num="6.0(2)"/>
        <vers num="6.0(3)"/>
        <vers num="6.0(4)"/>
        <vers num="6.0(4.101)"/>
        <vers num="6.1"/>
        <vers num="6.1(1)"/>
        <vers num="6.1(2)"/>
        <vers num="6.1(3)"/>
        <vers num="6.1(4)"/>
        <vers num="6.1(5)"/>
        <vers num="6.2"/>
        <vers num="6.2(1)"/>
        <vers num="6.2(2)"/>
        <vers num="6.2(3)"/>
        <vers num="6.2(3.100)"/>
        <vers num="6.3"/>
        <vers num="6.3(1)"/>
        <vers num="6.3(2)"/>
        <vers num="6.3(3.102)"/>
        <vers num="6.3(3.109)"/>
      </prod>
      <prod name="freebsd" vendor="freebsd">
        <vers num="4.8" edition="releng"/>
        <vers num="4.9"/>
        <vers num="5.1" edition="release"/>
        <vers num="5.1" edition="releng"/>
        <vers num="5.2"/>
        <vers num="5.2.1" edition="release"/>
      </prod>
      <prod name="hp-ux" vendor="hp">
        <vers num="8.05"/>
        <vers num="11.00"/>
        <vers num="11.11"/>
        <vers num="11.23"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.3"/>
        <vers num="3.4"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="7.2"/>
        <vers num="7.3"/>
        <vers num="8.0"/>
      </prod>
      <prod name="openserver" vendor="sco">
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0080" seq="2004-0080" published="2004-03-03" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The login program in util-linux 2.11 and earlier uses a pointer after it has been freed and reallocated, which could cause login to leak sensitive data.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc">20040201-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040406-01-U">20040406-01-U</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108077689801698&amp;w=2">20040331 OpenLinux: util-linux could leak sensitive data</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108144719532385&amp;w=2">20040408 LNSA-#2004-0010: login may leak sensitive data</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-06.xml">GLSA-200404-06</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/801526">VU#801526</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-056.html" adv="1" patch="1">RHSA-2004:056</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9558" adv="1">9558</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15016">utillinux-information-leak(15016)</ref>
    </refs>
    <vuln_soft>
      <prod name="util-linux" vendor="andries_brouwer">
        <vers num="2.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0081" seq="2004-0081" published="2004-11-23" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt">SCOSA-2004.10</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc">20040304-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000834">CLA-2004:834</ref>
      <ref source="FEDORA" url="http://fedoranews.org/updates/FEDORA-2004-095.shtml">FEDORA-2004-095</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107955049331965&amp;w=2">20040317 Re: New OpenSSL releases fix denial of service attacks [17  March 2004]</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108403850228012&amp;w=2">20040508 [FLSA-2004:1395] Updated OpenSSL resolves security vulnerability</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-119.html">RHSA-2004:119</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200403-03.xml">GLSA-200403-03</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524">57524</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml">20040317 Cisco OpenSSL Implementation Vulnerability</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-465">DSA-465</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/465542" adv="1">VU#465542</ref>
      <ref source="ENGARDE" url="http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html">ESA-20040317-003</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-120.html">RHSA-2004:120</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-121.html">RHSA-2004:121</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-139.html">RHSA-2004:139</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9899" adv="1">9899</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0012">2004-0012</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/vuls/2004/224012/index.htm">http://www.uniras.gov.uk/vuls/2004/224012/index.htm</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-078A.html">TA04-078A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15509">openssl-tls-dos(15509)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755">oval:org.mitre.oval:def:11755</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871">oval:org.mitre.oval:def:871</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902">oval:org.mitre.oval:def:902</ref>
    </refs>
    <vuln_soft>
      <prod name="webstar" vendor="4d">
        <vers num="4.0"/>
        <vers num="5.2"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
        <vers num="5.3"/>
        <vers num="5.3.1"/>
      </prod>
      <prod name="intuity_audix" vendor="avaya">
        <vers num="" edition=":lx"/>
        <vers num="5.1.46"/>
        <vers num="s3210"/>
        <vers num="s3400"/>
      </prod>
      <prod name="vsu" vendor="avaya">
        <vers num="5"/>
        <vers num="5x"/>
        <vers num="100_r2.0.1"/>
        <vers num="500"/>
        <vers num="2000_r2.0.1"/>
        <vers num="5000_r2.0.1"/>
        <vers num="7500_r2.0.1"/>
        <vers num="10000_r2.0.1"/>
      </prod>
      <prod name="firewall-1" vendor="checkpoint">
        <vers num="" edition=":vsx-ng-ai"/>
        <vers num="2.0" edition=":gx"/>
        <vers num="next_generation_fp0"/>
        <vers num="next_generation_fp1"/>
        <vers num="next_generation_fp2"/>
      </prod>
      <prod name="provider-1" vendor="checkpoint">
        <vers num="4.1" edition="sp1"/>
        <vers num="4.1" edition="sp2"/>
        <vers num="4.1" edition="sp3"/>
        <vers num="4.1" edition="sp4"/>
      </prod>
      <prod name="vpn-1" vendor="checkpoint">
        <vers num="next_generation"/>
        <vers num="next_generation_fp0"/>
        <vers num="next_generation_fp1"/>
        <vers num="vsx_ng_with_application_intelligence"/>
      </prod>
      <prod name="access_registrar" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="application_and_content_networking_software" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="ciscoworks_common_management_foundation" vendor="cisco">
        <vers num="2.1"/>
      </prod>
      <prod name="ciscoworks_common_services" vendor="cisco">
        <vers num="2.2"/>
      </prod>
      <prod name="css11000_content_services_switch" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="css_secure_content_accelerator" vendor="cisco">
        <vers num="1.0"/>
        <vers num="2.0"/>
      </prod>
      <prod name="okena_stormwatch" vendor="cisco">
        <vers num="3.2"/>
      </prod>
      <prod name="pix_firewall" vendor="cisco">
        <vers num="6.2.2_.111"/>
      </prod>
      <prod name="threat_response" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="webns" vendor="cisco">
        <vers num="6.10"/>
        <vers num="6.10_b4"/>
        <vers num="7.1_0.1.02"/>
        <vers num="7.1_0.2.06"/>
        <vers num="7.2_0.0.03"/>
        <vers num="7.10"/>
        <vers num="7.10_.0.06s"/>
      </prod>
      <prod name="wbem" vendor="hp">
        <vers num="a.01.05.08"/>
        <vers num="a.02.00.00"/>
        <vers num="a.02.00.01"/>
      </prod>
      <prod name="speed_technologies_litespeed_web_server" vendor="lite">
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2_rc1"/>
        <vers num="1.2_rc2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3_rc1"/>
        <vers num="1.3_rc2"/>
        <vers num="1.3_rc3"/>
      </prod>
      <prod name="instant_virtual_extranet" vendor="neoteris">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.3.1"/>
      </prod>
      <prod name="edirectory" vendor="novell">
        <vers num="8.0"/>
        <vers num="8.5"/>
        <vers num="8.5.12a"/>
        <vers num="8.5.27"/>
        <vers num="8.6.2"/>
        <vers num="8.7"/>
        <vers num="8.7.1" edition="sp1"/>
      </prod>
      <prod name="imanager" vendor="novell">
        <vers num="1.5"/>
        <vers num="2.0"/>
      </prod>
      <prod name="openssl" vendor="openssl">
        <vers num="0.9.6c"/>
        <vers num="0.9.6d"/>
        <vers num="0.9.6e"/>
        <vers num="0.9.6f"/>
        <vers num="0.9.6g"/>
        <vers num="0.9.6h"/>
        <vers num="0.9.6i"/>
        <vers num="0.9.6j"/>
        <vers num="0.9.6k"/>
        <vers num="0.9.7" edition="beta1"/>
        <vers num="0.9.7" edition="beta2"/>
        <vers num="0.9.7" edition="beta3"/>
        <vers num="0.9.7a"/>
        <vers num="0.9.7b"/>
        <vers num="0.9.7c"/>
      </prod>
      <prod name="openssl" vendor="redhat">
        <vers num="0.9.6-15" edition=":i386"/>
        <vers num="0.9.6b-3" edition=":i386"/>
        <vers num="0.9.7a-2" edition=":i386"/>
        <vers num="0.9.7a-2" edition=":i386_dev"/>
        <vers num="0.9.7a-2" edition=":i386_perl"/>
      </prod>
      <prod name="bsafe_ssl-j_sdk" vendor="rsa">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.1"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
      <prod name="servercluster" vendor="stonesoft">
        <vers num="2.5"/>
        <vers num="2.5.2"/>
      </prod>
      <prod name="stonebeat_fullcluster" vendor="stonesoft">
        <vers num="1_2.0"/>
        <vers num="1_3.0"/>
        <vers num="2.0"/>
        <vers num="2.5"/>
        <vers num="3.0"/>
      </prod>
      <prod name="stonebeat_securitycluster" vendor="stonesoft">
        <vers num="2.0"/>
        <vers num="2.5"/>
      </prod>
      <prod name="stonebeat_webcluster" vendor="stonesoft">
        <vers num="2.0"/>
        <vers num="2.5"/>
      </prod>
      <prod name="stonegate" vendor="stonesoft">
        <vers num="1.5.17"/>
        <vers num="1.5.18"/>
        <vers num="1.6.2"/>
        <vers num="1.6.3"/>
        <vers num="1.7"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="2.0.1"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.4"/>
      </prod>
      <prod name="stonegate_vpn_client" vendor="stonesoft">
        <vers num="1.7"/>
        <vers num="1.7.2"/>
        <vers num="2.0"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
      </prod>
      <prod name="tarantella_enterprise" vendor="tarantella">
        <vers num="3.20"/>
        <vers num="3.30"/>
        <vers num="3.40"/>
      </prod>
      <prod name="gsx_server" vendor="vmware">
        <vers num="2.0"/>
        <vers num="2.0.1_build_2129"/>
        <vers num="2.5.1"/>
        <vers num="2.5.1_build_5336"/>
        <vers num="3.0_build_7592"/>
      </prod>
      <prod name="converged_communications_server" vendor="avaya">
        <vers num="2.0"/>
      </prod>
      <prod name="s8300" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8500" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8700" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="sg200" vendor="avaya">
        <vers num="4.4"/>
        <vers num="4.31.29"/>
      </prod>
      <prod name="sg203" vendor="avaya">
        <vers num="4.4"/>
        <vers num="4.31.29"/>
      </prod>
      <prod name="sg208" vendor="avaya">
        <vers num="4.4"/>
      </prod>
      <prod name="sg5" vendor="avaya">
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.4"/>
      </prod>
      <prod name="proxysg" vendor="bluecoat">
        <vers num=""/>
      </prod>
      <prod name="call_manager" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="content_services_switch_11500" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="firewall_services_module" vendor="cisco">
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1_(3.005)"/>
        <vers num="2.1_(0.208)"/>
      </prod>
      <prod name="gss_4480_global_site_selector" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="gss_4490_global_site_selector" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="mds_9000" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="secure_content_accelerator" vendor="cisco">
        <vers num="10000"/>
      </prod>
      <prod name="aaa_server" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="apache-based_web_server" vendor="hp">
        <vers num="2.0.43.00"/>
        <vers num="2.0.43.04"/>
      </prod>
      <prod name="sidewinder" vendor="securecomputing">
        <vers num="5.2"/>
        <vers num="5.2.0.01"/>
        <vers num="5.2.0.02"/>
        <vers num="5.2.0.03"/>
        <vers num="5.2.0.04"/>
        <vers num="5.2.1"/>
        <vers num="5.2.1.02"/>
      </prod>
      <prod name="crypto_accelerator_4000" vendor="sun">
        <vers num="1.0"/>
      </prod>
      <prod name="clientless_vpn_gateway_4400" vendor="symantec">
        <vers num="5.0"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.3.3"/>
      </prod>
      <prod name="cacheos_ca_sa" vendor="bluecoat">
        <vers num="4.1.10"/>
        <vers num="4.1.12"/>
      </prod>
      <prod name="ios" vendor="cisco">
        <vers num="12.1(11)e"/>
        <vers num="12.1(11b)e"/>
        <vers num="12.1(11b)e12"/>
        <vers num="12.1(11b)e14"/>
        <vers num="12.1(13)e9"/>
        <vers num="12.1(19)e1"/>
        <vers num="12.2(14)sy"/>
        <vers num="12.2(14)sy1"/>
        <vers num="12.2sy"/>
        <vers num="12.2za"/>
      </prod>
      <prod name="pix_firewall_software" vendor="cisco">
        <vers num="6.0"/>
        <vers num="6.0(1)"/>
        <vers num="6.0(2)"/>
        <vers num="6.0(3)"/>
        <vers num="6.0(4)"/>
        <vers num="6.0(4.101)"/>
        <vers num="6.1"/>
        <vers num="6.1(1)"/>
        <vers num="6.1(2)"/>
        <vers num="6.1(3)"/>
        <vers num="6.1(4)"/>
        <vers num="6.1(5)"/>
        <vers num="6.2"/>
        <vers num="6.2(1)"/>
        <vers num="6.2(2)"/>
        <vers num="6.2(3)"/>
        <vers num="6.2(3.100)"/>
        <vers num="6.3"/>
        <vers num="6.3(1)"/>
        <vers num="6.3(2)"/>
        <vers num="6.3(3.102)"/>
        <vers num="6.3(3.109)"/>
      </prod>
      <prod name="freebsd" vendor="freebsd">
        <vers num="4.8" edition="releng"/>
        <vers num="4.9"/>
        <vers num="5.1" edition="release"/>
        <vers num="5.1" edition="releng"/>
        <vers num="5.2"/>
        <vers num="5.2.1" edition="release"/>
      </prod>
      <prod name="hp-ux" vendor="hp">
        <vers num="8.05"/>
        <vers num="11.00"/>
        <vers num="11.11"/>
        <vers num="11.23"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.3"/>
        <vers num="3.4"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="7.2"/>
        <vers num="7.3"/>
        <vers num="8.0"/>
      </prod>
      <prod name="openserver" vendor="sco">
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0082" seq="2004-0082" published="2004-03-03" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The mksmbpasswd shell script (mksmbpasswd.sh) in Samba 3.0.0 and 3.0.1, when creating an account but marking it as disabled, may overwrite the user password with an uninitialized buffer, which could enable the account with a more easily guessable password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://us1.samba.org/samba/ftp/WHATSNEW-3.0.2a.txt">http://us1.samba.org/samba/ftp/WHATSNEW-3.0.2a.txt</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-078.shtml">O-078</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-064.html" adv="1" patch="1">RHSA-2004:064</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9637" adv="1" patch="1">9637</ref>
      <ref source="CONFIRM" url="http://www.vuxml.org/freebsd/3388eff9-5d6e-11d8-80e3-0020ed76ef5a.html">http://www.vuxml.org/freebsd/3388eff9-5d6e-11d8-80e3-0020ed76ef5a.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15132">samba-mksmbpasswd-gain-access(15132)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A827">oval:org.mitre.oval:def:827</ref>
    </refs>
    <vuln_soft>
      <prod name="samba" vendor="samba">
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0083" seq="2004-0083" published="2004-03-03" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000821">CLA-2004:821</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107644835523678&amp;w=2">20040210 iDEFENSESecurityAdvisory02.10.04: XFree86FontInformationFileBufferOverflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107653324115914&amp;w=2">20040211 XFree86 vulnerability exploit</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=110979666528890&amp;w=2">FLSA:2314</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200402-02.xml" adv="1">GLSA-200402-02</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57768-1">57768</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-443">DSA-443</ref>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=72">http://www.idefense.com/application/poi/display?id=72</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/820006">VU#820006</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:012">MDKSA-2004:012</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_06_xf86.html">SuSE-SA:2004:006</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-059.html">RHSA-2004:059</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-060.html">RHSA-2004:060</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-061.html">RHSA-2004:061</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9636" adv="1" patch="1">9636</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.405053">SSA:2004-043</ref>
      <ref source="CONFIRM" url="http://www.xfree86.org/cvs/changes" adv="1">http://www.xfree86.org/cvs/changes</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15130">xfree86-fontalias-bo(15130)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A806">oval:org.mitre.oval:def:806</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A830">oval:org.mitre.oval:def:830</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9612">oval:org.mitre.oval:def:9612</ref>
    </refs>
    <vuln_soft>
      <prod name="x11r6" vendor="xfree86_project">
        <vers num="4.1.0"/>
        <vers num="4.1.11"/>
        <vers num="4.1.12"/>
        <vers num="4.2.0"/>
        <vers num="4.2.1" edition=":errata"/>
        <vers num="4.3.0"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.3"/>
        <vers num="3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0084" seq="2004-0084" published="2004-03-03" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, allows local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias (font.alias) file, a different vulnerability than CVE-2004-0083 and CVE-2004-0106.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000821">CLA-2004:821</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107662833512775&amp;w=2">20040212 iDEFENSE Security Advisory 02.11.04: XFree86 Font Information File Buffer Overflow II</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=110979666528890&amp;w=2">FLSA:2314</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57768-1">57768</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-443">DSA-443</ref>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=73">http://www.idefense.com/application/poi/display?id=73</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/667502">VU#667502</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:012">MDKSA-2004:012</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_06_xf86.html">SuSE-SA:2004:006</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-059.html">RHSA-2004:059</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-060.html" adv="1" patch="1">RHSA-2004:060</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-061.html" adv="1" patch="1">RHSA-2004:061</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9652" adv="1" patch="1">9652</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.405053">SSA:2004-043</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15200">xfree86-copyisolatin1lLowered-bo(15200)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10405">oval:org.mitre.oval:def:10405</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A807">oval:org.mitre.oval:def:807</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A831">oval:org.mitre.oval:def:831</ref>
    </refs>
    <vuln_soft>
      <prod name="x11r6" vendor="xfree86_project">
        <vers num="4.1.0"/>
        <vers num="4.1.11"/>
        <vers num="4.1.12"/>
        <vers num="4.2.0"/>
        <vers num="4.2.1" edition=":errata"/>
        <vers num="4.3.0"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.3"/>
        <vers num="3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0085" seq="2004-0085" published="2004-03-03" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in the Mail application for Mac OS X 10.1.5 and 10.2.8 with unknown impact, a different vulnerability than CVE-2004-0086.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Jan/msg00000.html">APPLE-SA-2004-01-26</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9504" adv="1" patch="1">9504</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14992">macosx-mail-undisclosed(14992)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.1.5"/>
        <vers num="10.2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0086" seq="2004-0086" published="2004-03-03" modified="2008-09-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in the Mail application for Mac OS X 10.3.2 has unknown impact and attack vectors, a different vulnerability than CVE-2004-0085.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Jan/msg00000.html">APPLE-SA-2004-01-26</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9504">9504</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0087" seq="2004-0087" published="2004-03-03" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The System Configuration subsystem in Mac OS 10.2.8 and 10.3.2 allows local users to modify network settings, a different vulnerability than CVE-2004-0088.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Jan/msg00000.html">APPLE-SA-2004-01-26</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9504">9504</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14997">macosx-configd-file-manipulation(14997)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0088" seq="2004-0088" published="2004-03-03" modified="2008-09-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The System Configuration subsystem in Mac OS 10.2.8 allows local users to modify network settings, a different vulnerability than CVE-2004-0087.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Jan/msg00000.html">APPLE-SA-2004-01-26</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9504">9504</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0089" seq="2004-0089" published="2004-03-03" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in TruBlueEnvironment in Mac OS X 10.3.x and 10.2.x allows local users to gain privileges via a long environment variable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Jan/msg00000.html">APPLE-SA-2004-01-26</ref>
      <ref source="ATSTAKE" url="http://www.atstake.com/research/advisories/2004/a012704-1.txt">A012704-1</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/902374">VU#902374</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9509" adv="1">9509</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14968">macosx-trublue-environmentvariable-bo(14968)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0090" seq="2004-0090" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Windows File Sharing for Mac OS X 10.1.5 through 10.3.2 does not "shutdown properly," which has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Jan/msg00000.html" adv="1">APPLE-SA-2004-01-26</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=3791&amp;cid=1" adv="1">ESB-2004.0072</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9504" patch="1">9504</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.1.5"/>
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.1.5"/>
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0091" seq="2004-0091" published="2004-02-17" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">** DISPUTED **  NOTE: this issue has been disputed by the vendor.  Cross-site scripting (XSS) vulnerability in register.php for unknown versions of vBulletin allows remote attackers to inject arbitrary HTML or web script via the reg_site (or possibly regsite) parameter.  NOTE: the vendor has disputed this issue, saying "There is no hidden field called 'reg_site', nor any $reg_site variable anywhere in the vBulletin 2 or vBulletin 3 source code or templates, nor has it ever existed.  We can only assume that this vulnerability was found in a site running code modified from that supplied by Jelsoft."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107462349324945&amp;w=2">20040120 vBulletin Security Vulnerability</ref>
      <ref source="VULN-DEV" url="http://marc.info/?l=vuln-dev&amp;m=107462499927040&amp;w=2">20040120 vBulletin Security Vulnerability</ref>
      <ref source="VULN-DEV" url="http://marc.info/?l=vuln-dev&amp;m=107478592401619&amp;w=2">20040120 Re: vBulletin Security Vulnerability</ref>
      <ref source="VULN-DEV" url="http://marc.info/?l=vuln-dev&amp;m=107488880317647&amp;w=2">20040123 RE: vBulletin Security Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008780">1008780</ref>
    </refs>
    <vuln_soft>
      <prod name="vbulletin" vendor="jelsoft">
        <vers num="3.0_beta_2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0092" seq="2004-0092" published="2004-03-03" modified="2008-09-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Safari web browser in Mac OS X 10.2.8 and 10.3.2, with unknown impact.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Jan/msg00000.html">APPLE-SA-2004-01-26</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9504">9504</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0093" seq="2004-0093" published="2004-03-15" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">XFree86 4.1.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an out-of-bounds array index when using the GLX extension and Direct Rendering Infrastructure (DRI).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040406-01-U">20040406-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000824">CLSA-2004:824</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-443" adv="1" patch="1">DSA-443</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-152.html">RHSA-2004:152</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9701" adv="1">9701</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15272">xfree86-glx-array-dos(15272)</ref>
    </refs>
    <vuln_soft>
      <prod name="x11r6" vendor="xfree86_project">
        <vers num="4.1.0"/>
        <vers num="4.1.11"/>
        <vers num="4.1.12"/>
        <vers num="4.2.0"/>
        <vers num="4.2.1" edition=":errata"/>
        <vers num="4.3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0094" seq="2004-0094" published="2004-03-15" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer signedness errors in XFree86 4.1.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code when using the GLX extension and Direct Rendering Infrastructure (DRI).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040406-01-U">20040406-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000824">CLSA-2004:824</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-443" adv="1" patch="1">DSA-443</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-152.html">RHSA-2004:152</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9701">9701</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15273">xfree86-glx-integer-dos(15273)</ref>
    </refs>
    <vuln_soft>
      <prod name="x11r6" vendor="xfree86_project">
        <vers num="4.1.0"/>
        <vers num="4.1.11"/>
        <vers num="4.1.12"/>
        <vers num="4.2.0"/>
        <vers num="4.2.1" edition=":errata"/>
        <vers num="4.3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0095" seq="2004-0095" published="2004-02-17" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">McAfee ePolicy Orchestrator agent allows remote attackers to cause a denial of service (memory consumption and crash) and possibly execute arbitrary code via an HTTP POST request with an invalid Content-Length value, possibly triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://download.nai.com/products/patches/ePO/v3.1.0/EPO3013.zip">http://download.nai.com/products/patches/ePO/v3.1.0/EPO3013.zip</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9476" adv="1">9476</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14989">epolicy-contentlength-post-dos(14989)</ref>
    </refs>
    <vuln_soft>
      <prod name="epolicy_orchestrator" vendor="mcafee">
        <vers num="3.6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0096" seq="2004-0096" published="2004-03-03" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in mod_python 2.7.9 allows remote attackers to cause a denial of service (httpd crash) via a certain query string, a variant of CAN-2003-0973.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200401-03.xml">GLSA-200401-03</ref>
      <ref source="MLIST" url="http://www.modpython.org/pipermail/mod_python/2004-January/014879.html" adv="1" patch="1">[mod_python] 20040122 [ANNOUNCE] Mod_python 2.7.10</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-058.html">RHSA-2004:058</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-063.html">RHSA-2004:063</ref>
    </refs>
    <vuln_soft>
      <prod name="mod_python" vendor="apache">
        <vers num="2.7.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0097" seq="2004-0097" published="2004-03-03" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple vulnerabilities in PWLib before 1.6.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT" url="http://www.cert.org/advisories/CA-2004-01.html" adv="1" patch="1">CA-2004-01</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-448" adv="1" patch="1">DSA-448</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/749342" adv="1" patch="1">VU#749342</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-047.html" adv="1" patch="1">RHSA-2004:047</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9406">9406</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15202">pwlib-message-dos(15202)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10056">oval:org.mitre.oval:def:10056</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A803">oval:org.mitre.oval:def:803</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A826">oval:org.mitre.oval:def:826</ref>
    </refs>
    <vuln_soft>
      <prod name="pwlib" vendor="openh323_project">
        <vers num="1.6.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0098" seq="2004-0098" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0099" seq="2004-0099" published="2004-03-03" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">mksnap_ffs in FreeBSD 5.1 and 5.2 only sets the snapshot flag when creating a snapshot for a file system, which causes default values for other flags to be used, possibly disabling security-critical settings and allowing a local user to bypass intended access restrictions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:01.mksnap_ffs.asc" adv="1" patch="1">FreeBSD-SA-04:01</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9533" adv="1" patch="1">9533</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15005">freebsd-mksnapffs-bypass-security(15005)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="5.1" edition="release"/>
        <vers num="5.2.1" edition="release"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0103" seq="2004-0103" published="2004-03-03" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">crawl before 4.0.0 beta23 does not properly "apply a size check" when copying a certain environment variable, which may allow local users to gain privileges, possibly as a result of a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-432" adv="1" patch="1">DSA-432</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9566">9566</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15032">crawl-long-environment-bo(15032)</ref>
    </refs>
    <vuln_soft>
      <prod name="crawl" vendor="linley_henzell">
        <vers num="4.0.0_b23" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0104" seq="2004-0104" published="2004-03-03" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple format string vulnerabilities in Metamail 2.7 and earlier allow remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0041.html">20040218 metamail format string bugs and buffer overflows</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107713476911429&amp;w=2">20040218 metamail format string bugs and buffer overflows</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-083.shtml">O-083</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-449">DSA-449</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/518518">VU#518518</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:014">MDKSA-2004:014</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-073.html" adv="1" patch="1">RHSA-2004:073</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9692" adv="1" patch="1">9692</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.404734">SSA:2004-049</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15245">metamail-contenttype-format-string(15245)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15259">metamail-printheader-format-string(15259)</ref>
    </refs>
    <vuln_soft>
      <prod name="metamail" vendor="metamail_corporation">
        <vers num="2.7" prev="1"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":workstation"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0105" seq="2004-0105" published="2004-03-03" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Metamail 2.7 and earlier allow remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0041.html">20040218 metamail format string bugs and buffer overflows</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107713476911429&amp;w=2">20040218 metamail format string bugs and buffer overflows</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-083.shtml">O-083</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-449">DSA-449</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/513062">VU#513062</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:014">MDKSA-2004:014</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-073.html" adv="1" patch="1">RHSA-2004:073</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9692">9692</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.404734">SSA:2004-049</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15247">metamail-printheader-nonascii-bo(15247)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15258">metamail-splitmail-subject-bo(15258)</ref>
    </refs>
    <vuln_soft>
      <prod name="metamail" vendor="metamail_corporation">
        <vers num="2.7" prev="1"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":workstation"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0106" seq="2004-0106" published="2004-03-03" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unknown vulnerabilities in XFree86 4.1.0 to 4.3.0, related to improper handling of font files, a different set of vulnerabilities than CVE-2004-0083 and CVE-2004-0084.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000821">CLA-2004:821</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=110979666528890&amp;w=2">FLSA:2314</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-443">DSA-443</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:012">MDKSA-2004:012</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_06_xf86.html">SuSE-SA:2004:006</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-059.html">RHSA-2004:059</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-060.html" adv="1" patch="1">RHSA-2004:060</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-061.html" adv="1" patch="1">RHSA-2004:061</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.405053" adv="1" patch="1">SSA:2004-043</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15206">xfree86-multiple-font-improper-handling(15206)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11111">oval:org.mitre.oval:def:11111</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A809">oval:org.mitre.oval:def:809</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A832">oval:org.mitre.oval:def:832</ref>
    </refs>
    <vuln_soft>
      <prod name="x11r6" vendor="xfree86_project">
        <vers num="4.1.0"/>
        <vers num="4.1.11"/>
        <vers num="4.1.12"/>
        <vers num="4.2.0"/>
        <vers num="4.2.1" edition=":errata"/>
        <vers num="4.3.0"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.3"/>
        <vers num="3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0107" seq="2004-0107" published="2004-04-15" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The (1) post and (2) trigger scripts in sysstat 4.0.7 and earlier allow local users to overwrite arbitrary files via symlink attacks on temporary files, a different vulnerability than CVE-2004-0108.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040302-01-U.asc" patch="1">20040302-01-U</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-097.shtml">O-097</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-053.html" adv="1" patch="1">RHSA-2004:053</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-093.html">RHSA-2004:093</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9838" adv="1" patch="1">9838</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15428">sysstat-post-trigger-symlink(15428)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10737">oval:org.mitre.oval:def:10737</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A849">oval:org.mitre.oval:def:849</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A862">oval:org.mitre.oval:def:862</ref>
    </refs>
    <vuln_soft>
      <prod name="sysstat" vendor="redhat">
        <vers num="4.0.7-3" edition=":i386"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="sysstat" vendor="sysstat">
        <vers num="4.0.7"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.1.3"/>
        <vers num="4.1.4"/>
        <vers num="4.1.5"/>
        <vers num="4.1.6"/>
        <vers num="4.1.7"/>
        <vers num="5.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0108" seq="2004-0108" published="2004-04-15" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The isag utility, which processes sysstat data, allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CAN-2004-0107.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040302-01-U.asc" patch="1">20040302-01-U</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-460">DSA-460</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-053.html" adv="1" patch="1">RHSA-2004:053</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9844" adv="1" patch="1">9844</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15437">sysstat-isag-symlink(15437)</ref>
    </refs>
    <vuln_soft>
      <prod name="sysstat" vendor="redhat">
        <vers num="4.0.7-3" edition=":i386"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="sysstat" vendor="sysstat">
        <vers num="4.0.7"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.1.3"/>
        <vers num="4.1.4"/>
        <vers num="4.1.5"/>
        <vers num="4.1.6"/>
        <vers num="4.1.7"/>
        <vers num="5.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0109" seq="2004-0109" published="2004-06-01" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040405-01-U.asc" adv="1" patch="1">20040405-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc">20040504-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000846">CLA-2004:846</ref>
      <ref source="TRUSTIX" url="http://marc.info/?l=bugtraq&amp;m=108213675028441&amp;w=2">2004-0020</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-166.html" adv="1" patch="1">RHSA-2004:166</ref>
      <ref source="SECUNIA" url="http://secunia.com/advisories/11429">11429</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-02.xml">GLSA-200407-02</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-121.shtml">O-121</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-127.shtml">O-127</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-479">DSA-479</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-480">DSA-480</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-481">DSA-481</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-482">DSA-482</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-489">DSA-489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-491">DSA-491</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-495">DSA-495</ref>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=101&amp;type=vulnerabilities" adv="1">http://www.idefense.com/application/poi/display?id=101&amp;type=vulnerabilities</ref>
      <ref source="ENGARDE" url="http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html" adv="1" patch="1">ESA-20040428-004</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:029">MDKSA-2004:029</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_09_kernel.html">SuSE-SA:2004:009</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-105.html">RHSA-2004:105</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-106.html">RHSA-2004:106</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-183.html">RHSA-2004:183</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10141">10141</ref>
      <ref source="TURBO" url="http://www.turbolinux.com/security/2004/TLSA-2004-14.txt">TLSA-2004-14</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15866">linux-iso9660-bo(15866)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10733">oval:org.mitre.oval:def:10733</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A940">oval:org.mitre.oval:def:940</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0"/>
        <vers num="2.5.0"/>
        <vers num="2.6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0110" seq="2004-0110" published="2004-03-15" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the (1) nanohttp or (2) nanoftp modules in XMLSoft Libxml 2 (Libxml2) 2.6.0 through 2.6.5 allow remote attackers to execute arbitrary code via a long URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107851606605420&amp;w=2">20040305 [OpenPKG-SA-2004.003] OpenPKG Security Advisory (libxml)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107860178228804&amp;w=2">20040306 TSLSA-2004-0010 - libxml2</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-090.html" adv="1" patch="1">RHSA-2004:090</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200403-01.xml">GLSA-200403-01</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-086.shtml">O-086</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-455">DSA-455</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/493966">VU#493966</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_01_sr.html">SUSE-SR:2005:001</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-091.html">RHSA-2004:091</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-650.html">RHSA-2004:650</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9718" adv="1" patch="1">9718</ref>
      <ref source="CONFIRM" url="http://www.xmlsoft.org/news.html">http://www.xmlsoft.org/news.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15301">libxml2-nanohttp-bo(15301)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15302">libxml2-nanoftp-bo(15302)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11626">oval:org.mitre.oval:def:11626</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A833">oval:org.mitre.oval:def:833</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A875">oval:org.mitre.oval:def:875</ref>
    </refs>
    <vuln_soft>
      <prod name="propack" vendor="sgi">
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="libxml" vendor="xmlsoft">
        <vers num="1.8.17"/>
      </prod>
      <prod name="libxml2" vendor="xmlsoft">
        <vers num="2.4.19"/>
        <vers num="2.4.23"/>
        <vers num="2.5.4"/>
        <vers num="2.5.10"/>
        <vers num="2.5.11"/>
        <vers num="2.6.0"/>
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0111" seq="2004-0111" published="2004-04-15" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">gdk-pixbuf before 0.20 allows attackers to cause a denial of service (crash) via a malformed bitmap (BMP) file.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-464">DSA-464</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:020">MDKSA-2004:020</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-102.html">RHSA-2004:102</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-103.html" adv="1" patch="1">RHSA-2004:103</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9842" adv="1" patch="1">9842</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2005">FLSA:2005</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15426">gdk-pixbuf-bitmap-dos(15426)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A845">oval:org.mitre.oval:def:845</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A846">oval:org.mitre.oval:def:846</ref>
    </refs>
    <vuln_soft>
      <prod name="gdkpixbuf" vendor="gnome">
        <vers num="0.18"/>
        <vers num="0.20"/>
      </prod>
      <prod name="gdk_pixbuf" vendor="redhat">
        <vers num="0.18.0-7" edition=":i386"/>
        <vers num="0.18.0-7" edition=":i386_dev"/>
        <vers num="0.18.0-7" edition=":i386_gnome"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0112" seq="2004-0112" published="2004-11-23" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="NETBSD" url="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc">NetBSD-SA2004-005</ref>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt">SCOSA-2004.10</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000834">CLA-2004:834</ref>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=61798">http://docs.info.apple.com/article.html?artnum=61798</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html">APPLE-SA-2005-08-17</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html">APPLE-SA-2005-08-15</ref>
      <ref source="CONFIRM" url="http://lists.apple.com/mhonarc/security-announce/msg00045.html">http://lists.apple.com/mhonarc/security-announce/msg00045.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107953412903636&amp;w=2">20040317 New OpenSSL releases fix denial of service attacks [17 March 2004]</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=108403806509920&amp;w=2">SSRT4717</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200403-03.xml">GLSA-200403-03</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524">57524</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-101.shtml">O-101</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml">20040317 Cisco OpenSSL Implementation Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/484726">VU#484726</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:023">MDKSA-2004:023</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_07_openssl.html">SuSE-SA:2004:007</ref>
      <ref source="CONFIRM" url="http://www.openssl.org/news/secadv_20040317.txt">http://www.openssl.org/news/secadv_20040317.txt</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-120.html">RHSA-2004:120</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-121.html">RHSA-2004:121</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9899" adv="1">9899</ref>
      <ref source="SLACKWARE" url="http://www.slackware.org/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.455961">SSA:2004-077</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0012">2004-0012</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/vuls/2004/224012/index.htm">http://www.uniras.gov.uk/vuls/2004/224012/index.htm</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-078A.html" adv="1">TA04-078A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15508">openssl-kerberos-ciphersuites-dos(15508)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049">oval:org.mitre.oval:def:1049</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928">oval:org.mitre.oval:def:928</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580">oval:org.mitre.oval:def:9580</ref>
    </refs>
    <vuln_soft>
      <prod name="webstar" vendor="4d">
        <vers num="4.0"/>
        <vers num="5.2"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
        <vers num="5.3"/>
        <vers num="5.3.1"/>
      </prod>
      <prod name="intuity_audix" vendor="avaya">
        <vers num="" edition=":lx"/>
        <vers num="5.1.46"/>
        <vers num="s3210"/>
        <vers num="s3400"/>
      </prod>
      <prod name="vsu" vendor="avaya">
        <vers num="5"/>
        <vers num="5x"/>
        <vers num="100_r2.0.1"/>
        <vers num="500"/>
        <vers num="2000_r2.0.1"/>
        <vers num="5000_r2.0.1"/>
        <vers num="7500_r2.0.1"/>
        <vers num="10000_r2.0.1"/>
      </prod>
      <prod name="firewall-1" vendor="checkpoint">
        <vers num="" edition=":vsx-ng-ai"/>
        <vers num="2.0" edition=":gx"/>
        <vers num="next_generation_fp0"/>
        <vers num="next_generation_fp1"/>
        <vers num="next_generation_fp2"/>
      </prod>
      <prod name="provider-1" vendor="checkpoint">
        <vers num="4.1" edition="sp1"/>
        <vers num="4.1" edition="sp2"/>
        <vers num="4.1" edition="sp3"/>
        <vers num="4.1" edition="sp4"/>
      </prod>
      <prod name="vpn-1" vendor="checkpoint">
        <vers num="next_generation_fp0"/>
        <vers num="next_generation_fp1"/>
        <vers num="next_generation_fp2"/>
        <vers num="vsx_ng_with_application_intelligence"/>
      </prod>
      <prod name="access_registrar" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="application_and_content_networking_software" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="ciscoworks_common_management_foundation" vendor="cisco">
        <vers num="2.1"/>
      </prod>
      <prod name="ciscoworks_common_services" vendor="cisco">
        <vers num="2.2"/>
      </prod>
      <prod name="css11000_content_services_switch" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="css_secure_content_accelerator" vendor="cisco">
        <vers num="1.0"/>
        <vers num="2.0"/>
      </prod>
      <prod name="okena_stormwatch" vendor="cisco">
        <vers num="3.2"/>
      </prod>
      <prod name="pix_firewall" vendor="cisco">
        <vers num="6.2.2_.111"/>
      </prod>
      <prod name="threat_response" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="webns" vendor="cisco">
        <vers num="6.10"/>
        <vers num="6.10_b4"/>
        <vers num="7.1_0.1.02"/>
        <vers num="7.1_0.2.06"/>
        <vers num="7.2_0.0.03"/>
        <vers num="7.10"/>
        <vers num="7.10_.0.06s"/>
      </prod>
      <prod name="wbem" vendor="hp">
        <vers num="a.01.05.08"/>
        <vers num="a.02.00.00"/>
        <vers num="a.02.00.01"/>
      </prod>
      <prod name="speed_technologies_litespeed_web_server" vendor="lite">
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2_rc1"/>
        <vers num="1.2_rc2"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3_rc1"/>
        <vers num="1.3_rc2"/>
        <vers num="1.3_rc3"/>
      </prod>
      <prod name="instant_virtual_extranet" vendor="neoteris">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.3.1"/>
      </prod>
      <prod name="edirectory" vendor="novell">
        <vers num="8.0"/>
        <vers num="8.5"/>
        <vers num="8.5.12a"/>
        <vers num="8.5.27"/>
        <vers num="8.6.2"/>
        <vers num="8.7"/>
        <vers num="8.7.1" edition="sp1"/>
      </prod>
      <prod name="imanager" vendor="novell">
        <vers num="1.5"/>
        <vers num="2.0"/>
      </prod>
      <prod name="openssl" vendor="openssl">
        <vers num="0.9.6c"/>
        <vers num="0.9.6d"/>
        <vers num="0.9.6e"/>
        <vers num="0.9.6f"/>
        <vers num="0.9.6g"/>
        <vers num="0.9.6h"/>
        <vers num="0.9.6i"/>
        <vers num="0.9.6j"/>
        <vers num="0.9.6k"/>
        <vers num="0.9.7" edition="beta1"/>
        <vers num="0.9.7" edition="beta2"/>
        <vers num="0.9.7" edition="beta3"/>
        <vers num="0.9.7a"/>
        <vers num="0.9.7b"/>
        <vers num="0.9.7c"/>
      </prod>
      <prod name="openssl" vendor="redhat">
        <vers num="0.9.6-15" edition=":i386"/>
        <vers num="0.9.6b-3" edition=":i386"/>
        <vers num="0.9.7a-2" edition=":i386"/>
        <vers num="0.9.7a-2" edition=":i386_dev"/>
        <vers num="0.9.7a-2" edition=":i386_perl"/>
      </prod>
      <prod name="bsafe_ssl-j_sdk" vendor="rsa">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.1"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
      <prod name="servercluster" vendor="stonesoft">
        <vers num="2.5"/>
        <vers num="2.5.2"/>
      </prod>
      <prod name="stonebeat_fullcluster" vendor="stonesoft">
        <vers num="1_2.0"/>
        <vers num="1_3.0"/>
        <vers num="2.0"/>
        <vers num="2.5"/>
        <vers num="3.0"/>
      </prod>
      <prod name="stonebeat_securitycluster" vendor="stonesoft">
        <vers num="2.0"/>
        <vers num="2.5"/>
      </prod>
      <prod name="stonebeat_webcluster" vendor="stonesoft">
        <vers num="2.0"/>
        <vers num="2.5"/>
      </prod>
      <prod name="stonegate" vendor="stonesoft">
        <vers num="1.5.17"/>
        <vers num="1.5.18"/>
        <vers num="1.6.2"/>
        <vers num="1.6.3"/>
        <vers num="1.7"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="2.0.1"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.4"/>
      </prod>
      <prod name="tarantella_enterprise" vendor="tarantella">
        <vers num="3.20"/>
        <vers num="3.30"/>
        <vers num="3.40"/>
      </prod>
      <prod name="gsx_server" vendor="vmware">
        <vers num="2.0"/>
        <vers num="2.0.1_build_2129"/>
        <vers num="2.5.1"/>
        <vers num="2.5.1_build_5336"/>
        <vers num="3.0_build_7592"/>
      </prod>
      <prod name="converged_communications_server" vendor="avaya">
        <vers num="2.0"/>
      </prod>
      <prod name="s8300" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8500" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8700" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="sg200" vendor="avaya">
        <vers num="4.4"/>
        <vers num="4.31.29"/>
      </prod>
      <prod name="sg203" vendor="avaya">
        <vers num="4.4"/>
        <vers num="4.31.29"/>
      </prod>
      <prod name="sg208" vendor="avaya">
        <vers num="4.4"/>
      </prod>
      <prod name="sg5" vendor="avaya">
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.4"/>
      </prod>
      <prod name="proxysg" vendor="bluecoat">
        <vers num=""/>
      </prod>
      <prod name="call_manager" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="content_services_switch_11500" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="firewall_services_module" vendor="cisco">
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1_(3.005)"/>
        <vers num="2.1_(0.208)"/>
      </prod>
      <prod name="gss_4480_global_site_selector" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="gss_4490_global_site_selector" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="mds_9000" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="secure_content_accelerator" vendor="cisco">
        <vers num="10000"/>
      </prod>
      <prod name="aaa_server" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="apache-based_web_server" vendor="hp">
        <vers num="2.0.43.00"/>
        <vers num="2.0.43.04"/>
      </prod>
      <prod name="sidewinder" vendor="securecomputing">
        <vers num="5.2"/>
        <vers num="5.2.0.01"/>
        <vers num="5.2.0.02"/>
        <vers num="5.2.0.03"/>
        <vers num="5.2.0.04"/>
        <vers num="5.2.1"/>
        <vers num="5.2.1.02"/>
      </prod>
      <prod name="crypto_accelerator_4000" vendor="sun">
        <vers num="1.0"/>
      </prod>
      <prod name="clientless_vpn_gateway_4400" vendor="symantec">
        <vers num="5.0"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.3.3"/>
      </prod>
      <prod name="cacheos_ca_sa" vendor="bluecoat">
        <vers num="4.1.10"/>
        <vers num="4.1.12"/>
      </prod>
      <prod name="ios" vendor="cisco">
        <vers num="12.1(11)e"/>
        <vers num="12.1(11b)e"/>
        <vers num="12.1(11b)e12"/>
        <vers num="12.1(11b)e14"/>
        <vers num="12.1(13)e9"/>
        <vers num="12.1(19)e1"/>
        <vers num="12.2(14)sy"/>
        <vers num="12.2(14)sy1"/>
        <vers num="12.2sy"/>
        <vers num="12.2za"/>
      </prod>
      <prod name="pix_firewall_software" vendor="cisco">
        <vers num="6.0"/>
        <vers num="6.0(1)"/>
        <vers num="6.0(2)"/>
        <vers num="6.0(3)"/>
        <vers num="6.0(4)"/>
        <vers num="6.0(4.101)"/>
        <vers num="6.1"/>
        <vers num="6.1(1)"/>
        <vers num="6.1(2)"/>
        <vers num="6.1(3)"/>
        <vers num="6.1(4)"/>
        <vers num="6.1(5)"/>
        <vers num="6.2"/>
        <vers num="6.2(1)"/>
        <vers num="6.2(2)"/>
        <vers num="6.2(3)"/>
        <vers num="6.2(3.100)"/>
        <vers num="6.3"/>
        <vers num="6.3(1)"/>
        <vers num="6.3(2)"/>
        <vers num="6.3(3.102)"/>
        <vers num="6.3(3.109)"/>
      </prod>
      <prod name="freebsd" vendor="freebsd">
        <vers num="4.8" edition="releng"/>
        <vers num="4.9"/>
        <vers num="5.1" edition="release"/>
        <vers num="5.1" edition="releng"/>
        <vers num="5.2"/>
        <vers num="5.2.1" edition="release"/>
      </prod>
      <prod name="hp-ux" vendor="hp">
        <vers num="8.05"/>
        <vers num="11.00"/>
        <vers num="11.11"/>
        <vers num="11.23"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.3"/>
        <vers num="3.4"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="7.2"/>
        <vers num="7.3"/>
        <vers num="8.0"/>
      </prod>
      <prod name="openserver" vendor="sco">
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0113" seq="2004-0113" published="2004-03-29" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Memory leak in ssl_engine_io.c for mod_ssl in Apache 2 before 2.0.49 allows remote attackers to cause a denial of service (memory consumption) via plain HTTP requests to the SSL port of an SSL-enabled server.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000839">CLSA-2004:839</ref>
      <ref source="MISC" url="http://issues.apache.org/bugzilla/show_bug.cgi?id=27106">http://issues.apache.org/bugzilla/show_bug.cgi?id=27106</ref>
      <ref source="MLIST" url="http://marc.info/?l=apache-cvs&amp;m=107869699329638">[apache-cvs] 20040307 cvs commit: httpd-2.0/modules/ssl ssl_engine_io.c</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108034113406858&amp;w=2">20040325 LNSA-#2004-0006: bug workaround for Apache 2.0.48</ref>
      <ref source="APPLE" url="http://marc.info/?l=bugtraq&amp;m=108369640424244&amp;w=2">APPLE-SA-2004-05-03</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=108731648532365&amp;w=2">SSRT4717</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200403-04.xml">GLSA-200403-04</ref>
      <ref source="CONFIRM" url="http://www.apacheweek.com/features/security-20" adv="1">http://www.apacheweek.com/features/security-20</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:043">MDKSA-2004:043</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-084.html">RHSA-2004:084</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-182.html">RHSA-2004:182</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9826" adv="1" patch="1">9826</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0017">2004-0017</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15419">apache-modssl-plain-dos(15419)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A876">oval:org.mitre.oval:def:876</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.0.40"/>
        <vers num="2.0.41"/>
        <vers num="2.0.42"/>
        <vers num="2.0.43"/>
        <vers num="2.0.44"/>
        <vers num="2.0.45"/>
        <vers num="2.0.46"/>
        <vers num="2.0.47"/>
        <vers num="2.0.48"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0114" seq="2004-0114" published="2004-03-03" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The shmat system call in the System V Shared Memory interface for FreeBSD 5.2 and earlier, NetBSD 1.3 and earlier, and OpenBSD 2.6 and earlier, does not properly decrement a shared memory segment's reference count when the vm_map_find function fails, which could allow local users to gain read or write access to a portion of kernel memory and gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:02.shmat.asc" adv="1" patch="1">FreeBSD-SA-04:02</ref>
      <ref source="NETBSD" url="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-004.txt.asc">NetBSD-SA2004-004</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107608375207601&amp;w=2">20040205 [PINE-CERT-20040201] reference count overflow in shmat()</ref>
      <ref source="CONFIRM" url="http://www.openbsd.org/errata33.html#sysvshm">http://www.openbsd.org/errata33.html#sysvshm</ref>
      <ref source="MISC" url="http://www.pine.nl/press/pine-cert-20040201.txt">http://www.pine.nl/press/pine-cert-20040201.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9586" adv="1" patch="1">9586</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15061">bsd-shmat-gain-privileges(15061)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="5.2" prev="1"/>
      </prod>
      <prod name="netbsd" vendor="netbsd">
        <vers num="1.3" prev="1"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="2.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0115" seq="2004-0115" published="2004-03-03" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">VirtualPC_Services in Microsoft Virtual PC for Mac 6.0 through 6.1 allows local attackers to truncate and overwrite arbitrary files, and execute arbitrary code, via a symlink attack on the VPCServices_Log temporary file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="ATSTAKE" url="http://www.atstake.com/research/advisories/2004/a021004-1.txt" adv="1">A021004-1</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-076.shtml">O-076</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9632" adv="1" patch="1">9632</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-005">MS04-005</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15113">virtual-pc-gain-privileges(15113)</ref>
    </refs>
    <vuln_soft>
      <prod name="virtual_pc" vendor="microsoft">
        <vers num="6.0" edition=":mac"/>
        <vers num="6.1" edition=":mac"/>
        <vers num="6.2" edition=":mac"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0116" seq="2004-0116" published="2004-06-01" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">An Activation function in the RPCSS Service involved with DCOM activation for Microsoft Windows 2000, XP, and 2003 allows remote attackers to cause a denial of service (memory consumption) via an activation request with a large length field.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Apr/1009758.html">1009758</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-115.shtml">O-115</ref>
      <ref source="EEYE" url="http://www.eeye.com/html/Research/Advisories/AD20040413A.html" adv="1" patch="1">AD20040413A</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/417052" adv="1" patch="1">VU#417052</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10127">10127</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-104A.html" adv="1">TA04-104A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-012">MS04-012</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15708">win-rpcss-rpcmessage-dos(15708)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A955">oval:org.mitre.oval:def:955</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A957">oval:org.mitre.oval:def:957</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A958">oval:org.mitre.oval:def:958</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0117" seq="2004-0117" published="2004-06-01" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the H.323 protocol implementation in Windows 98, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-114.shtml">O-114</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/353956" adv="1" patch="1">VU#353956</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-104A.html" adv="1">TA04-104A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011">MS04-011</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15710">win-h323-bo(15710)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A907">oval:org.mitre.oval:def:907</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A946">oval:org.mitre.oval:def:946</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A964">oval:org.mitre.oval:def:964</ref>
    </refs>
    <vuln_soft>
      <prod name="netmeeting" vendor="microsoft">
        <vers num="3" prev="1"/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_98" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
      <prod name="windows_me" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0118" seq="2004-0118" published="2004-06-01" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020070.html">20040413 EEYE: Windows VDM TIB Local Privilege Escalation</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-114.shtml">O-114</ref>
      <ref source="EEYE" url="http://www.eeye.com/html/Research/Advisories/AD20040413E.html" adv="1" patch="1">AD20040413E</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/783748" adv="1" patch="1">VU#783748</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10117">10117</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-104A.html" adv="1">TA04-104A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011">MS04-011</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15714">win-vdm-gain-privileges(15714)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1512">oval:org.mitre.oval:def:1512</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1718">oval:org.mitre.oval:def:1718</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0119" seq="2004-0119" published="2004-06-01" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Negotiate Security Software Provider (SSP) interface in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service (crash from null dereference) or execute arbitrary code via a crafted SPNEGO NegTokenInit request during authentication protocol selection.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0081.html">20040414 NSFOCUS SA2004-01 : DoS Vulnerability in Microsoft Windows SPNEGO Protocol Decoding</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-114.shtml">O-114</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/638548" adv="1" patch="1">VU#638548</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10113">10113</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-104A.html" adv="1">TA04-104A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011">MS04-011</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15715">win-spp-bo(15715)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1808">oval:org.mitre.oval:def:1808</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1962">oval:org.mitre.oval:def:1962</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1997">oval:org.mitre.oval:def:1997</ref>
    </refs>
    <vuln_soft>
      <prod name="internet_information_server" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0120" seq="2004-0120" published="2004-06-01" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Microsoft Secure Sockets Layer (SSL) library, as used in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service via malformed SSL messages.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-114.shtml">O-114</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/150236" adv="1" patch="1">VU#150236</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10115">10115</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-104A.html" adv="1">TA04-104A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011">MS04-011</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15712">ssl-message-dos(15712)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A885">oval:org.mitre.oval:def:885</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A886">oval:org.mitre.oval:def:886</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A892">oval:org.mitre.oval:def:892</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0121" seq="2004-0121" published="2004-04-15" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Argument injection vulnerability in Microsoft Outlook 2002 does not sufficiently filter parameters of mailto: URLs when using them as arguments when calling OUTLOOK.EXE, which allows remote attackers to use script code in the Local Machine zone and execute arbitrary programs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107893704602842&amp;w=2">20040310 Outlook mailto: URL argument injection vulnerability</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-096.shtml">O-096</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=79&amp;type=vulnerabilities" adv="1" patch="1">20040309 Microsoft Outlook "mailto:" Parameter Passing Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/305206">VU#305206</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9827" adv="1" patch="1">9827</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-070A.html">TA04-070A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-009">MS04-009</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15414">outlook-mailtourl-execute-code(15414)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15429">outlook-ms04009-patch(15429)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A843">oval:org.mitre.oval:def:843</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="xp" edition="sp1"/>
        <vers num="xp" edition="sp2"/>
      </prod>
      <prod name="outlook" vendor="microsoft">
        <vers num="2002" edition="sp1"/>
        <vers num="2002" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0122" seq="2004-0122" published="2004-04-15" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Microsoft MSN Messenger 6.0 and 6.1 does not properly handle certain requests, which allows remote attackers to read arbitrary files.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/688094">VU#688094</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9828" adv="1" patch="1">9828</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-010">MS04-010</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15415">msn-request-view-files(15415)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15427">msn-ms04010-patch(15427)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A844">oval:org.mitre.oval:def:844</ref>
    </refs>
    <vuln_soft>
      <prod name="msn_messenger" vendor="microsoft">
        <vers num="6.0"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0123" seq="2004-0123" published="2004-06-01" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Double free vulnerability in the ASN.1 library as used in Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service and possibly execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-114.shtml">O-114</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/255924" adv="1" patch="1">VU#255924</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10118">10118</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-104A.html" adv="1">TA04-104A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011">MS04-011</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15713">win-asn1-double-free(15713)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1007">oval:org.mitre.oval:def:1007</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1076">oval:org.mitre.oval:def:1076</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A924">oval:org.mitre.oval:def:924</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_98" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
      <prod name="windows_98se" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_me" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0124" seq="2004-0124" published="2004-06-01" modified="2018-10-12" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability."</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-115.shtml">O-115</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/212892" adv="1" patch="1">VU#212892</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10121">10121</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-104A.html" adv="1">TA04-104A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-012">MS04-012</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15711">win-objectidentifier-open-port(15711)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1041">oval:org.mitre.oval:def:1041</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1062">oval:org.mitre.oval:def:1062</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1066">oval:org.mitre.oval:def:1066</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1072">oval:org.mitre.oval:def:1072</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition=":server"/>
        <vers num="4.0" edition=":terminal_server"/>
        <vers num="4.0" edition=":workstation"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0125" seq="2004-0125" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The jail system call in FreeBSD 4.x before 4.10-RELEASE does not verify that an attempt to manipulate routing tables originated from a non-jailed process, which could allow local users to modify the routing table.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:12.jailroute.asc">FreeBSD-SA-04:12</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10485" adv="1" patch="1">10485</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16342">freebsd-jailed-table-modify(16342)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="4.0" edition="alpha"/>
        <vers num="4.0" edition="releng"/>
        <vers num="4.1"/>
        <vers num="4.1.1" edition="release"/>
        <vers num="4.1.1" edition="stable"/>
        <vers num="4.2" edition="stable"/>
        <vers num="4.3" edition="release"/>
        <vers num="4.3" edition="release_p38"/>
        <vers num="4.3" edition="releng"/>
        <vers num="4.3" edition="stable"/>
        <vers num="4.4" edition="release_p42"/>
        <vers num="4.4" edition="releng"/>
        <vers num="4.4" edition="stable"/>
        <vers num="4.5" edition="release"/>
        <vers num="4.5" edition="release_p32"/>
        <vers num="4.5" edition="releng"/>
        <vers num="4.5" edition="stable"/>
        <vers num="4.6" edition="release"/>
        <vers num="4.6" edition="release_p20"/>
        <vers num="4.6" edition="releng"/>
        <vers num="4.6" edition="stable"/>
        <vers num="4.6.2"/>
        <vers num="4.7" edition="release"/>
        <vers num="4.7" edition="release_p17"/>
        <vers num="4.7" edition="releng"/>
        <vers num="4.7" edition="stable"/>
        <vers num="4.8" edition="pre-release"/>
        <vers num="4.8" edition="release_p6"/>
        <vers num="4.8" edition="releng"/>
        <vers num="4.9" edition="pre-release"/>
        <vers num="4.9" edition="releng"/>
        <vers num="4.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0126" seq="2004-0126" published="2004-03-29" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The jail_attach system call in FreeBSD 5.1 and 5.2 changes the directory of a calling process even if the process doesn't have permission to change directory, which allows local users to gain read/write privileges to files and directories within another jail.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.asc" adv="1" patch="1">FreeBSD-SA-04:03</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9762" adv="1" patch="1">9762</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15344">freebsd-jailattach-gain-privileges(15344)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="5.1" edition="release"/>
        <vers num="5.2"/>
        <vers num="5.2.1" edition="release"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0127" seq="2004-0127" published="2004-03-03" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in editconfig_gedcom.php for phpGedView 2.65.1 and earlier allows remote attackers to read arbitrary files or execute arbitrary PHP programs on the server via .. (dot dot) sequences in the gedcom_config parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/352355" adv="1" patch="1">20040129 PHP Code Injection Vulnerabilities in phpGedView 2.65.1 and prior</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9529" adv="1" patch="1">9529</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008892">1008892</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15129">phpgedview-editconfig-directory-traversal(15129)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgedview" vendor="phpgedview">
        <vers num="2.52.3"/>
        <vers num="2.60"/>
        <vers num="2.61"/>
        <vers num="2.61.1"/>
        <vers num="2.65"/>
        <vers num="2.65.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0128" seq="2004-0128" published="2004-03-03" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in the GEDCOM configuration script for phpGedView 2.65.1 and earlier allows remote attackers to execute arbitrary PHP code by modifying the PGV_BASE_DIRECTORY parameter to reference a URL on a remote web server that contains a malicious theme.php script.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=141517" adv="1">http://sourceforge.net/project/shownotes.php?release_id=141517</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/352355" adv="1" patch="1">20040129 PHP Code Injection Vulnerabilities in phpGedView 2.65.1 and prior</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9531" adv="1" patch="1">9531</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14987">phpgedview-gedfilconf-file-include(14987)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgedview" vendor="phpgedview">
        <vers num="2.52.3"/>
        <vers num="2.60"/>
        <vers num="2.61"/>
        <vers num="2.61.1"/>
        <vers num="2.65"/>
        <vers num="2.65.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0129" seq="2004-0129" published="2004-03-03" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in export.php in phpMyAdmin 2.5.5 and earlier allows remote attackers to read arbitrary files via .. (dot dot) sequences in the what parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107582619125932&amp;w=2">20040203 Arbitrary File Disclosure Vulnerability in phpMyAdmin 2.5.5-pl1 and prior</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200402-05.xml" adv="1">GLSA-200402-05</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=350228">http://sourceforge.net/forum/forum.php?forum_id=350228</ref>
      <ref source="CONFIRM" url="http://www.phpmyadmin.net/home_page/relnotes.php?rel=0">http://www.phpmyadmin.net/home_page/relnotes.php?rel=0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9564" adv="1" patch="1">9564</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15021">phpmyadmin-dotdot-directory-traversal(15021)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmyadmin" vendor="phpmyadmin">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2_pre1"/>
        <vers num="2.2_rc1"/>
        <vers num="2.2_rc2"/>
        <vers num="2.2_rc3"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.4.0"/>
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.5_pl1"/>
        <vers num="2.5.5_rc1"/>
        <vers num="2.5.5_rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0130" seq="2004-0130" published="2004-03-03" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">login.php in phpGedView 2.65 and earlier allows remote attackers to obtain sensitive information via an HTTP request to login.php that does not contain the required username or password parameters, which causes the information to be leaked in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Jan/1008844.html">1008844</ref>
      <ref source="MISC" url="http://www.netvigilance.com/advisory0001">http://www.netvigilance.com/advisory0001</ref>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/5NP0M1PBPQ.html" adv="1">http://www.securiteam.com/unixfocus/5NP0M1PBPQ.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15128">phpgedview-loginphp-path-disclosure(15128)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgedview" vendor="phpgedview">
        <vers num="2.65" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0131" seq="2004-0131" published="2004-03-03" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The rad_print_request function in logger.c for GNU Radius daemon (radiusd) before 1.2 allows remote attackers to cause a denial of service (crash) via a UDP packet with an Acct-Status-Type attribute without a value and no Acct-Session-Id attribute, which causes a null dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://ftp.gnu.org/gnu/radius/radius-1.2.tar.gz">http://ftp.gnu.org/gnu/radius/radius-1.2.tar.gz</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=71&amp;type=vulnerabilities&amp;flashstatus=true">20040204 GNU Radius Remote Denial of Service Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/277396" adv="1">VU#277396</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9578" adv="1" patch="1">9578</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15046">radius-radprintrequest-dos(15046)</ref>
    </refs>
    <vuln_soft>
      <prod name="radius" vendor="gnu">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0132" seq="2004-0132" published="2004-03-03" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in ezContents 2.0.2 and earlier allow remote attackers to execute arbitrary PHP code from a remote web server, as demonstrated using (1) the GLOBALS[rootdp] parameter to db.php, or (2) the GLOBALS[language_home] parameter to archivednews.php, and a malicious version of lang_admin.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107651585921958&amp;w=2">20040210 PHP Code Injection Vulnerabilities in ezContents 2.0.2 and prior</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15135">ezcontents-multiple-file-include(15135)</ref>
    </refs>
    <vuln_soft>
      <prod name="ezcontents" vendor="visualshapers">
        <vers num="1.40"/>
        <vers num="1.41"/>
        <vers num="1.42"/>
        <vers num="1.43"/>
        <vers num="1.44"/>
        <vers num="1.45"/>
        <vers num="1.45b"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0_rc1"/>
        <vers num="2.0_rc2"/>
        <vers num="2.0_rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0133" seq="2004-0133" published="2004-06-01" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The XFS file system code in Linux 2.4.x has an information leak in which in-memory data is written to the device for the XFS file system, which allows local users to obtain sensitive information by reading the raw device.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040405-01-U.asc" adv="1" patch="1">20040405-01-U</ref>
      <ref source="TRUSTIX" url="http://marc.info/?l=bugtraq&amp;m=108213675028441&amp;w=2">2004-0020</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-02.xml">GLSA-200407-02</ref>
      <ref source="ENGARDE" url="http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html" adv="1" patch="1">ESA-20040428-004</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:029">MDKSA-2004:029</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10151">10151</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15901">linux-xfs-info-disclosure(15901)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0134" seq="2004-0134" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">cpr (libcpr) in SGI IRIX before 6.5.25 allows local users to gain privileges by loading a user provided library while restarting the checkpointed process.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040507-01-P.asc">20040507-01-P</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10418" adv="1">10418</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16259">irix-cpr-gain-privileges(16259)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0135" seq="2004-0135" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The syssgi SGI_IOPROBE system call in IRIX 6.5.20 through 6.5.24 allows local users to gain privileges by reading and writing to kernel memory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040601-01-P.asc">20040601-01-P</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16413">irix-sgiioprobe-gain-privileges(16413)</ref>
    </refs>
    <vuln_soft>
      <prod name="irix" vendor="sgi">
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.3.1"/>
        <vers num="3.3.2"/>
        <vers num="3.3.3"/>
        <vers num="4.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.1t"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.4b"/>
        <vers num="4.0.4t"/>
        <vers num="4.0.5"/>
        <vers num="4.0.5_iop"/>
        <vers num="4.0.5_ipr"/>
        <vers num="4.0.5a"/>
        <vers num="4.0.5b"/>
        <vers num="4.0.5e"/>
        <vers num="4.0.5f"/>
        <vers num="4.0.5g"/>
        <vers num="4.0.5h"/>
        <vers num="5.0"/>
        <vers num="5.0.1"/>
        <vers num="5.1"/>
        <vers num="5.1.1"/>
        <vers num="5.2"/>
        <vers num="5.3" edition=":xfs"/>
        <vers num="6.0"/>
        <vers num="6.0.1" edition=":xfs"/>
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.3"/>
        <vers num="6.4"/>
        <vers num="6.5"/>
        <vers num="6.5.1"/>
        <vers num="6.5.2"/>
        <vers num="6.5.2f"/>
        <vers num="6.5.2m"/>
        <vers num="6.5.3"/>
        <vers num="6.5.3f"/>
        <vers num="6.5.3m"/>
        <vers num="6.5.4"/>
        <vers num="6.5.4f"/>
        <vers num="6.5.4m"/>
        <vers num="6.5.5"/>
        <vers num="6.5.5f"/>
        <vers num="6.5.5m"/>
        <vers num="6.5.6"/>
        <vers num="6.5.6f"/>
        <vers num="6.5.6m"/>
        <vers num="6.5.7"/>
        <vers num="6.5.7f"/>
        <vers num="6.5.7m"/>
        <vers num="6.5.8"/>
        <vers num="6.5.8f"/>
        <vers num="6.5.8m"/>
        <vers num="6.5.9"/>
        <vers num="6.5.9f"/>
        <vers num="6.5.9m"/>
        <vers num="6.5.10"/>
        <vers num="6.5.10f"/>
        <vers num="6.5.10m"/>
        <vers num="6.5.11"/>
        <vers num="6.5.11f"/>
        <vers num="6.5.11m"/>
        <vers num="6.5.12"/>
        <vers num="6.5.12f"/>
        <vers num="6.5.12m"/>
        <vers num="6.5.13"/>
        <vers num="6.5.13f"/>
        <vers num="6.5.13m"/>
        <vers num="6.5.14"/>
        <vers num="6.5.14f"/>
        <vers num="6.5.14m"/>
        <vers num="6.5.15"/>
        <vers num="6.5.15f"/>
        <vers num="6.5.15m"/>
        <vers num="6.5.16"/>
        <vers num="6.5.16f"/>
        <vers num="6.5.16m"/>
        <vers num="6.5.17"/>
        <vers num="6.5.17f"/>
        <vers num="6.5.17m"/>
        <vers num="6.5.18"/>
        <vers num="6.5.18f"/>
        <vers num="6.5.18m"/>
        <vers num="6.5.19"/>
        <vers num="6.5.19f"/>
        <vers num="6.5.19m"/>
        <vers num="6.5.20"/>
        <vers num="6.5.20f"/>
        <vers num="6.5.20m"/>
        <vers num="6.5.21"/>
        <vers num="6.5.21f"/>
        <vers num="6.5.21m"/>
        <vers num="6.5.22"/>
        <vers num="6.5.22m"/>
        <vers num="6.5.23"/>
        <vers num="6.5.24"/>
        <vers num="6.5_20"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0136" seq="2004-0136" published="2004-08-06" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The mapelf32exec function call in IRIX 6.5.20 through 6.5.24 allows local users to cause a denial of service (system crash) via a "corrupted binary."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040601-01-P.asc">20040601-01-P</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10547" adv="1">10547</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16416">irix-mapelf32exec-dos(16416)</ref>
    </refs>
    <vuln_soft>
      <prod name="irix" vendor="sgi">
        <vers num="6.5.20f"/>
        <vers num="6.5.20m"/>
        <vers num="6.5.21f"/>
        <vers num="6.5.21m"/>
        <vers num="6.5.22"/>
        <vers num="6.5.23"/>
        <vers num="6.5.24"/>
        <vers num="6.5.25"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0137" seq="2004-0137" published="2004-08-06" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in init for IRIX 6.5.20 through 6.5.24 allows local users to cause a denial of service (system panic) as a result of "page invalidation issues."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040601-01-P.asc">20040601-01-P</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10549" adv="1">10549</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16417">irix-page-dos(16417)</ref>
    </refs>
    <vuln_soft>
      <prod name="irix" vendor="sgi">
        <vers num="6.5.20f"/>
        <vers num="6.5.20m"/>
        <vers num="6.5.21f"/>
        <vers num="6.5.21m"/>
        <vers num="6.5.22"/>
        <vers num="6.5.23"/>
        <vers num="6.5.24"/>
        <vers num="6.5.25"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0138" seq="2004-0138" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The ELF loader in Linux kernel 2.4 before 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes">http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes</ref>
      <ref source="CONFIRM" url="http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.25">http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.25</ref>
      <ref source="CONFIRM" url="http://linux.bkbits.net:8080/linux-2.4/cset@4021346f79nBb-4X_usRikR3Iyb4Vg">http://linux.bkbits.net:8080/linux-2.4/cset@4021346f79nBb-4X_usRikR3Iyb4Vg</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067" adv="1" patch="1">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069" adv="1" patch="1">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070" adv="1" patch="1">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082" adv="1" patch="1">DSA-1082</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-504.html">RHSA-2004:504</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-549.html">RHSA-2004:549</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/18174">18174</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43124">linux-kernel-elfloader-dos(43124)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10123">oval:org.mitre.oval:def:10123</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18"/>
        <vers num="2.4.19"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23"/>
        <vers num="2.4.24"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0139" seq="2004-0139" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in the bsd.a kernel networking for SGI IRIX 6.5.22 through 6.5.25, and possibly earlier versions, in which "t_unbind changes t_bind's behavior," has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040905-01-P.asc">20040905-01-P</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11276" adv="1" patch="1">11276</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17547">irix-bsda-kernel(17547)</ref>
    </refs>
    <vuln_soft>
      <prod name="irix" vendor="sgi">
        <vers num="6.5.22"/>
        <vers num="6.5.23"/>
        <vers num="6.5.24"/>
        <vers num="6.5.25"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0140" seq="2004-0140" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0141" seq="2004-0141" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0142" seq="2004-0142" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0143" seq="2004-0143" published="2004-03-03" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple vulnerabilities in Nokia 6310(i) Mobile phones allow remote attackers to cause a denial of service (reset) via malformed Bluetooth OBject EXchange (OBEX) messages, probably triggering buffer overflows.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0034.html">20040209 ptl-2004-01: Multiple vulnerabilities in Nokia phones</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107634788029065&amp;w=2">20040209 ptl-2004-01: Multiple vulnerabilities in Nokia phones</ref>
      <ref source="MISC" url="http://www.pentest.co.uk/documents/ptl-2004-01.html" adv="1" patch="1">http://www.pentest.co.uk/documents/ptl-2004-01.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9603" adv="1" patch="1">9603</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15107">nokia-obex-dos(15107)</ref>
    </refs>
    <vuln_soft>
      <prod name="6310i" vendor="nokia">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0144" seq="2004-0144" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0145" seq="2004-0145" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0146" seq="2004-0146" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0147" seq="2004-0147" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0148" seq="2004-0148" published="2004-04-15" modified="2018-05-02" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=108999466902690&amp;w=2">SSRT4704</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102356-1">102356</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-457" adv="1" patch="1">DSA-457</ref>
      <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2006/1867">ADV-2006-1867</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-096.html" adv="1" patch="1">RHSA-2004:096</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9832" adv="1" patch="1">9832</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15423">wuftpd-restrictedgid-gain-access(15423)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1147">oval:org.mitre.oval:def:1147</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1636">oval:org.mitre.oval:def:1636</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1637">oval:org.mitre.oval:def:1637</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A648">oval:org.mitre.oval:def:648</ref>
    </refs>
    <vuln_soft>
      <prod name="propack" vendor="sgi">
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="wu-ftpd" vendor="washington_university">
        <vers num="2.4.1"/>
        <vers num="2.4.2_beta2" edition=":academ"/>
        <vers num="2.4.2_beta18" edition=":academ"/>
        <vers num="2.4.2_beta18_vr4"/>
        <vers num="2.4.2_beta18_vr5"/>
        <vers num="2.4.2_beta18_vr6"/>
        <vers num="2.4.2_beta18_vr7"/>
        <vers num="2.4.2_beta18_vr8"/>
        <vers num="2.4.2_beta18_vr9"/>
        <vers num="2.4.2_beta18_vr10"/>
        <vers num="2.4.2_beta18_vr11"/>
        <vers num="2.4.2_beta18_vr12"/>
        <vers num="2.4.2_beta18_vr13"/>
        <vers num="2.4.2_beta18_vr14"/>
        <vers num="2.4.2_beta18_vr15"/>
        <vers num="2.4.2_vr16"/>
        <vers num="2.4.2_vr17"/>
        <vers num="2.5.0"/>
        <vers num="2.6.0"/>
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0149" seq="2004-0149" published="2004-05-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in xboing before 2.4 allow local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-451" patch="1">DSA-451</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9764" adv="1">9764</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15347">xboing-bo(15347)</ref>
    </refs>
    <vuln_soft>
      <prod name="xboing" vendor="xboing">
        <vers num="2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0150" seq="2004-0150" published="2004-04-15" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the getaddrinfo function in Python 2.2 before 2.2.2, when IPv6 support is disabled, allows remote attackers to execute arbitrary code via an IPv6 address that is obtained using DNS.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-458" adv="1" patch="1">DSA-458</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-03.xml">GLSA-200409-03</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:019">MDKSA-2004:019</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9836" adv="1" patch="1">9836</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15409">python-getaddrinfo-bo(15409)</ref>
    </refs>
    <vuln_soft>
      <prod name="python" vendor="python_software_foundation">
        <vers num="2.2"/>
        <vers num="2.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0151" seq="2004-0151" published="2004-04-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in xitalk 1.1.11 and earlier allows local users to execute arbitrary commands.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://shellcode.org/Advisories/XITALK.txt">http://shellcode.org/Advisories/XITALK.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-462" adv="1" patch="1">DSA-462</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9851" adv="1" patch="1">9851</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15456">xitalk-gain-privileges(15456)</ref>
    </refs>
    <vuln_soft>
      <prod name="xitalk" vendor="xintercepttalk">
        <vers num="1.1.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0152" seq="2004-0152" published="2004-04-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in (1) the encode_mime function, (2) the encode_uuencode function, (3) or the decode_uuencode function for emil 2.1.0 and earlier allow remote attackers to execute arbitrary code via e-mail messages containing attachments with filenames.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108024939827236&amp;w=2">20040325 Re: [SECURITY] [DSA 468-1] New emil packages fix multiple vulnerabilities</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-468" adv="1" patch="1">DSA-468</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15601">emil-email-bo(15601)</ref>
    </refs>
    <vuln_soft>
      <prod name="emil" vendor="emil">
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.1.0_beta9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0153" seq="2004-0153" published="2004-04-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple format string vulnerabilities in emil 2.1.0 and earlier may allow remote attackers to execute arbitrary code by triggering certain error messages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108024939827236&amp;w=2">20040325 Re: [SECURITY] [DSA 468-1] New emil packages fix multiple vulnerabilities</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-468" adv="1" patch="1">DSA-468</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15602">emil-format-string(15602)</ref>
    </refs>
    <vuln_soft>
      <prod name="emil" vendor="emil">
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.1.0_beta9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0154" seq="2004-0154" published="2004-06-14" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">rpc.mountd in nfs-utils after 1.0.3 and before 1.0.6 allows attackers to cause a denial of service (crash) via an NFS mount of a directory from a client whose reverse DNS lookup name is different from the forward lookup name.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugzilla.redhat.com/bugzilla/long_list.cgi?buglist=114535" adv="1">http://bugzilla.redhat.com/bugzilla/long_list.cgi?buglist=114535</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-072.html" adv="1" patch="1">RHSA-2004:072</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9813" adv="1" patch="1">9813</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/misc/2004/TSL-2004-0009-nfs-utils.asc.txt" adv="1" patch="1">2004-0009</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15418">nfs-utils-dns-dos(15418)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A861">oval:org.mitre.oval:def:861</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9673">oval:org.mitre.oval:def:9673</ref>
    </refs>
    <vuln_soft>
      <prod name="nfs-utils" vendor="nfs">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0155" seq="2004-0155" published="2004-06-01" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The KAME IKE Daemon Racoon, when authenticating a peer during Phase 1, validates the X.509 certificate but does not verify the RSA signature authentication, which allows remote attackers to establish unauthorized IP connections or conduct man-in-the-middle attacks using a valid, trusted X.509 certificate.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.10/SCOSA-2005.10.txt">SCOSA-2005.10</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108136746911000&amp;w=2">20040407 CAN-2004-0155:  The KAME IKE Daemon Racoon does not verify RSA Signatures during Phase 1, allows man-in-the-middle attacks and unauthorized connections</ref>
      <ref source="APPLE" url="http://marc.info/?l=bugtraq&amp;m=108369640424244&amp;w=2">APPLE-SA-2004-05-03</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200406-17.xml">GLSA-200406-17</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/552398">VU#552398</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:069">MDKSA-2004:069</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:027">MDKSA-2004:027</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-165.html" adv="1" patch="1">RHSA-2004:165</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10072">10072</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9291">oval:org.mitre.oval:def:9291</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A945">oval:org.mitre.oval:def:945</ref>
    </refs>
    <vuln_soft>
      <prod name="racoon" vendor="kame">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0156" seq="2004-0156" published="2004-06-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Format string vulnerabilities in the (1) die or (2) log_event functions for ssmtp before 2.50.6 allow remote mail relays to cause a denial of service and possibly execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108403772130855&amp;w=2">20040507 [OpenPKG-SA-2004.020] OpenPKG Security Advisory (ssmtp)</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-18.xml" adv="1" patch="1">GLSA-200404-18</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009788">1009788</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-485" adv="1" patch="1">DSA-485</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10150">10150</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15872">ssmtp-die-logevent-format-string(15872)</ref>
    </refs>
    <vuln_soft>
      <prod name="ssmtp" vendor="ssmtp">
        <vers num="2.49" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0157" seq="2004-0157" published="2004-06-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">x11.c in xonix 1.4 and earlier uses the current working directory to find and execute the rmail program, which allows local users to execute arbitrary code by modifying the path to point to a malicious rmail program.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009789">1009789</ref>
      <ref source="MISC" url="http://shellcode.org/Advisories/XONIX.txt">http://shellcode.org/Advisories/XONIX.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-484" adv="1" patch="1">DSA-484</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10149">10149</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15873">xonix-privilege-dropping(15873)</ref>
    </refs>
    <vuln_soft>
      <prod name="xonix" vendor="xonix">
        <vers num="1.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0158" seq="2004-0158" published="2004-03-29" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in lbreakout2 allows local users to gain 'games' group privileges via a large HOME environment variable to (1) editor.c, (2) theme.c, (3) manager.c, (4) config.c, (5) game.c, (6) levels.c, or (7) main.c.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107755821705356&amp;w=2">20040222 lbreakout2 &lt; 2.4beta-2 local exploit</ref>
      <ref source="CONFIRM" url="http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1.diff.gz">http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1.diff.gz</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-445" adv="1" patch="1">DSA-445</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9712" adv="1" patch="1">9712</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15229">breakout2-home-bo(15229)</ref>
    </refs>
    <vuln_soft>
      <prod name="lbreakout2" vendor="lgames">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0159" seq="2004-0159" published="2004-03-15" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in hsftp 1.11 allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via file names containing format string characters that are not properly handled when executing an "ls" command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/017737.html">20040223 Re: [SECURITY] [DSA 447-1] New hsftp packages fix format string vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9715" adv="1" patch="1">9715</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15276">hsftp-format-string(15276)</ref>
      <ref source="DEBIAN" url="https://www.debian.org/security/2004/dsa-447">DSA-447</ref>
    </refs>
    <vuln_soft>
      <prod name="hsftp" vendor="samhain_labs">
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="1.9"/>
        <vers num="1.10"/>
        <vers num="1.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0160" seq="2004-0160" published="2004-03-29" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Synaesthesia 2.2 and earlier allows local users to execute arbitrary code via a symlink attack on the configuration file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-446" adv="1" patch="1">DSA-446</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9713" adv="1" patch="1">9713</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15279">synaesthesia-configuration-symlink-attack(15279)</ref>
    </refs>
    <vuln_soft>
      <prod name="synaesthesia" vendor="synaesthesia">
        <vers num="2.1.0"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0161" seq="2004-0161" published="2004-10-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use RFC2231 encoding, which may be interpreted differently by mail clients.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109524928232568&amp;w=2">20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2231 encoding issue</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" adv="1">http://www.uniras.gov.uk/vuls/2004/380375/mime.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/9274">mime-tools-parameter-encoding(9274)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailsweeper" vendor="clearswift">
        <vers num="4.3.7"/>
        <vers num="4.3.8"/>
        <vers num="4.3.10"/>
        <vers num="4.3.11"/>
        <vers num="4.3.13"/>
        <vers num="4.3.14"/>
        <vers num="4.3.15"/>
      </prod>
      <prod name="internet_gatekeeper" vendor="f-secure">
        <vers num="6.3"/>
        <vers num="6.4"/>
        <vers num="6.31"/>
        <vers num="6.32"/>
      </prod>
      <prod name="ripmime" vendor="paul_l_daniels">
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.3.2.0"/>
        <vers num="1.3.2.2"/>
        <vers num="1.3.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0162" seq="2004-0162" published="2004-10-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME encapsulation that uses RFC822 comment fields, which may be interpreted as other fields by mail clients.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109517563513776&amp;w=2">20040914 Corsaire Security Advisory - Multiple vendor MIME RFC822 comment issue</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" adv="1">http://www.uniras.gov.uk/vuls/2004/380375/mime.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17332">mime-rfc822-filtering-bypass(17332)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailsweeper" vendor="clearswift">
        <vers num="4.3.7"/>
        <vers num="4.3.8"/>
        <vers num="4.3.10"/>
        <vers num="4.3.11"/>
        <vers num="4.3.13"/>
        <vers num="4.3.14"/>
        <vers num="4.3.15"/>
      </prod>
      <prod name="internet_gatekeeper" vendor="f-secure">
        <vers num="6.3"/>
        <vers num="6.4"/>
        <vers num="6.31"/>
        <vers num="6.32"/>
      </prod>
      <prod name="ripmime" vendor="paul_l_daniels">
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.3.2.0"/>
        <vers num="1.3.2.2"/>
        <vers num="1.3.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0163" seq="2004-0163" published="2004-09-28" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Sygate Secure Enterprise (SSE) 3.5MR3 and earlier does not change the key used to encrypt data, which allows remote attackers to cause a denial of service (resource exhaustion) by capturing a session and repeatedly replaying the session.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109215685731675&amp;w=2">20040810 Corsaire Security Advisory - Sygate Secure Enterprise replay issue</ref>
      <ref source="MISC" url="http://www.corsaire.com/advisories/c031120-002.txt" adv="1" patch="1">http://www.corsaire.com/advisories/c031120-002.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16945">sse-replay-dos(16945)</ref>
    </refs>
    <vuln_soft>
      <prod name="secure_enterprise" vendor="sygate_technologies">
        <vers num="3.5mr3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0164" seq="2004-0164" published="2004-03-03" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="NETBSD" url="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-001.txt.asc">NetBSD-SA2004-001</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html">APPLE-SA-2004-02-23</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107403331309838&amp;w=2">20040113 unauthorized deletion of IPsec (and ISAKMP) SAs in racoon</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107411758202662&amp;w=2">20040114 Re: unauthorized deletion of IPsec (and ISAKMP) SAs in racoon</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9416">9416</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9417">9417</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14117">openbsd-isakmp-invalidspi-delete-sa(14117)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14118">openbsd-isakmp-initialcontact-delete-sa(14118)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A947">oval:org.mitre.oval:def:947</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9737">oval:org.mitre.oval:def:9737</ref>
    </refs>
    <vuln_soft>
      <prod name="racoon" vendor="kame">
        <vers num="all_versions"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0165" seq="2004-0165" published="2004-03-15" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html">APPLE-SA-2004-02-23</ref>
      <ref source="ATSTAKE" url="http://www.atstake.com/research/advisories/2004/a022304-1.txt" adv="1" patch="1">A022304-1</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/841742" adv="1">VU#841742</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9730" adv="1" patch="1">9730</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15297">macos-pppd-format-string(15297)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.1"/>
        <vers num="10.1.1"/>
        <vers num="10.1.2"/>
        <vers num="10.1.3"/>
        <vers num="10.1.4"/>
        <vers num="10.1.5"/>
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.1"/>
        <vers num="10.1.1"/>
        <vers num="10.1.2"/>
        <vers num="10.1.3"/>
        <vers num="10.1.4"/>
        <vers num="10.1.5"/>
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0166" seq="2004-0166" published="2004-03-15" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in Safari web browser for Mac OS X 10.2.8 related to "the display of URLs in the status bar."</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html">APPLE-SA-2004-02-23</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/194238" adv="1" patch="1">VU#194238</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14993">macosx-safari-unknown(14993)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0167" seq="2004-0167" published="2004-03-15" modified="2018-09-26" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">DiskArbitration in Mac OS X 10.2.8 and 10.3.2 does not properly initialize writeable removable media.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html" adv="1">APPLE-SA-2004-02-23</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/578886" adv="1">VU#578886</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9731" adv="1">9731</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15300" adv="1">macos-diskarbitration-unknown(15300)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0168" seq="2004-0168" published="2004-03-15" modified="2018-09-26" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in CoreFoundation for Mac OS X 10.3.2, related to "notification logging."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html" adv="1">APPLE-SA-2004-02-23</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15299" adv="1">macos-corefoundation-unknown(15299)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.2"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0169" seq="2004-0169" published="2004-03-15" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">QuickTime Streaming Server in MacOS X 10.2.8 and 10.3.2 allows remote attackers to cause a denial of service (crash) via DESCRIBE requests with long User-Agent fields, which causes an Assert error to be triggered in the BufferIsFull function.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html">APPLE-SA-2004-02-23</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=75&amp;type=vulnerabilities">20040223 Darwin Streaming Server Remote Denial of Service Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/460350" adv="1">VU#460350</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9735" adv="1" patch="1">9735</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15291">darwin-describe-request-dos(15291)</ref>
    </refs>
    <vuln_soft>
      <prod name="darwin_streaming_server" vendor="apple">
        <vers num="4.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0171" seq="2004-0171" published="2004-03-15" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">FreeBSD 5.1 and earlier, and Mac OS X before 10.3.4, allows remote attackers to cause a denial of service (resource exhaustion of memory buffers and system crash) via a large number of out-of-sequence TCP packets, which prevents the operating system from creating new connections.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:04.tcp.asc">FreeBSD-SA-04:04</ref>
      <ref source="APPLE" url="http://lists.seifried.org/pipermail/security/2004-May/003743.html">APPLE-SA-2004-05-28</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=78&amp;type=vulnerabilities" adv="1" patch="1">20040302 FreeBSD Memory Buffer Exhaustion Denial of Service Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/395670">VU#395670</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9792" adv="1" patch="1">9792</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15369">freebsd-mbuf-dos(15369)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="4.6.2"/>
        <vers num="4.7"/>
        <vers num="4.8"/>
        <vers num="4.9"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.3"/>
        <vers num="3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0172" seq="2004-0172" published="2004-03-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the search_for_command function of ltrace 0.3.10, if it is installed setuid, could allow local users to execute arbitrary code via a long filename.  NOTE: It is unclear whether there are any packages that install ltrace as a setuid program, so this candidate might be REJECTed.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011600.html">20031008 ltrace bug</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011610.html">20031008 ltrace bug</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1007896">1007896</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/8790" adv="1">8790</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/13389">ltrace-searchforcommand-bo(13389)</ref>
    </refs>
    <vuln_soft>
      <prod name="ltrace" vendor="juan_cespedes">
        <vers num="0.3.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0173" seq="2004-0173" published="2004-04-15" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Apache 1.3.29 and earlier, and Apache 2.0.48 and earlier, when running on Cygwin, allows remote attackers to read arbitrary files via a URL containing "..%5C" (dot dot encoded backslash) sequences.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://issues.apache.org/bugzilla/show_bug.cgi?id=26152">http://issues.apache.org/bugzilla/show_bug.cgi?id=26152</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/017740.html">20040224 STG Security Advisory: [SSA-20040217-06] Apache for cygwin directory traversal vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107765545431387&amp;w=2">20040224 STG Security Advisory: [SSA-20040217-06] Apache for cygwin</ref>
      <ref source="CONFIRM" url="http://www.apacheweek.com/issues/04-03-12">http://www.apacheweek.com/issues/04-03-12</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9733" adv="1" patch="1">9733</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15293">apache-cygwin-directory-traversal(15293)</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="0.8.11"/>
        <vers num="0.8.14"/>
        <vers num="1.0"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.5"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.5"/>
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0174" seq="2004-0174" published="2004-05-04" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Apache 1.4.x before 1.3.30, and 2.0.x before 2.0.49, when using multiple listening sockets on certain platforms, allows remote attackers to cause a denial of service (blocked new connections) via a "short-lived connection on a rarely-accessed listening socket."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107973894328806&amp;w=2">20040319 [ANNOUNCE] Apache HTTP Server 2.0.49 Released (fwd)</ref>
      <ref source="TRUSTIX" url="http://marc.info/?l=bugtraq&amp;m=108066914830552&amp;w=2">2004-0017</ref>
      <ref source="APPLE" url="http://marc.info/?l=bugtraq&amp;m=108369640424244&amp;w=2">APPLE-SA-2004-05-03</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108437852004207&amp;w=2">20040512 [OpenPKG-SA-2004.021] OpenPKG Security Advisory (apache)</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=108731648532365&amp;w=2">SSRT4717</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-22.xml">GLSA-200405-22</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1">101555</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1">57628</ref>
      <ref source="CONFIRM" url="http://www.apache.org/dist/httpd/CHANGES_1.3">http://www.apache.org/dist/httpd/CHANGES_1.3</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/132110">VU#132110</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:046">MDKSA-2004:046</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-405.html" adv="1" patch="1">RHSA-2004:405</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9921">9921</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Mar/1009495.html">1009495</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.529643">SSA:2004-133</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0027">2004-0027</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15540">apache-socket-starvation-dos(15540)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100110">oval:org.mitre.oval:def:100110</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1982">oval:org.mitre.oval:def:1982</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0.49" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0175" seq="2004-0175" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in scp for OpenSSH before 3.4p1 allows remote malicious servers to overwrite arbitrary files.  NOTE: this may be a rediscovery of CVE-2000-0992.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.11/SCOSA-2006.11.txt">SCOSA-2006.11</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000831">CLSA-2004:831</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-212.shtml">O-212</ref>
      <ref source="CONFIRM" url="http://www.juniper.net/support/security/alerts/adv59739.txt">http://www.juniper.net/support/security/alerts/adv59739.txt</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:100">MDKSA-2005:100</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:191">MDVSA-2008:191</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_09_kernel.html">SuSE-SA:2004:009</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-074.html">RHSA-2005:074</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-106.html">RHSA-2005:106</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-165.html">RHSA-2005:165</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-481.html">RHSA-2005:481</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-495.html">RHSA-2005:495</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-562.html">RHSA-2005:562</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-567.html">RHSA-2005:567</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9986" adv="1" patch="1">9986</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120147">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120147</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16323">openssh-scp-file-overwrite(16323)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10184">oval:org.mitre.oval:def:10184</ref>
    </refs>
    <vuln_soft>
      <prod name="openssh" vendor="openbsd">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.1p1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.2p1"/>
        <vers num="3.0p1"/>
        <vers num="3.1"/>
        <vers num="3.1p1"/>
        <vers num="3.2"/>
        <vers num="3.2.2p1"/>
        <vers num="3.2.3p1"/>
        <vers num="3.3"/>
        <vers num="3.3p1"/>
        <vers num="3.4"/>
        <vers num="3.4p1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0176" seq="2004-0176" published="2004-05-04" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000835">CLA-2004:835</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108007072215742&amp;w=2">20040323 Advisory 03/2004: Multiple (13) Ethereal remote overflows</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108058005324316&amp;w=2">20040329 LNSA-#2004-0007: Multiple security problems in Ethereal</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108213710306260&amp;w=2">20040416 [OpenPKG-SA-2004.015] OpenPKG Security Advisory (ethereal)</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/032004.html">http://security.e-matters.de/advisories/032004.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200403-07.xml">GLSA-200403-07</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-511" adv="1" patch="1">DSA-511</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00013.html">http://www.ethereal.com/appnotes/enpa-sa-00013.html</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/119876">VU#119876</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/125156">VU#125156</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/433596">VU#433596</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/591820">VU#591820</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/644886">VU#644886</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/659140">VU#659140</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/740188">VU#740188</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/864884">VU#864884</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/931588">VU#931588</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:024">MDKSA-2004:024</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-136.html">RHSA-2004:136</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-137.html">RHSA-2004:137</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15569">ethereal-multiple-dissectors-bo(15569)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10187">oval:org.mitre.oval:def:10187</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A878">oval:org.mitre.oval:def:878</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A887">oval:org.mitre.oval:def:887</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.8.13"/>
        <vers num="0.8.14"/>
        <vers num="0.8.18"/>
        <vers num="0.8.19"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.10"/>
        <vers num="0.9.11"/>
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0177" seq="2004-0177" published="2004-06-01" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000846">CLA-2004:846</ref>
      <ref source="MISC" url="http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ">http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ</ref>
      <ref source="TRUSTIX" url="http://marc.info/?l=bugtraq&amp;m=108213675028441&amp;w=2">2004-0020</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-166.html" adv="1" patch="1">RHSA-2004:166</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-02.xml">GLSA-200407-02</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-121.shtml">O-121</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-126.shtml">O-126</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-127.shtml">O-127</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-479">DSA-479</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-480">DSA-480</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-481">DSA-481</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-482">DSA-482</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-489">DSA-489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-491">DSA-491</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-495" adv="1" patch="1">DSA-495</ref>
      <ref source="ENGARDE" url="http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html" adv="1" patch="1">ESA-20040428-004</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:029">MDKSA-2004:029</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-504.html">RHSA-2004:504</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-505.html">RHSA-2004:505</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-293.html">RHSA-2005:293</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10152">10152</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15867">linux-ext3-info-disclosure(15867)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10556">oval:org.mitre.oval:def:10556</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0178" seq="2004-0178" published="2004-06-01" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The OSS code for the Sound Blaster (sb16) driver in Linux 2.4.x before 2.4.26, when operating in 16 bit mode, does not properly handle certain sample sizes, which allows local users to cause a denial of service (crash) via a sample with an odd number of bytes.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc">20040804-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000846">CLA-2004:846</ref>
      <ref source="MISC" url="http://linux.bkbits.net:8080/linux-2.4/cset@404ce5967rY2Ryu6Z_uNbYh643wuFA">http://linux.bkbits.net:8080/linux-2.4/cset@404ce5967rY2Ryu6Z_uNbYh643wuFA</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-02.xml">GLSA-200407-02</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-121.shtml">O-121</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-127.shtml">O-127</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-193.shtml">O-193</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-479">DSA-479</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-480">DSA-480</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-481">DSA-481</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-482" adv="1" patch="1">DSA-482</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-489" adv="1" patch="1">DSA-489</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-491" adv="1" patch="1">DSA-491</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-495" adv="1" patch="1">DSA-495</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:029">MDKSA-2004:029</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-413.html">RHSA-2004:413</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-437.html">RHSA-2004:437</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9985">9985</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15868">linux-sound-blaster-dos(15868)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9427">oval:org.mitre.oval:def:9427</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0179" seq="2004-0179" published="2004-06-01" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple format string vulnerabilities in (1) neon 0.24.4 and earlier, and other products that use neon including (2) Cadaver, (3) Subversion, and (4) OpenOffice, allow remote malicious WebDAV servers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc" adv="1" patch="1">20040404-01-U</ref>
      <ref source="SUSE" url="http://lists.suse.com/archive/suse-security-announce/2004-Apr/0002.html" adv="1" patch="1">SuSE-SA:2004:009</ref>
      <ref source="SUSE" url="http://lists.suse.com/archive/suse-security-announce/2004-Apr/0003.html" adv="1" patch="1">SuSE-SA:2004:008</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108213873203477&amp;w=2">20040416 [OpenPKG-SA-2004.016] OpenPKG Security Advisory (neon)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108214147022626&amp;w=2">20040416 void.at - neon format string bugs</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-01.xml" adv="1" patch="1">GLSA-200405-01</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-04.xml" adv="1" patch="1">GLSA-200405-04</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-487" adv="1" patch="1">DSA-487</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:032" adv="1">MDKSA-2004:032</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-157.html" adv="1" patch="1">RHSA-2004:157</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-158.html" patch="1">RHSA-2004:158</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-159.html" patch="1">RHSA-2004:159</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-160.html" patch="1">RHSA-2004:160</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10136">10136</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1552" patch="1">FEDORA-2004-1552</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1065">oval:org.mitre.oval:def:1065</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10913">oval:org.mitre.oval:def:10913</ref>
    </refs>
    <vuln_soft>
      <prod name="cadaver_webdav_client" vendor="cadaver">
        <vers num="0.20.0"/>
        <vers num="0.20.1"/>
        <vers num="0.20.2"/>
        <vers num="0.20.3"/>
        <vers num="0.20.4"/>
        <vers num="0.20.5"/>
        <vers num="0.21.0"/>
        <vers num="0.22.0"/>
        <vers num="0.22.1"/>
      </prod>
      <prod name="neon_client_library" vendor="neon">
        <vers num="0.19.3"/>
        <vers num="0.23"/>
        <vers num="0.23.1"/>
        <vers num="0.23.2"/>
        <vers num="0.23.3"/>
        <vers num="0.23.4"/>
        <vers num="0.23.5"/>
        <vers num="0.23.6"/>
        <vers num="0.23.7"/>
        <vers num="0.23.8"/>
        <vers num="0.24"/>
        <vers num="0.24.1"/>
        <vers num="0.24.2"/>
        <vers num="0.24.3"/>
        <vers num="0.24.4"/>
      </prod>
      <prod name="openoffice" vendor="openoffice">
        <vers num="1.1.2"/>
      </prod>
      <prod name="subversion" vendor="subversion">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0180" seq="2004-0180" published="2004-06-01" modified="2018-05-02" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The client for CVS before 1.11 allows a remote malicious CVS server to create arbitrary files using certain RCS diff files that use absolute pathnames during checkouts or updates, a different vulnerability than CVE-2004-0405.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:07.cvs.asc" adv="1" patch="1">FreeBSD-SA-04:07</ref>
      <ref source="CONFIRM" url="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/002_cvs.patch">ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/002_cvs.patch</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc">20040404-01-U</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=108636445031613&amp;w=2">FEDORA-2004-1620</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-13.xml">GLSA-200404-13</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-486" adv="1" patch="1">DSA-486</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:028">MDKSA-2004:028</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-153.html" adv="1" patch="1">RHSA-2004:153</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-154.html" adv="1" patch="1">RHSA-2004:154</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.400181">SSA:2004-108-02</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15864">cvs-rcs-create-files(15864)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1042">oval:org.mitre.oval:def:1042</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9462">oval:org.mitre.oval:def:9462</ref>
    </refs>
    <vuln_soft>
      <prod name="cvs" vendor="cvs">
        <vers num="1.10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0181" seq="2004-0181" published="2004-06-01" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The JFS file system code in Linux 2.4.x has an information leak in which in-memory data is written to the device for the JFS file system, which allows local users to obtain sensitive information by reading the raw device.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="TRUSTIX" url="http://marc.info/?l=bugtraq&amp;m=108213675028441&amp;w=2">2004-0020</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-02.xml">GLSA-200407-02</ref>
      <ref source="ENGARDE" url="http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html" adv="1" patch="1">ESA-20040428-004</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:029">MDKSA-2004:029</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-504.html">RHSA-2004:504</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-663.html">RHSA-2005:663</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10143">10143</ref>
      <ref source="TURBO" url="http://www.turbolinux.com/security/2004/TLSA-2004-14.txt">TLSA-2004-14</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2005/1878">ADV-2005-1878</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15902">linux-jfs-info-disclosure(15902)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10329">oval:org.mitre.oval:def:10329</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0182" seq="2004-0182" published="2004-06-01" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Mailman before 2.0.13 allows remote attackers to cause a denial of service (crash) via an email message with an empty subject field.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc" adv="1" patch="1">20040404-01-U</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-156.html" adv="1" patch="1">RHSA-2004:156</ref>
    </refs>
    <vuln_soft>
      <prod name="mailman" vendor="gnu">
        <vers num="2.0.12" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0183" seq="2004-0183" published="2004-05-04" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via ISAKMP packets containing a Delete payload with a large number of SPI's, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108067265931525&amp;w=2">20040330 R7-0017: TCPDUMP ISAKMP payload handling denial-of-service vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009593">1009593</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-478" adv="1" patch="1">DSA-478</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/240790">VU#240790</ref>
      <ref source="MISC" url="http://www.rapid7.com/advisories/R7-0017.html">http://www.rapid7.com/advisories/R7-0017.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-219.html">RHSA-2004:219</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10003">10003</ref>
      <ref source="CONFIRM" url="http://www.tcpdump.org/tcpdump-changes.txt">http://www.tcpdump.org/tcpdump-changes.txt</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0015">2004-0015</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1468">FEDORA-2004-1468</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15680">tcpdump-isakmp-delete-bo(15680)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A972">oval:org.mitre.oval:def:972</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9971">oval:org.mitre.oval:def:9971</ref>
    </refs>
    <vuln_soft>
      <prod name="tcpdump" vendor="lbl">
        <vers num="3.8.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0184" seq="2004-0184" published="2004-05-04" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer underflow in the isakmp_id_print for TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with an Identification payload with a length that becomes less than 8 during byte order conversion, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108067265931525&amp;w=2">20040330 R7-0017: TCPDUMP ISAKMP payload handling denial-of-service vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009593">1009593</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-478" adv="1" patch="1">DSA-478</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/492558">VU#492558</ref>
      <ref source="MISC" url="http://www.rapid7.com/advisories/R7-0017.html" adv="1">http://www.rapid7.com/advisories/R7-0017.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-219.html">RHSA-2004:219</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10004">10004</ref>
      <ref source="CONFIRM" url="http://www.tcpdump.org/tcpdump-changes.txt">http://www.tcpdump.org/tcpdump-changes.txt</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0015">2004-0015</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1468">FEDORA-2004-1468</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15679">tcpdump-isakmp-integer-underflow(15679)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9581">oval:org.mitre.oval:def:9581</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A976">oval:org.mitre.oval:def:976</ref>
    </refs>
    <vuln_soft>
      <prod name="tcpdump" vendor="lbl">
        <vers num="3.8.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0185" seq="2004-0185" published="2004-03-15" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the skey_challenge function in ftpd.c for wu-ftp daemon (wu-ftpd) 2.6.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a s/key (SKEY) request with a long name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.wu-ftpd.org/pub/wu-ftpd/patches/apply_to_2.6.2/skeychallenge.patch" patch="1">ftp://ftp.wu-ftpd.org/pub/wu-ftpd/patches/apply_to_2.6.2/skeychallenge.patch</ref>
      <ref source="MISC" url="http://unixpunx.org/txt/exploits_archive/packetstorm/0310-advisories/wuftpd-skey.txt">http://unixpunx.org/txt/exploits_archive/packetstorm/0310-advisories/wuftpd-skey.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-457" adv="1" patch="1">DSA-457</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-096.html" adv="1" patch="1">RHSA-2004:096</ref>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/6X00Q1P8KC.html" adv="1" patch="1">http://www.securiteam.com/unixfocus/6X00Q1P8KC.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/8893">8893</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/13518">wuftpd-skey-bo(13518)</ref>
    </refs>
    <vuln_soft>
      <prod name="wu-ftpd" vendor="washington_university">
        <vers num="2.6.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0186" seq="2004-0186" published="2004-03-15" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107636290906296&amp;w=2">20040209 Samba 3.x + kernel 2.6.x local root vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107657505718743&amp;w=2">20040211 Re: Samba 3.x + kernel 2.6.x local root vulnerability</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-463" adv="1" patch="1">DSA-463</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9619" adv="1" patch="1">9619</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15131">samba-smbmnt-gain-privileges(15131)</ref>
    </refs>
    <vuln_soft>
      <prod name="samba" vendor="samba">
        <vers num="2.0"/>
        <vers num="3.0.0"/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0187" seq="2004-0187" published="2004-03-15" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-0185.  Reason: This candidate is a reservation duplicate of CVE-2004-0185.  Notes: All CVE users should reference CVE-2004-0185 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0188" seq="2004-0188" published="2004-03-15" modified="2018-05-02" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Calife 2.8.5 and earlier may allow local users to execute arbitrary code via a long password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107789737832092&amp;w=2">20040227 Calife heap corrupt / potential local root exploit</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-461" adv="1" patch="1">DSA-461</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9756" adv="1" patch="1">9756</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9776">9776</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15335">calife-long-password-bo(15335)</ref>
    </refs>
    <vuln_soft>
      <prod name="calife" vendor="calife">
        <vers num="2.8.4_c"/>
        <vers num="2.8.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0189" seq="2004-0189" published="2004-03-15" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The "%xx" URL decoding function in Squid 2.5STABLE4 and earlier allows remote attackers to bypass url_regex ACLs via a URL with a NULL ("%00") character, which causes Squid to use only a portion of the requested URL when comparing it against the access control lists.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt">SCOSA-2005.16</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc">20040404-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000838">CLA-2004:838</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108084935904110&amp;w=2">20040401 [OpenPKG-SA-2004.008] OpenPKG Security  Advisory (squid)</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200403-11.xml">GLSA-200403-11</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-474">DSA-474</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:025">MDKSA-2004:025</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-133.html">RHSA-2004:133</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-134.html">RHSA-2004:134</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9778" adv="1" patch="1">9778</ref>
      <ref source="CONFIRM" url="http://www.squid-cache.org/Advisories/SQUID-2004_1.txt" adv="1" patch="1">http://www.squid-cache.org/Advisories/SQUID-2004_1.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15366">squid-urlregex-acl-bypass(15366)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A877">oval:org.mitre.oval:def:877</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A941">oval:org.mitre.oval:def:941</ref>
    </refs>
    <vuln_soft>
      <prod name="squid" vendor="squid">
        <vers num="2.0_patch2"/>
        <vers num="2.1_patch2"/>
        <vers num="2.3_stable5"/>
        <vers num="2.4"/>
        <vers num="2.4_stable7"/>
        <vers num="2.5_stable3"/>
        <vers num="2.5_stable4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0190" seq="2004-0190" published="2004-03-15" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Symantec FireWall/VPN Appliance model 200 records a cleartext password for the password administration page, which may be cached on the administrator's local system or in a proxy, which allows attackers to steal the password and gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/017414.html">20040216 Symantec FireWall/VPN Appliance model 200 leak of security</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107694794031839&amp;w=2">20040216 Symantec FireWall/VPN Appliance model 200 leak of security</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9784" adv="1" patch="1">9784</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15212">symantec-firewallvpn-password-plaintext(15212)</ref>
    </refs>
    <vuln_soft>
      <prod name="firewall_vpn_appliance_100" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="firewall_vpn_appliance_200" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="firewall_vpn_appliance_200r" vendor="symantec">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0191" seq="2004-0191" published="2004-03-15" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Mozilla before 1.4.2 executes Javascript events in the context of a new page while it is being loaded, allowing it to interact with the previous page (zombie document) and enable cross-domain and cross-site scripting (XSS) attacks, as demonstrated using onmousemove events.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=227417" adv="1">http://bugzilla.mozilla.org/show_bug.cgi?id=227417</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107774710729469&amp;w=2">20040225 Sandblad #13: Cross-domain exploit on zombie document with event handlers</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=108448379429944&amp;w=2">SSRT4722</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-110.html">RHSA-2004:110</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-112.html">RHSA-2004:112</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9747" adv="1">9747</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15322">mozilla-event-handler-xss(15322)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A874">oval:org.mitre.oval:def:874</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A937">oval:org.mitre.oval:def:937</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9.2"/>
        <vers num="0.9.2.1"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.4.1"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.35"/>
        <vers num="0.9.48"/>
        <vers num="1.0" edition="rc1"/>
        <vers num="1.0" edition="rc2"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.2" edition="alpha"/>
        <vers num="1.2" edition="beta"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4" edition="beta"/>
        <vers num="1.4.1"/>
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0192" seq="2004-0192" published="2004-03-15" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Management Service for Symantec Gateway Security 2.0 allows remote attackers to steal cookies and hijack a management session via a /sgmi URL that contains malicious script, which is not quoted in the resulting error page.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107790684732458&amp;w=2">20040227 Symantec Gateway Security Management Service Cross Site Scripting</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9755" adv="1" patch="1">9755</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15330">symantecgateway-error-xss(15330)</ref>
    </refs>
    <vuln_soft>
      <prod name="gateway_security_5400" vendor="symantec">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0193" seq="2004-0193" published="2004-03-15" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107789851117176&amp;w=2">20040227 EEYE: RealSecure/BlackICE Server Message Block (SMB) Processing Overflow</ref>
      <ref source="EEYE" url="http://www.eeye.com/html/Research/Advisories/AD20040226.html">AD20040226</ref>
      <ref source="MISC" url="http://www.eeye.com/html/Research/Upcoming/20040213.html" adv="1">http://www.eeye.com/html/Research/Upcoming/20040213.html</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/150326" adv="1" patch="1">VU#150326</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9752">9752</ref>
      <ref source="ISS" url="http://xforce.iss.net/xforce/alerts/id/165" adv="1" patch="1">20040226 Vulnerability in SMB Parsing in ISS Products</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15207">pam-smb-protocol-bo(15207)</ref>
    </refs>
    <vuln_soft>
      <prod name="blackice_agent_server" vendor="iss">
        <vers num="3.6eca"/>
      </prod>
      <prod name="blackice_pc_protection" vendor="iss">
        <vers num="3.6cbd"/>
      </prod>
      <prod name="blackice_server_protection" vendor="iss">
        <vers num="3.6cbz"/>
      </prod>
      <prod name="realsecure_desktop" vendor="iss">
        <vers num="3.6eca"/>
        <vers num="3.6ecf"/>
        <vers num="7.0ebg"/>
        <vers num="7.0epk"/>
      </prod>
      <prod name="realsecure_guard" vendor="iss">
        <vers num="3.6ecb"/>
      </prod>
      <prod name="realsecure_network" vendor="iss">
        <vers num="7.0" edition="xpu_20.15"/>
      </prod>
      <prod name="realsecure_sentry" vendor="iss">
        <vers num="3.6ecf"/>
      </prod>
      <prod name="realsecure_server_sensor" vendor="iss">
        <vers num="7.0" edition="xpu20.16"/>
      </prod>
      <prod name="proventia_a_series_xpu" vendor="iss">
        <vers num="20.15"/>
      </prod>
      <prod name="proventia_g_series_xpu" vendor="iss">
        <vers num="22.3"/>
      </prod>
      <prod name="proventia_m_series_xpu" vendor="iss">
        <vers num="1.30"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0194" seq="2004-0194" published="2004-03-29" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the OutputDebugString function for Adobe Acrobat Reader 5.1 allows remote attackers to execute arbitrary code via a PDF document with XML Forms Data Format (XFDF) data.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018227.html">20040303 Adobe Acrobat Reader XML Forms Data Format Buffer Overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107842545022724&amp;w=2">20040303 Abobe Reader 5.1 XFDF Buffer Overflow Vulnerability</ref>
      <ref source="MISC" url="http://www.nextgenss.com/advisories/adobexfdf.txt" adv="1" patch="1">http://www.nextgenss.com/advisories/adobexfdf.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9802" adv="1" patch="1">9802</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15384">acrobatreader-xfdf-bo(15384)</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0197" seq="2004-0197" published="2004-06-01" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Microsoft Jet Database Engine 4.0 allows remote attackers to execute arbitrary code via a specially-crafted database query.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/740716">VU#740716</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10112">10112</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-104A.html">TA04-104A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-014">MS04-014</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15703">msjet-query-execute-code(15703)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A968">oval:org.mitre.oval:def:968</ref>
    </refs>
    <vuln_soft>
      <prod name="jet" vendor="microsoft">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0199" seq="2004-0199" published="2004-06-14" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Help and Support Center in Microsoft Windows XP and Windows Server 2003 SP1 does not properly validate HCP URLs, which allows remote attackers to execute arbitrary code, as demonstrated using certain hcp:// URLs that access the DVD Upgrade capability (dvdupgrd.htm).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108437759930820&amp;w=2">20040512 MS04-015 - Windows Help Center - Dvdupgrade</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108430407801825&amp;w=2">20040512 MS04-015 - Windows Help Center - Dvdupgrade</ref>
      <ref source="MISC" url="http://www.exploitlabs.com/files/advisories/EXPL-A-2004-001-helpctr.txt">http://www.exploitlabs.com/files/advisories/EXPL-A-2004-001-helpctr.txt</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/484814" adv="1" patch="1">VU#484814</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10321" adv="1" patch="1">10321</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-015">MS04-015</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16095">win-hcp-code-execution(16095)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1008">oval:org.mitre.oval:def:1008</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1032">oval:org.mitre.oval:def:1032</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise_64-bit"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="web"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":home"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:home"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0200" seq="2004-0200" published="2004-09-28" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109524346729948&amp;w=2">20040914 Microsoft GDIPlus.DLL JPEG Parsing Engine Buffer Overflow</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/297462">VU#297462</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-260A.html">TA04-260A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-028">MS04-028</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16304">win-jpeg-bo(16304)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1105">oval:org.mitre.oval:def:1105</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1721">oval:org.mitre.oval:def:1721</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2706">oval:org.mitre.oval:def:2706</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3038">oval:org.mitre.oval:def:3038</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3082">oval:org.mitre.oval:def:3082</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3320">oval:org.mitre.oval:def:3320</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3810">oval:org.mitre.oval:def:3810</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3881">oval:org.mitre.oval:def:3881</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4003">oval:org.mitre.oval:def:4003</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4216">oval:org.mitre.oval:def:4216</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4307">oval:org.mitre.oval:def:4307</ref>
    </refs>
    <vuln_soft>
      <prod name=".net_framework" vendor="microsoft">
        <vers num="1.0" edition="sp2:sdk"/>
      </prod>
      <prod name="digital_image_pro" vendor="microsoft">
        <vers num="7.0"/>
        <vers num="9"/>
      </prod>
      <prod name="digital_image_suite" vendor="microsoft">
        <vers num="9"/>
      </prod>
      <prod name="excel" vendor="microsoft">
        <vers num="2002"/>
        <vers num="2003"/>
      </prod>
      <prod name="frontpage" vendor="microsoft">
        <vers num="2002"/>
        <vers num="2003"/>
      </prod>
      <prod name="greetings" vendor="microsoft">
        <vers num="2002"/>
      </prod>
      <prod name="infopath" vendor="microsoft">
        <vers num="2003"/>
      </prod>
      <prod name="office" vendor="microsoft">
        <vers num="2003"/>
        <vers num="xp" edition="sp3"/>
      </prod>
      <prod name="onenote" vendor="microsoft">
        <vers num="2003"/>
      </prod>
      <prod name="outlook" vendor="microsoft">
        <vers num="2002"/>
        <vers num="2003"/>
      </prod>
      <prod name="picture_it" vendor="microsoft">
        <vers num="7.0"/>
        <vers num="9"/>
        <vers num="2002"/>
      </prod>
      <prod name="powerpoint" vendor="microsoft">
        <vers num="2002"/>
        <vers num="2003"/>
      </prod>
      <prod name="producer" vendor="microsoft">
        <vers num="" edition="gold:office_powerpoints"/>
      </prod>
      <prod name="project" vendor="microsoft">
        <vers num="2002" edition="sp1"/>
        <vers num="2003"/>
      </prod>
      <prod name="publisher" vendor="microsoft">
        <vers num="2002"/>
        <vers num="2003"/>
      </prod>
      <prod name="visio" vendor="microsoft">
        <vers num="2002" edition="sp2"/>
        <vers num="2003"/>
      </prod>
      <prod name="visual_basic" vendor="microsoft">
        <vers num="2002" edition=":.net_standard"/>
        <vers num="2003" edition=":.net_standard"/>
      </prod>
      <prod name="visual_c#" vendor="microsoft">
        <vers num="2002" edition=":.net_standard"/>
        <vers num="2003" edition=":.net_standard"/>
      </prod>
      <prod name="visual_c++" vendor="microsoft">
        <vers num="2002" edition=":.net_standard"/>
        <vers num="2003" edition=":.net_standard"/>
      </prod>
      <prod name="visual_j#_.net" vendor="microsoft">
        <vers num="2003" edition=":.net_standard"/>
      </prod>
      <prod name="visual_studio_.net" vendor="microsoft">
        <vers num="2002" edition="gold"/>
        <vers num="2003" edition="gold"/>
      </prod>
      <prod name="word" vendor="microsoft">
        <vers num="2002"/>
        <vers num="2003"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition="gold"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:tablet_pc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0201" seq="2004-0201" published="2004-08-06" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the HtmlHelp program (hh.exe) in HTML Help for Microsoft Windows 98, Me, NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary commands via a .CHM file with a large length field, a different vulnerability than CVE-2003-1041.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023919.html">20040714 HtmlHelp - .CHM File Heap Overflow</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/920060" adv="1" patch="1">VU#920060</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-196A.html" adv="1" patch="1">TA04-196A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-023">MS04-023</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16586">win-htmlhelp-execute-code(16586)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1503">oval:org.mitre.oval:def:1503</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1530">oval:org.mitre.oval:def:1530</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2155">oval:org.mitre.oval:def:2155</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3179">oval:org.mitre.oval:def:3179</ref>
    </refs>
    <vuln_soft>
      <prod name="ip600_media_servers" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="definity_one_media_server" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="s8100" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="s3400"/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise_64-bit"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="web"/>
      </prod>
      <prod name="windows_98" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
      <prod name="windows_98se" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_me" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition=":enterprise_server"/>
        <vers num="4.0" edition=":server"/>
        <vers num="4.0" edition=":terminal_server"/>
        <vers num="4.0" edition=":workstation"/>
        <vers num="4.0" edition="sp1:enterprise_server"/>
        <vers num="4.0" edition="sp1:server"/>
        <vers num="4.0" edition="sp1:terminal_server"/>
        <vers num="4.0" edition="sp1:workstation"/>
        <vers num="4.0" edition="sp2:enterprise_server"/>
        <vers num="4.0" edition="sp2:server"/>
        <vers num="4.0" edition="sp2:terminal_server"/>
        <vers num="4.0" edition="sp2:workstation"/>
        <vers num="4.0" edition="sp3:enterprise_server"/>
        <vers num="4.0" edition="sp3:server"/>
        <vers num="4.0" edition="sp3:terminal_server"/>
        <vers num="4.0" edition="sp3:workstation"/>
        <vers num="4.0" edition="sp4:enterprise_server"/>
        <vers num="4.0" edition="sp4:server"/>
        <vers num="4.0" edition="sp4:terminal_server"/>
        <vers num="4.0" edition="sp4:workstation"/>
        <vers num="4.0" edition="sp5:enterprise_server"/>
        <vers num="4.0" edition="sp5:server"/>
        <vers num="4.0" edition="sp5:terminal_server"/>
        <vers num="4.0" edition="sp5:workstation"/>
        <vers num="4.0" edition="sp6:enterprise_server"/>
        <vers num="4.0" edition="sp6:server"/>
        <vers num="4.0" edition="sp6:terminal_server"/>
        <vers num="4.0" edition="sp6:workstation"/>
        <vers num="4.0" edition="sp6a:enterprise_server"/>
        <vers num="4.0" edition="sp6a:server"/>
        <vers num="4.0" edition="sp6a:workstation"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":home"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:home"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0202" seq="2004-0202" published="2004-08-06" modified="2019-04-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">IDirectPlay4 Application Programming Interface (API) of Microsoft DirectPlay 7.0a thru 9.0b, as used in Windows Server 2003 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10487" adv="1" patch="1">10487</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-016">MS04-016</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16306">ms-directx-directplay-dos(16306)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1027">oval:org.mitre.oval:def:1027</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2190">oval:org.mitre.oval:def:2190</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2413">oval:org.mitre.oval:def:2413</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2516">oval:org.mitre.oval:def:2516</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2705">oval:org.mitre.oval:def:2705</ref>
    </refs>
    <vuln_soft>
      <prod name="directx" vendor="microsoft">
        <vers num="7.0"/>
        <vers num="7.0a"/>
        <vers num="7.1"/>
        <vers num="8.0"/>
        <vers num="8.0a"/>
        <vers num="8.1"/>
        <vers num="8.1a"/>
        <vers num="8.1b"/>
        <vers num="8.2"/>
        <vers num="9.0a"/>
        <vers num="9.0b"/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise_64-bit"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="web"/>
      </prod>
      <prod name="windows_98" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
      <prod name="windows_98se" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_me" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":home"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:home"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0203" seq="2004-0203" published="2004-11-23" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Outlook Web Access for Exchange Server 5.5 Service Pack 4 allows remote attackers to insert arbitrary script and spoof content in HTML email or web caches via an HTML redirect query.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/948750">VU#948750</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-026">MS04-026</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16583">exchange-owa-execute-code(16583)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2016">oval:org.mitre.oval:def:2016</ref>
    </refs>
    <vuln_soft>
      <prod name="exchange_server" vendor="microsoft">
        <vers num="5.5" edition="sp1"/>
        <vers num="5.5" edition="sp2"/>
        <vers num="5.5" edition="sp3"/>
        <vers num="5.5" edition="sp4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0204" seq="2004-0204" published="2004-08-06" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360413811017&amp;w=2">20040502 Crystal Reports Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108671836127360&amp;w=2">20040608 Vulnerability: Arbitrary File Access &amp; DoS in Crystal Reports</ref>
      <ref source="CONFIRM" url="http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp">http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10260" adv="1" patch="1">10260</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017">MS04-017</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16044">crystalreports-file-deletion(16044)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1157">oval:org.mitre.oval:def:1157</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="8.1" edition=":express"/>
        <vers num="8.1" edition=":win32"/>
        <vers num="8.1" edition="sp1:express"/>
        <vers num="8.1" edition="sp1:win32"/>
        <vers num="8.1" edition="sp2:express"/>
        <vers num="8.1" edition="sp2:win32"/>
      </prod>
      <prod name="j_builder" vendor="borland_software">
        <vers num=""/>
      </prod>
      <prod name="crystal_enterprise" vendor="businessobjects">
        <vers num="9"/>
        <vers num="10"/>
      </prod>
      <prod name="crystal_enterprise_java_sdk" vendor="businessobjects">
        <vers num="8.5"/>
      </prod>
      <prod name="crystal_enterprise_ras" vendor="businessobjects">
        <vers num="8.5" edition=":unix"/>
      </prod>
      <prod name="crystal_reports" vendor="businessobjects">
        <vers num="9"/>
        <vers num="10"/>
      </prod>
      <prod name="business_solutions_crm" vendor="microsoft">
        <vers num="1.2"/>
      </prod>
      <prod name="outlook" vendor="microsoft">
        <vers num="2003" edition=":business_contact_manager"/>
      </prod>
      <prod name="visual_studio_.net" vendor="microsoft">
        <vers num="2003" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0205" seq="2004-0205" published="2004-08-06" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Microsoft Internet Information Server (IIS) 4.0 allows local users to execute arbitrary code via the redirect function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-179.shtml">O-179</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/717748" adv="1" patch="1">VU#717748</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10706">10706</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-196A.html" adv="1" patch="1">TA04-196A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-021">MS04-021</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16578">iis-redirect-bo(16578)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2204">oval:org.mitre.oval:def:2204</ref>
    </refs>
    <vuln_soft>
      <prod name="ip600_media_servers" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="internet_information_server" vendor="microsoft">
        <vers num="4.0"/>
      </prod>
      <prod name="definity_one_media_server" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="s8100" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="s3400"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0206" seq="2004-0206" published="2004-11-03" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109786703930674&amp;w=2">20041013 Microsoft Windows NetDDE Service Buffer Overflow</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/640488" adv="1" patch="1">VU#640488</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11372">11372</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-031">MS04-031</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16556">win-netdde-bo(16556)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17657">win-ms04031-patch(17657)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1852">oval:org.mitre.oval:def:1852</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2394">oval:org.mitre.oval:def:2394</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3120">oval:org.mitre.oval:def:3120</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3242">oval:org.mitre.oval:def:3242</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4592">oval:org.mitre.oval:def:4592</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5074">oval:org.mitre.oval:def:5074</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6788">oval:org.mitre.oval:def:6788</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_98" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0207" seq="2004-0207" published="2004-11-03" modified="2018-10-12" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">"Shatter" style vulnerability in the Window Management application programming interface (API) for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to gain privileges by using certain API functions to change properties of privileged programs using the SetWindowLong and SetWIndowLongPtr API functions.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109777417922695&amp;w=2">20041013 SetWindowLong Shatter Attacks</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/218526" adv="1" patch="1">VU#218526</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032">MS04-032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16579">win-mngmt-api-gain-privileges(16579)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17658">win-ms04032-patch(17658)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_98" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0208" seq="2004-0208" published="2004-11-03" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109772135404427&amp;w=2">20041013 EEYE: Windows VDM #UD Local Privilege Escalation</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/910998" adv="1" patch="1">VU#910998</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032">MS04-032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16580">win-vdm-gain-privilege(16580)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17658">win-ms04032-patch(17658)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1751">oval:org.mitre.oval:def:1751</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3161">oval:org.mitre.oval:def:3161</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3953">oval:org.mitre.oval:def:3953</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4316">oval:org.mitre.oval:def:4316</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4762">oval:org.mitre.oval:def:4762</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0209" seq="2004-0209" published="2004-11-03" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in the Graphics Rendering Engine processes of Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats that involve "an unchecked buffer."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109829067325779&amp;w=2">20041019 [EXPL] (MS04-032) Microsoft Windows XP Metafile (.emf) Heap Overflow</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/806278">VU#806278</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11375">11375</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032">MS04-032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16581">win-emf-bo(16581)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17658">win-ms04032-patch(17658)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1872">oval:org.mitre.oval:def:1872</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2114">oval:org.mitre.oval:def:2114</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2428">oval:org.mitre.oval:def:2428</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0210" seq="2004-0210" published="2004-08-06" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/647436" adv="1" patch="1">VU#647436</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-196A.html" adv="1" patch="1">TA04-196A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-020">MS04-020</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16590">win-posix-bo(16590)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2166">oval:org.mitre.oval:def:2166</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2847">oval:org.mitre.oval:def:2847</ref>
    </refs>
    <vuln_soft>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="s3400"/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition="sp6:alpha"/>
        <vers num="4.0" edition="sp6:terminal_server"/>
        <vers num="4.0" edition="sp6a:enterprise_server"/>
        <vers num="4.0" edition="sp6a:server"/>
        <vers num="4.0" edition="sp6a:workstation"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0211" seq="2004-0211" published="2004-11-03" modified="2018-10-12" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The kernel for Microsoft Windows Server 2003 does not reset certain values in CPU data structures, which allows local users to cause a denial of service (system crash) via a malicious program.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/119262" adv="1" patch="1">VU#119262</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032">MS04-032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16582">win2k3-kernel-cpu-dos(16582)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17658">win-ms04032-patch(17658)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4893">oval:org.mitre.oval:def:4893</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0212" seq="2004-0212" published="2004-08-06" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108981273009250&amp;w=2">20040714 Microsoft Windows Task Scheduler '.job' Stack Overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108981403025596&amp;w=2">20040714 Unchecked buffer in mstask.dll</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/228028">VU#228028</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/mstaskjob.txt">http://www.ngssoftware.com/advisories/mstaskjob.txt</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-196A.html" adv="1" patch="1">TA04-196A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-022">MS04-022</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16591">win-taskscheduler-bo(16591)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1344">oval:org.mitre.oval:def:1344</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1781">oval:org.mitre.oval:def:1781</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1964">oval:org.mitre.oval:def:1964</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3428">oval:org.mitre.oval:def:3428</ref>
    </refs>
    <vuln_soft>
      <prod name="ip600_media_servers" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp1"/>
      </prod>
      <prod name="definity_one_media_server" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="s8100" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="s3400"/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition="sp6a:enterprise_server"/>
        <vers num="4.0" edition="sp6a:server"/>
        <vers num="4.0" edition="sp6a:workstation"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":home"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:home"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0213" seq="2004-0213" published="2004-08-06" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Utility Manager in Windows 2000 launches winhlp32.exe while Utility Manager is running with raised privileges, which allows local users to gain system privileges via a "Shatter" style attack that sends a Windows message to cause Utility Manager to launch winhlp32 by directly accessing the context sensitive help and bypassing the GUI, then sending another message to winhlp32 in order to open a user-selected file, a different vulnerability than CVE-2003-0908.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108975382413405&amp;w=2">20040713 Microsoft Window Utility Manager Local Elevation of Privileges</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/868580">VU#868580</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-196A.html" adv="1" patch="1">TA04-196A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-019">MS04-019</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16592">win-utilitymanager-gain-privileges(16592)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2495">oval:org.mitre.oval:def:2495</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0214" seq="2004-0214" published="2004-11-03" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://seclists.org/lists/bugtraq/2004/Apr/0322.html" adv="1">20040425 Microsoft's Explorer and Internet Explorer long share name buffer overflow.</ref>
      <ref source="FULLDISC" url="http://seclists.org/lists/fulldisclosure/2004/Apr/0933.html" adv="1">20040425 Microsoft's Explorer and Internet Explorer long share name buffer overflow.</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011647">1011647</ref>
      <ref source="MSKB" url="http://support.microsoft.com/default.aspx?scid=kb;en-us;322857">322857</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/616200">VU#616200</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5JP0M1PCKI.html">http://www.securiteam.com/windowsntfocus/5JP0M1PCKI.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10213">10213</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-037">MS04-037</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15956">win-long-fileshare-bo(15956)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17662">win-ms04037-patch(17662)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1601">oval:org.mitre.oval:def:1601</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1749">oval:org.mitre.oval:def:1749</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2638">oval:org.mitre.oval:def:2638</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4345">oval:org.mitre.oval:def:4345</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5307">oval:org.mitre.oval:def:5307</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0.2900"/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_98" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
      <prod name="windows_me" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp1:tablet_pc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0215" seq="2004-0215" published="2004-08-06" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Microsoft Outlook Express 5.5 and 6 allows attackers to cause a denial of service (application crash) via a malformed e-mail header.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/869640" adv="1" patch="1">VU#869640</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-196A.html" adv="1" patch="1">TA04-196A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-018">MS04-018</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16585">outlook-malformed-email-header-dos(16585)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1950">oval:org.mitre.oval:def:1950</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2137">oval:org.mitre.oval:def:2137</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2657">oval:org.mitre.oval:def:2657</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3376">oval:org.mitre.oval:def:3376</ref>
    </refs>
    <vuln_soft>
      <prod name="ip600_media_servers" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="outlook_express" vendor="microsoft">
        <vers num="6.0"/>
      </prod>
      <prod name="definity_one_media_server" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="s8100" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="s3400"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0216" seq="2004-0216" published="2004-11-03" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the Install Engine (inseng.dll) for Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious website or HTML email with a long .CAB file name, which triggers the integer overflow when calculating a buffer length and leads to a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109760693512754&amp;w=2">20041012 Microsoft Internet Explorer Install Engine Control Buffer Overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110616383332055&amp;w=2">20050119 Microsoft Internet Explorer Install Engine Control Buffer Overflow (#NISR19012005a)</ref>
      <ref source="NTBUGTRAQ" url="http://marc.info/?l=ntbugtraq&amp;m=110619893620517&amp;w=2">20050119 Microsoft Internet Explorer Install Engine Control Buffer Overflow (#NISR19012005a)</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/637760" adv="1" patch="1">VU#637760</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/msinsengfull.txt">http://www.ngssoftware.com/advisories/msinsengfull.txt</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-293A.html" adv="1" patch="1">TA04-293A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038">MS04-038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17620">ie-installenginectl-setciffile-bo(17620)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17651">ie-ms04038-patch(17651)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5316">oval:org.mitre.oval:def:5316</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5329">oval:org.mitre.oval:def:5329</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6100">oval:org.mitre.oval:def:6100</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6600">oval:org.mitre.oval:def:6600</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7717">oval:org.mitre.oval:def:7717</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7865">oval:org.mitre.oval:def:7865</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.01"/>
        <vers num="5.5"/>
        <vers num="6" edition="windows_server_2003_sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0217" seq="2004-0217" published="2004-04-15" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="3.7" CVSS_base_score="3.7" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The LiveUpdate capability (liveupdate.sh) in Symantec AntiVirus Scan Engine 4.0 and 4.3 for Red Hat Linux allows local users to create or append to arbitrary files via a symlink attack on /tmp/LiveUpdate.log.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107694800908164&amp;w=2">20040216 Possible race condition in Symantec AntiVirus Scan Engine for Red</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9662" adv="1" patch="1">9662</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15215">symantec-scanengine-race-condition(15215)</ref>
    </refs>
    <vuln_soft>
      <prod name="antivirus_scan_engine" vendor="symantec">
        <vers num="4.0" edition=":red_hat_linux"/>
        <vers num="4.3" edition=":red_hat_linux"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0218" seq="2004-0218" published="2004-05-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">isakmpd in OpenBSD 3.4 and earlier allows remote attackers to cause a denial of service (infinite loop) via an ISAKMP packet with a zero-length payload, as demonstrated by the Striker ISAKMP Protocol Test Suite.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108008530028019&amp;w=2">20040323 R7-0018: OpenBSD isakmpd payload handling denial-of-service vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/349113">VU#349113</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata.html" patch="1">20040317 015: RELIABILITY FIX: March 17, 2004</ref>
      <ref source="MISC" url="http://www.rapid7.com/advisories/R7-0018.html">http://www.rapid7.com/advisories/R7-0018.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10028">10028</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Mar/1009468.html">1009468</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15518">openbsd-isakmp-zerolength-dos(15518)</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0219" seq="2004-0219" published="2004-05-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">isakmpd in OpenBSD 3.4 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with a malformed IPSEC SA payload, as demonstrated by the Striker ISAKMP Protocol Test Suite.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108008530028019&amp;w=2">20040323 R7-0018: OpenBSD isakmpd payload handling denial-of-service vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/785945">VU#785945</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata.html">20040317 015: RELIABILITY FIX: March 17, 2004</ref>
      <ref source="MISC" url="http://www.rapid7.com/advisories/R7-0018.html">http://www.rapid7.com/advisories/R7-0018.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9907">9907</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Mar/1009468.html">1009468</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15628">openbsd-isakmp-ipsec-dos(15628)</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0220" seq="2004-0220" published="2004-05-04" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">isakmpd in OpenBSD 3.4 and earlier allows remote attackers to cause a denial of service via an ISAKMP packet with a malformed Cert Request payload, which causes an integer underflow that is used in a malloc operation that is not properly handled, as demonstrated by the Striker ISAKMP Protocol Test Suite.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108008530028019&amp;w=2">20040323 R7-0018: OpenBSD isakmpd payload handling denial-of-service vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/223273">VU#223273</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata.html" patch="1">20040317 015: RELIABILITY FIX: March 17, 2004</ref>
      <ref source="MISC" url="http://www.rapid7.com/advisories/R7-0018.html">http://www.rapid7.com/advisories/R7-0018.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9907">9907</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Mar/1009468.html">1009468</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15629">openbsd-isakmp-integer-underflow(15629)</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0221" seq="2004-0221" published="2004-05-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">isakmpd in OpenBSD 3.4 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with a delete payload containing a large number of SPIs, which triggers an out-of-bounds read error, as demonstrated by the Striker ISAKMP Protocol Test Suite.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108008530028019&amp;w=2">20040323 R7-0018: OpenBSD isakmpd payload handling denial-of-service vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/524497">VU#524497</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata.html" adv="1">20040317 015: RELIABILITY FIX: March 17, 2004</ref>
      <ref source="MISC" url="http://www.rapid7.com/advisories/R7-0018.html">http://www.rapid7.com/advisories/R7-0018.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9907">9907</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Mar/1009468.html">1009468</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15630">openbsd-isakmp-delete-dos(15630)</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0222" seq="2004-0222" published="2004-05-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple memory leaks in isakmpd in OpenBSD 3.4 and earlier allow remote attackers to cause a denial of service (memory exhaustion) via certain ISAKMP packets, as demonstrated by the Striker ISAKMP Protocol Test Suite.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108008530028019&amp;w=2">20040323 R7-0018: OpenBSD isakmpd payload handling denial-of-service vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/996177">VU#996177</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata.html" patch="1">20040317 015: RELIABILITY FIX: March 17, 2004</ref>
      <ref source="MISC" url="http://www.rapid7.com/advisories/R7-0018.html">http://www.rapid7.com/advisories/R7-0018.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10032">10028</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Mar/1009468.html">1009468</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15519">openbsd-isakmp-memory-leak(15519)</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0224" seq="2004-0224" published="2004-04-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in (1) iso2022jp.c or (2) shiftjis.c for Courier-IMAP before 3.0.0, Courier before 0.45, and SqWebMail before 4.0.0 may allow remote attackers to execute arbitrary code "when Unicode character is out of BMP range."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=5767" adv="1">http://sourceforge.net/project/shownotes.php?release_id=5767</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9845" adv="1" patch="1">9845</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15434">courier-codeset-converter-bo(15434)</ref>
    </refs>
    <vuln_soft>
      <prod name="courier_mta" vendor="double_precision_incorporated">
        <vers num="0.43"/>
        <vers num="0.43.1"/>
        <vers num="0.43.2"/>
        <vers num="0.44"/>
        <vers num="0.44.2"/>
      </prod>
      <prod name="sqwebmail" vendor="double_precision_incorporated">
        <vers num="3.5.2"/>
        <vers num="3.5.3"/>
        <vers num="3.6.1"/>
        <vers num="3.6.2"/>
        <vers num="3.6_.0"/>
      </prod>
      <prod name="courier-imap" vendor="inter7">
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="2.0.0"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4" edition="rc1"/>
        <vers num="1.4" edition="rc2"/>
        <vers num="1.4" edition="rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0226" seq="2004-0226" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-21.xml">GLSA-200405-21</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-497">DSA-497</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:039">MDKSA-2004:039</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_12_mc.html">SuSE-SA:2004:012</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-172.html" adv="1" patch="1">RHSA-2004:172</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16016">midnight-commander-local-privileges(16016)</ref>
    </refs>
    <vuln_soft>
      <prod name="midnight_commander" vendor="midnight_commander">
        <vers num="4.5.40"/>
        <vers num="4.5.41"/>
        <vers num="4.5.42"/>
        <vers num="4.5.43"/>
        <vers num="4.5.44"/>
        <vers num="4.5.45"/>
        <vers num="4.5.46"/>
        <vers num="4.5.47"/>
        <vers num="4.5.48"/>
        <vers num="4.5.49"/>
        <vers num="4.5.50"/>
        <vers num="4.5.51"/>
        <vers num="4.5.52"/>
        <vers num="4.5.55"/>
        <vers num="4.6"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="0.5"/>
        <vers num="0.7"/>
        <vers num="1.1a"/>
        <vers num="1.2"/>
        <vers num="1.4" edition="rc1"/>
        <vers num="1.4" edition="rc2"/>
        <vers num="1.4" edition="rc3"/>
      </prod>
      <prod name="slackware_linux" vendor="slackware">
        <vers num="9.0"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0227" seq="2004-0227" published="2004-06-14" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the zms script in ZoneMinder before 1.19.2 may allow a remote attacker to execute arbitrary code via a long query string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10340" adv="1" patch="1">10340</ref>
      <ref source="CONFIRM" url="http://www.zoneminder.com/index.php?id=20&amp;type=0&amp;backPID=20&amp;tt_news=29" adv="1">http://www.zoneminder.com/index.php?id=20&amp;type=0&amp;backPID=20&amp;tt_news=29</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16136">zoneminder-zms-bo(16136)</ref>
    </refs>
    <vuln_soft>
      <prod name="zoneminder" vendor="triornis">
        <vers num="1.17.0"/>
        <vers num="1.17.1"/>
        <vers num="1.17.2"/>
        <vers num="1.18.0"/>
        <vers num="1.18.1"/>
        <vers num="1.19.0"/>
        <vers num="1.19.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0228" seq="2004-0228" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer signedness error in the cpufreq proc handler (cpufreq_procctl) in Linux kernel 2.6 allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000852">CLA-2004:852</ref>
      <ref source="FEDORA" url="http://fedoranews.org/updates/FEDORA-2004-111.shtml">FEDORA-2004-111</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-02.xml" adv="1">GLSA-200407-02</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:050">MDKSA-2004:050</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_10_kernel.html">SuSE-SA:2004:010</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15951">linux-cpufreq-info-disclosure(15951)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0229" seq="2004-0229" published="2004-08-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The framebuffer driver in Linux kernel 2.6.x does not properly use the fb_copy_cmap function, with unknown impact.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000852">CLA-2004:852</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-02.xml" adv="1">GLSA-200407-02</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:037">MDKSA-2004:037</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_10_kernel.html">SuSE-SA:2004:010</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10211" adv="1">10211</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15974">linux-framebuffer(15974)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0230" seq="2004-0230" published="2004-08-18" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.</descript>
      <descript source="nvd">&lt;a href="https://cwe.mitre.org/data/definitions/331.html">CWE-331: Insufficient Entropy&lt;/a></descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="NETBSD" url="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc" adv="1">NetBSD-SA2004-006</ref>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt" adv="1">SCOSA-2005.3</ref>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt" adv="1">SCOSA-2005.9</ref>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt" adv="1">SCOSA-2005.14</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc" adv="1">20040403-01-A</ref>
      <ref source="CONFIRM" url="http://kb.juniper.net/JSA10638" adv="1">http://kb.juniper.net/JSA10638</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108302060014745&amp;w=2">20040425 Perl code exploting TCP not checking RST ACK.</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=108506952116653&amp;w=2">SSRT4696</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml">20040420 TCP Vulnerabilities in Multiple IOS-Based Cisco Products</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/415294" adv="1">VU#415294</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" adv="1" patch="1">http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/449179/100/0/threaded">SSRT061264</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10183" adv="1">10183</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/vuls/2004/236929/index.htm">http://www.uniras.gov.uk/vuls/2004/236929/index.htm</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-111A.html" adv="1">TA04-111A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/3983">ADV-2006-3983</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019">MS05-019</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064">MS06-064</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15886">tcp-rst-dos(15886)</ref>
      <ref source="CONFIRM" url="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10053" adv="1" patch="1">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10053</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689">oval:org.mitre.oval:def:2689</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270">oval:org.mitre.oval:def:270</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508">oval:org.mitre.oval:def:3508</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791">oval:org.mitre.oval:def:4791</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711">oval:org.mitre.oval:def:5711</ref>
    </refs>
    <vuln_soft>
      <prod name="network_data_loss_prevention" vendor="mcafee">
        <vers num="8.6" prev="1"/>
        <vers num="9.2.0"/>
        <vers num="9.2.1"/>
        <vers num="9.2.2"/>
      </prod>
      <prod name="openpgp" vendor="openpgp">
        <vers num="2.6.2"/>
      </prod>
      <prod name="junos" vendor="juniper">
        <vers num=""/>
      </prod>
      <prod name="netbsd" vendor="netbsd">
        <vers num="1.5"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3"/>
        <vers num="1.6"/>
        <vers num="1.6.1"/>
        <vers num="1.6.2"/>
        <vers num="2.0"/>
      </prod>
      <prod name="solaris" vendor="oracle">
        <vers num="10"/>
        <vers num="11"/>
      </prod>
      <prod name="openserver" vendor="xinuos">
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
      </prod>
      <prod name="unixware" vendor="xinuos">
        <vers num="7.1.1"/>
        <vers num="7.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0231" seq="2004-0231" published="2004-08-18" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple vulnerabilities in Midnight Commander (mc) before 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-21.xml" adv="1">GLSA-200405-21</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-497" adv="1" patch="1">DSA-497</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:039">MDKSA-2004:039</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_12_mc.html">SuSE-SA:2004:012</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-172.html">RHSA-2004:172</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16020">midnight-commander-insecure-files(16020)</ref>
    </refs>
    <vuln_soft>
      <prod name="midnight_commander" vendor="midnight_commander">
        <vers num="4.5.40"/>
        <vers num="4.5.41"/>
        <vers num="4.5.42"/>
        <vers num="4.5.43"/>
        <vers num="4.5.44"/>
        <vers num="4.5.45"/>
        <vers num="4.5.46"/>
        <vers num="4.5.47"/>
        <vers num="4.5.48"/>
        <vers num="4.5.49"/>
        <vers num="4.5.50"/>
        <vers num="4.5.51"/>
        <vers num="4.5.52"/>
        <vers num="4.5.55"/>
        <vers num="4.6"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="0.5"/>
        <vers num="0.7"/>
        <vers num="1.1a"/>
        <vers num="1.2"/>
        <vers num="1.4" edition="rc1"/>
        <vers num="1.4" edition="rc2"/>
        <vers num="1.4" edition="rc3"/>
      </prod>
      <prod name="slackware_linux" vendor="slackware">
        <vers num="9.0"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0232" seq="2004-0232" published="2004-08-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple format string vulnerabilities in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-21.xml">GLSA-200405-21</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-497">DSA-497</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:039">MDKSA-2004:039</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_12_mc.html">SuSE-SA:2004:012</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-172.html">RHSA-2004:172</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16021">midnight-commander-format-string(16021)</ref>
    </refs>
    <vuln_soft>
      <prod name="midnight_commander" vendor="midnight_commander">
        <vers num="4.5.40"/>
        <vers num="4.5.41"/>
        <vers num="4.5.42"/>
        <vers num="4.5.43"/>
        <vers num="4.5.44"/>
        <vers num="4.5.45"/>
        <vers num="4.5.46"/>
        <vers num="4.5.47"/>
        <vers num="4.5.48"/>
        <vers num="4.5.49"/>
        <vers num="4.5.50"/>
        <vers num="4.5.51"/>
        <vers num="4.5.52"/>
        <vers num="4.5.55"/>
        <vers num="4.6"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="0.5"/>
        <vers num="0.7"/>
        <vers num="1.1a"/>
        <vers num="1.2"/>
        <vers num="1.4" edition="rc1"/>
        <vers num="1.4" edition="rc2"/>
        <vers num="1.4" edition="rc3"/>
      </prod>
      <prod name="slackware_linux" vendor="slackware">
        <vers num="9.0"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0233" seq="2004-0233" published="2004-08-18" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-05.xml">GLSA-200405-05</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000752.1-1">1000752</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:031">MDKSA-2004:031</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-174.html" adv="1" patch="1">RHSA-2004:174</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-175.html">RHSA-2004:175</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10178" adv="1" patch="1">10178</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.404389">SSA:2004-110</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15904">utemper-symlink(15904)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10115">oval:org.mitre.oval:def:10115</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A979">oval:org.mitre.oval:def:979</ref>
    </refs>
    <vuln_soft>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
      <prod name="utempter" vendor="utempter">
        <vers num="0.5.2"/>
        <vers num="0.5.3"/>
      </prod>
      <prod name="slackware_linux" vendor="slackware">
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0234" seq="2004-0234" published="2004-08-18" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html">20060403 Barracuda LHA archiver security bug leads to remote compromise</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000840">CLA-2004:840</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html">20040501 LHa buffer overflows and directory traversal problems</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html">20040502 Lha local stack overflow Proof Of Concept Code</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108422737918885&amp;w=2">20040510 [Ulf Harnhammar]: LHA Advisory + Patch</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-02.xml">GLSA-200405-02</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1015866">1015866</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-515">DSA-515</ref>
      <ref source="MISC" url="http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt">http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html">FEDORA-2004-119</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-178.html">RHSA-2004:178</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-179.html">RHSA-2004:179</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10243" adv="1" patch="1">10243</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/1220" adv="1">ADV-2006-1220</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1833">FLSA:1833</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16012">lha-multiple-bo(16012)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977">oval:org.mitre.oval:def:977</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881">oval:org.mitre.oval:def:9881</ref>
    </refs>
    <vuln_soft>
      <prod name="mailsweeper" vendor="clearswift">
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.3.3"/>
        <vers num="4.3.4"/>
        <vers num="4.3.5"/>
        <vers num="4.3.6"/>
        <vers num="4.3.6_sp1"/>
        <vers num="4.3.7"/>
        <vers num="4.3.8"/>
        <vers num="4.3.10"/>
        <vers num="4.3.11"/>
        <vers num="4.3.13"/>
      </prod>
      <prod name="f-secure_anti-virus" vendor="f-secure">
        <vers num="4.51" edition=":linux_gateways"/>
        <vers num="4.51" edition=":linux_servers"/>
        <vers num="4.51" edition=":linux_workstations"/>
        <vers num="4.52" edition=":linux_gateways"/>
        <vers num="4.52" edition=":linux_servers"/>
        <vers num="4.52" edition=":linux_workstations"/>
        <vers num="4.60" edition=":samba_servers"/>
        <vers num="5.5" edition=":client_security"/>
        <vers num="5.41" edition=":mimesweeper"/>
        <vers num="5.41" edition=":windows_servers"/>
        <vers num="5.41" edition=":workstations"/>
        <vers num="5.42" edition=":mimesweeper"/>
        <vers num="5.42" edition=":windows_servers"/>
        <vers num="5.42" edition=":workstations"/>
        <vers num="5.52" edition=":client_security"/>
        <vers num="6.21" edition=":ms_exchange"/>
        <vers num="2003"/>
        <vers num="2004"/>
      </prod>
      <prod name="f-secure_for_firewalls" vendor="f-secure">
        <vers num="6.20"/>
      </prod>
      <prod name="f-secure_internet_security" vendor="f-secure">
        <vers num="2003"/>
        <vers num="2004"/>
      </prod>
      <prod name="f-secure_personal_express" vendor="f-secure">
        <vers num="4.5"/>
        <vers num="4.6"/>
        <vers num="4.7"/>
      </prod>
      <prod name="internet_gatekeeper" vendor="f-secure">
        <vers num="6.31"/>
        <vers num="6.32"/>
      </prod>
      <prod name="winrar" vendor="rarlab">
        <vers num="3.20"/>
      </prod>
      <prod name="lha" vendor="redhat">
        <vers num="1.14i-9" edition=":i386"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
      <prod name="cgpmcafee" vendor="stalker">
        <vers num="3.2"/>
      </prod>
      <prod name="lha" vendor="tsugio_okamoto">
        <vers num="1.14"/>
        <vers num="1.15"/>
        <vers num="1.17"/>
      </prod>
      <prod name="winzip" vendor="winzip">
        <vers num="9.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0235" seq="2004-0235" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes ("//absolute/path").</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000840">CLA-2004:840</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html">20040501 LHa buffer overflows and directory traversal problems</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108422737918885&amp;w=2">20040510 [Ulf Harnhammar]: LHA Advisory + Patch</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-02.xml">GLSA-200405-02</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-515">DSA-515</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html">FEDORA-2004-119</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-178.html">RHSA-2004:178</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-179.html">RHSA-2004:179</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10243" adv="1" patch="1">10243</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1833">FLSA:1833</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16013">lha-directory-traversal(16013)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409">oval:org.mitre.oval:def:10409</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978">oval:org.mitre.oval:def:978</ref>
    </refs>
    <vuln_soft>
      <prod name="mailsweeper" vendor="clearswift">
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.3.3"/>
        <vers num="4.3.4"/>
        <vers num="4.3.5"/>
        <vers num="4.3.6"/>
        <vers num="4.3.6_sp1"/>
        <vers num="4.3.7"/>
        <vers num="4.3.8"/>
        <vers num="4.3.10"/>
        <vers num="4.3.11"/>
        <vers num="4.3.13"/>
      </prod>
      <prod name="f-secure_anti-virus" vendor="f-secure">
        <vers num="4.51" edition=":linux_gateways"/>
        <vers num="4.51" edition=":linux_servers"/>
        <vers num="4.51" edition=":linux_workstations"/>
        <vers num="4.52" edition=":linux_gateways"/>
        <vers num="4.52" edition=":linux_servers"/>
        <vers num="4.52" edition=":linux_workstations"/>
        <vers num="4.60" edition=":samba_servers"/>
        <vers num="5.5" edition=":client_security"/>
        <vers num="5.41" edition=":mimesweeper"/>
        <vers num="5.41" edition=":windows_servers"/>
        <vers num="5.41" edition=":workstations"/>
        <vers num="5.42" edition=":mimesweeper"/>
        <vers num="5.42" edition=":windows_servers"/>
        <vers num="5.42" edition=":workstations"/>
        <vers num="5.52" edition=":client_security"/>
        <vers num="6.21" edition=":ms_exchange"/>
        <vers num="2003"/>
        <vers num="2004"/>
      </prod>
      <prod name="f-secure_for_firewalls" vendor="f-secure">
        <vers num="6.20"/>
      </prod>
      <prod name="f-secure_internet_security" vendor="f-secure">
        <vers num="2003"/>
        <vers num="2004"/>
      </prod>
      <prod name="f-secure_personal_express" vendor="f-secure">
        <vers num="4.5"/>
        <vers num="4.6"/>
        <vers num="4.7"/>
      </prod>
      <prod name="internet_gatekeeper" vendor="f-secure">
        <vers num="6.31"/>
        <vers num="6.32"/>
      </prod>
      <prod name="winrar" vendor="rarlab">
        <vers num="3.20"/>
      </prod>
      <prod name="lha" vendor="redhat">
        <vers num="1.14i-9" edition=":i386"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
      <prod name="cgpmcafee" vendor="stalker">
        <vers num="3.2"/>
      </prod>
      <prod name="lha" vendor="tsugio_okamoto">
        <vers num="1.14"/>
        <vers num="1.15"/>
        <vers num="1.17"/>
      </prod>
      <prod name="winzip" vendor="winzip">
        <vers num="9.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0236" seq="2004-0236" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in login.asp in thePHOTOtool allows remote attackers to gain unauthorized access via the password field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107576894019530&amp;w=2">20040131 Advisory !</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Feb/1008906.html">1008906</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9884" adv="1">9884</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15007">thephototool-login-sql-injection(15007)</ref>
    </refs>
    <vuln_soft>
      <prod name="thephototool" vendor="steelid">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0237" seq="2004-0237" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in Aprox PHP Portal allows remote attackers to read arbitrary files via a full pathname in the show parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107577555527321&amp;w=2">20040131 Directory Traversal in Aprox PHP Portal.</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008915">1008915</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9540" adv="1">9540</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15014">aproxphpportal-index-directory-traversal(15014)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0238" seq="2004-0238" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Overkill (0verkill) 0.15pre3 might allow local users to execute arbitrary code in the client via a long HOME environment variable in the (1) load_cfg and (2) save_cfg functions; possibly allow remote attackers to execute arbitrary code via long strings to (3) the send_message function; and, in the server, via (4) the parse_command_line function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016579.html">20040202 0verkill - little simple vulnerability.</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107577335424509&amp;w=2">20040202 0verkill - little simple vulnerability.</ref>
      <ref source="MISC" url="http://www.securiteam.com/securitynews/5AP010KC0C.html">http://www.securiteam.com/securitynews/5AP010KC0C.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9550" adv="1">9550</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14999">overkill-client-multiple-bo(14999)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15000">overkill-server-parsecommandline-bo(15000)</ref>
    </refs>
    <vuln_soft>
      <prod name="0verkill" vendor="0verkill">
        <vers num="0.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0239" seq="2004-0239" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in showphoto.php in PhotoPost PHP Pro 4.6 and earlier allows remote attackers to gain unauthorized access via the photo variable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107582512023998&amp;w=2">20040202 ZH2004-03SA (security advisory): Photopost PHP Pro 4.6 Sql</ref>
      <ref source="MISC" url="http://www.securiteam.com/securitynews/5KP010UC0W.html">http://www.securiteam.com/securitynews/5KP010UC0W.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9557" adv="1">9557</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15008">photopostphp-sql-injection(15008)</ref>
    </refs>
    <vuln_soft>
      <prod name="photopost_php_pro" vendor="photopost">
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0240" seq="2004-0240" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in X-Cart 3.4.3 allows remote attackers to view arbitrary files via a .. (dot dot) in the shop_closed_file argument to auth.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107582648326448&amp;w=2">20040203 X-Cart vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15033">xcart-dotdot-directory-traversal(15033)</ref>
    </refs>
    <vuln_soft>
      <prod name="x-cart" vendor="qualiteam">
        <vers num="3.2.0"/>
        <vers num="3.2.1"/>
        <vers num="3.3.0"/>
        <vers num="3.3.2"/>
        <vers num="3.4.0"/>
        <vers num="3.4.3"/>
        <vers num="3.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0241" seq="2004-0241" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">X-Cart 3.4.3 allows remote attackers to execute arbitrary commands via the perl_binary argument in (1) upgrade.php or (2) general.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107582648326448&amp;w=2">20040203 X-Cart vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9560" adv="1" patch="1">9560</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15034">xcart-perlbinary-execute-commands(15034)</ref>
    </refs>
    <vuln_soft>
      <prod name="x-cart" vendor="qualiteam">
        <vers num="3.2.0"/>
        <vers num="3.2.1"/>
        <vers num="3.3.0"/>
        <vers num="3.3.2"/>
        <vers num="3.4.0"/>
        <vers num="3.4.3"/>
        <vers num="3.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0242" seq="2004-0242" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">X-Cart 3.4.3 allows remote attackers to gain sensitive information via a mode parameter with (1) phpinfo command or (2) perlinfo command.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107582648326448&amp;w=2">20040203 X-Cart vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9563" adv="1" patch="1">9563</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15036">xcart-generalphp-obtain-information(15036)</ref>
    </refs>
    <vuln_soft>
      <prod name="x-cart" vendor="qualiteam">
        <vers num="3.2.0"/>
        <vers num="3.2.1"/>
        <vers num="3.3.0"/>
        <vers num="3.3.2"/>
        <vers num="3.4.0"/>
        <vers num="3.4.3"/>
        <vers num="3.4.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0243" seq="2004-0243" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">AIX 4.3.3 through AIX 5.1, when direct remote login is disabled, displays a different message if the password is correct, which allows remote attackers to guess the password via brute force methods.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-02/0313.html">20040206 AIX password enumeration possible</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107583269206044&amp;w=2">20040203 Re: sqwebmail web login</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15172">aix-password-enumeration(15172)</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0244" seq="2004-0244" published="2004-11-23" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.7" CVSS_base_score="4.7" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Cisco 6000, 6500, and 7600 series systems with Multilayer Switch Feature Card 2 (MSFC2) and a FlexWAN or OSM module allow local users to cause a denial of service (hang or reset) by sending a layer 2 frame packet that encapsulates a layer 3 packet, but has inconsistent length values with that packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040203-cat6k.shtml" adv="1">20040203 Cisco 6000/6500/7600 Crafted Layer 2 Frame Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/810062">VU#810062</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9562" adv="1">9562</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15013">cisco-malformed-frame-dos(15013)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5828">oval:org.mitre.oval:def:5828</ref>
    </refs>
    <vuln_soft>
      <prod name="ios" vendor="cisco">
        <vers num="12.1e"/>
        <vers num="12.2sy"/>
        <vers num="12.2za"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0245" seq="2004-0245" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Web Crossing 4.x and 5.x allows remote attackers to cause a denial of service (crash) by sending a HTTP POST request with a large or negative Content-Length, which causes an integer divide-by-zero.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107586518120516&amp;w=2">20040203 Web Crossing 4.x/5.x Denial of Service Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9576">9576</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15022">webcrossing-contentlength-post-dos(15022)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_crossing" vendor="web_crossing_inc">
        <vers num="4.0"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0246" seq="2004-0246" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in (1) fonctions.lib.php, (2) derniers_commentaires.php, and (3) admin.php in Les Commentaires 2.0 allow remote attackers to execute arbitrary PHP code via the rep parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107584083719763&amp;w=2">20040203 Les Commentaires (PHP) Include file</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9536" adv="1">9536</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15010">lescommentaires-multiple-file-include(15010)</ref>
    </refs>
    <vuln_soft>
      <prod name="les_commentaires" vendor="laurent_adda">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0247" seq="2004-0247" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The client and server of Chaser 1.50 and earlier allow remote attackers to cause a denial of service (crash via exception) via a UDP packet with a length field that is greater than the actual data length, which causes Chaser to read unexpected memory.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107584109420084&amp;w=2">20040203 Remote crash of Chaser game &lt;= 1.50</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9567" adv="1">9567</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15031">chaser-memory-dos(15031)</ref>
    </refs>
    <vuln_soft>
      <prod name="chaser_client" vendor="cauldron">
        <vers num="1.5"/>
      </prod>
      <prod name="chaser_server" vendor="cauldron">
        <vers num="1.4.9"/>
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0248" seq="2004-0248" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting vulnerability (XSS) in PHPX 3.2.3 allows remote attackers to execute arbitrary script as other users by injecting arbitrary HTML or script into (1) keywords argument of main.inc.php, (2) body argument of help.inc.php, or (3) the subject field in Personal Messages and Forum.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product release:
PHPX, PHPX, 3.2.4</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107586932324901&amp;w=2">20040203 Multiple Vulnerabilities in PHPX</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9569" patch="1">9569</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15050">phpx-subject-html-injection(15050)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15051">phpx-main-help-xss(15051)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpx" vendor="phpx">
        <vers num="3.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0249" seq="2004-0249" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">PHPX 2.0 through 3.2.4 allows remote attackers to gain access to other accounts by modifying the cookie's PXL variable to reference another userID.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0154.html">20040316 PHPX 2.x - 3.2.4</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107586932324901&amp;w=2">20040203 Multiple Vulnerabilities in PHPX</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9569" adv="1" patch="1">9569</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15052">phpx-cookie-account-hijacking(15052)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15512">phpx-session-hijack(15512)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpx" vendor="phpx">
        <vers num="3.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0250" seq="2004-0250" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in PhotoPost PHP Pro 4.6 and earlier allows remote attackers to gain privileges via (1) the product parameter in showproduct.php or (2) the cat parameter in showcat.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107593114909696&amp;w=2">20040204 ZH2004-04SA (security advisory): Multiple Sql Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9557" adv="1">9557</ref>
      <ref source="MISC" url="http://www.zone-h.org/en/advisories/read/id=3864/">http://www.zone-h.org/en/advisories/read/id=3864/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15008">photopostphp-sql-injection(15008)</ref>
    </refs>
    <vuln_soft>
      <prod name="photopost_php_pro" vendor="photopost">
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0251" seq="2004-0251" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in rxgoogle.cgi allows remote attackers to execute arbitrary script as other users via the query parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107594183924958&amp;w=2">20040204 rxgoogle.cgi XSS Vulnerability.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9575">9575</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15043">rxgoogle-query-xss(15043)</ref>
    </refs>
    <vuln_soft>
      <prod name="rxgoogle.cgi" vendor="rxgoogle.cgi">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0252" seq="2004-0252" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">TYPSoft FTP Server 1.10 allows remote attackers to cause a denial of service (CPU consumption) via an empty USER name.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107591511716707&amp;w=2">20040204 TYPSoft FTP Server 1.10 may be crashed</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9573" adv="1">9573</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Feb/1008943.html">1008943</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15048">typsoft-empty-username-dos(15048)</ref>
    </refs>
    <vuln_soft>
      <prod name="typsoft_ftp_server" vendor="typsoft">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0253" seq="2004-0253" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">IBM Cloudscape 5.1 running jdk 1.4.2_03 allows remote attackers to execute arbitrary programs or cause a denial of service via certain SQL code, possibly due to a SQL injection vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107604065819233&amp;w=2">20040205 IBM cloudscape SQL Database (DB2J) vulnerable to remote command</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9583" adv="1">9583</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15067">cloudscape-sql-injection(15067)</ref>
    </refs>
    <vuln_soft>
      <prod name="cloudscape" vendor="ibm">
        <vers num="5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0254" seq="2004-0254" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Discuz! Board 2.x and 3.x allows remote attackers to execute arbitrary script as other users via an img tag.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107606726417150&amp;w=2">20040205 Possible Cross Site Scripting in Discuz! Board</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9584">9584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15066">discuzboard-image-tag-xss(15066)</ref>
    </refs>
    <vuln_soft>
      <prod name="discuz" vendor="crosscom_olicom">
        <vers num="2.0"/>
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0255" seq="2004-0255" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Xlight 1.52, with log to screen enabled, allows remote attackers to cause a denial of service by requesting a long directory consisting of . (dot) and / (slash) characters, which causes the server to crash when the administrator views the log file, possibly triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107605633904122&amp;w=2">20040205 Remote crash Xlight ftp server 1.52</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9585" adv="1">9585</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15064">xlight-long-string-dos(15064)</ref>
    </refs>
    <vuln_soft>
      <prod name="xlight_ftp_server" vendor="xlight_ftp_server">
        <vers num="1.25"/>
        <vers num="1.41"/>
        <vers num="1.45"/>
        <vers num="1.52"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0256" seq="2004-0256" published="2004-11-23" modified="2018-05-02" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">GNU libtool before 1.5.2, during compile time, allows local users to overwrite arbitrary files via a symlink attack on libtool directories in /tmp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000811">CLA-2004:811</ref>
      <ref source="MISC" url="http://www.geocrawler.com/mail/msg.php3?msg_id=3438808&amp;list=405">http://www.geocrawler.com/mail/msg.php3?msg_id=3438808&amp;list=405</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/352333">20040130 Symlink Vulnerability in GNU libtool &lt;1.5.2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9530" adv="1" patch="1">9530</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15017">libtool-insecure-temp-directory(15017)</ref>
    </refs>
    <vuln_soft>
      <prod name="libtool" vendor="gnu">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0257" seq="2004-0257" published="2004-11-23" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">OpenBSD 3.4 and NetBSD 1.6 and 1.6.1 allow remote attackers to cause a denial of service (crash) by sending an IPv6 packet with a small MTU to a listening port and then issuing a TCP connect to that port.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="NETBSD" url="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-002.txt.asc">NetBSD-SA2004-002</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016704.html">20040204 Remote openbsd crash with ip6, yet still openbsd much better than windows</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107604603226564&amp;w=2">20040205 OpenBSD IPv6 remote kernel crash</ref>
      <ref source="MISC" url="http://www.guninski.com/obsdmtu.html">http://www.guninski.com/obsdmtu.html</ref>
      <ref source="CONFIRM" url="http://www.openbsd.org/cgi-bin/cvsweb/src/sys/netinet6/ip6_output.c">http://www.openbsd.org/cgi-bin/cvsweb/src/sys/netinet6/ip6_output.c</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9577" adv="1" patch="1">9577</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15044">openbsd-ipv6-dos(15044)</ref>
    </refs>
    <vuln_soft>
      <prod name="netbsd" vendor="netbsd">
        <vers num="1.6"/>
        <vers num="1.6.1"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0258" seq="2004-0258" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.6" CVSS_base_score="7.6" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in RealOne Player, RealOne Player 2.0, RealOne Enterprise Desktop, and RealPlayer Enterprise allow remote attackers to execute arbitrary code via malformed (1) .RP, (2) .RT, (3) .RAM, (4) .RPM or (5) .SMIL files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0027.html">20040204 [VulnWatch] Multiple File Format Vulnerabilities (Overruns) in REALOne &amp; RealPlayer</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107608748813559&amp;w=2">20040204 Multiple File Format Vulnerabilities (Overruns) in REALOne &amp; RealPlayer</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-075.shtml">O-075</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/473814" adv="1">VU#473814</ref>
      <ref source="MISC" url="http://www.nextgenss.com/advisories/realone.txt">http://www.nextgenss.com/advisories/realone.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9579" adv="1" patch="1">9579</ref>
      <ref source="CONFIRM" url="http://www.service.real.com/help/faq/security/040123_player/EN/">http://www.service.real.com/help/faq/security/040123_player/EN/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15040">realoneplayer-multiple-file-bo(15040)</ref>
    </refs>
    <vuln_soft>
      <prod name="realone_desktop_manager" vendor="realnetworks">
        <vers num=""/>
      </prod>
      <prod name="realone_enterprise_desktop" vendor="realnetworks">
        <vers num="6.0.11.774"/>
      </prod>
      <prod name="realone_player" vendor="realnetworks">
        <vers num="1.0"/>
        <vers num="2.0" edition=":win"/>
        <vers num="6.0.11.818"/>
        <vers num="6.0.11.830"/>
        <vers num="6.0.11.841"/>
        <vers num="6.0.11.853"/>
        <vers num="6.0.11.868"/>
      </prod>
      <prod name="realplayer" vendor="realnetworks">
        <vers num="8.0" edition=":mac_os"/>
        <vers num="8.0" edition=":unix"/>
        <vers num="8.0" edition=":win32"/>
        <vers num="10.0_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0259" seq="2004-0259" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The check_referer() function in Formmail.php 5.0 and earlier allows remote attackers to bypass access restrictions via an empty or spoofed HTTP Referer, as demonstrated using an application on the same web server that contains a cross-site scripting (XSS) issue.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107619109629629&amp;w=2">20040206 formmail (PHP) Upload file using CSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9591" adv="1">9591</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15079">jack-formmail-file-upload(15079)</ref>
    </refs>
    <vuln_soft>
      <prod name="formmail.php" vendor="joe_lumbroso_acks">
        <vers num="2.0"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0260" seq="2004-0260" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The AddToMailingList function in CactuSoft CactuShop 5.0 Lite contains a backdoor that allows remote attackers to delete arbitrary files via an email address that starts with |||.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016819.html">20040206 CactuSoft CactuShop 5.0 Lite shopping cart software backdoor</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107619501815888&amp;w=2">20040206 CactuSoft CactuShop 5.0 Lite shopping cart software backdoor</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9589" adv="1">9589</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15063">cactushoplite-backdoor(15063)</ref>
    </refs>
    <vuln_soft>
      <prod name="cactushop_lite" vendor="cactusoft">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0261" seq="2004-0261" published="2004-11-23" modified="2018-05-02" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">oj.cgi in OpenJournal 2.0 through 2.0.5 allows remote attackers to bypass authentication and access the control panel via a 0 in the uid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107619136600713&amp;w=2">20040206 Open Journal Blog Authenticaion Bypassing Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.grohol.com/downloads/oj/latest/changelog.txt">http://www.grohol.com/downloads/oj/latest/changelog.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9598" adv="1" patch="1">9598</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15069">openjournal-uid-admin-access(15069)</ref>
    </refs>
    <vuln_soft>
      <prod name="openjournal" vendor="openjournal">
        <vers num="2.0"/>
        <vers num="2.0_1"/>
        <vers num="2.0_2"/>
        <vers num="2.0_3"/>
        <vers num="2.0_4"/>
        <vers num="2.0_5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0262" seq="2004-0262" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in The Palace 3.5 and earlier client allows remote attackers to execute arbitrary code via a link to a palace:// url followed by a long server address string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0033.html">20040207 The Palace 3.x (Client) Stack Overflow Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107634556632195&amp;w=2">20040207 The Palace 3.x (Client) Stack Overflow Vulnerability</ref>
      <ref source="MISC" url="http://www.elitehaven.net/thepalace.txt">http://www.elitehaven.net/thepalace.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9602" adv="1">9602</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15074">palace-server-address-bo(15074)</ref>
    </refs>
    <vuln_soft>
      <prod name="the_palace_client" vendor="the_palace">
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0263" seq="2004-0263" published="2004-11-23" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">PHP 4.3.4 and earlier in Apache 1.x and 2.x (mod_php) can leak global variables between virtual hosts that are handled by the same Apache child process but have different settings, which could allow remote attackers to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200402-01.xml">GLSA-200402-01</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9599" adv="1">9599</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15072">php-virtualhost-info-disclosure(15072)</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="1.0"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.5"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.5"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.6"/>
        <vers num="1.3.7" edition=":dev"/>
        <vers num="1.3.9"/>
        <vers num="1.3.11"/>
        <vers num="1.3.12"/>
        <vers num="1.3.14"/>
        <vers num="1.3.17"/>
        <vers num="1.3.18"/>
        <vers num="1.3.19"/>
        <vers num="1.3.20"/>
        <vers num="1.3.22"/>
        <vers num="1.3.23"/>
        <vers num="1.3.24"/>
        <vers num="1.3.25"/>
        <vers num="1.3.26"/>
        <vers num="1.3.27"/>
        <vers num="1.3.28"/>
        <vers num="1.3.29"/>
        <vers num="2.0"/>
        <vers num="2.0.9"/>
        <vers num="2.0.28" edition="beta"/>
        <vers num="2.0.32"/>
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.0.40"/>
        <vers num="2.0.41"/>
        <vers num="2.0.42"/>
        <vers num="2.0.43"/>
        <vers num="2.0.44"/>
        <vers num="2.0.45"/>
        <vers num="2.0.46"/>
        <vers num="2.0.47"/>
        <vers num="2.0.48"/>
      </prod>
      <prod name="http_server" vendor="ibm">
        <vers num="1.3.19"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0264" seq="2004-0264" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">palmhttpd for PalmOS allows remote attackers to cause a denial of service (crash) by establishing two simultaneous HTTP connections, which exceeds the PalmOS accept queue.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107634638201570&amp;w=2">20040208 PalmOS httpd accept() queue overflow DoS vulnerability.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9608" adv="1" patch="1">9608</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15090">palmhttpd-accept-bo(15090)</ref>
    </refs>
    <vuln_soft>
      <prod name="jim_rees_httpd" vendor="jim_rees">
        <vers num="palmos"/>
      </prod>
      <prod name="palmhttpd" vendor="shaun2k2">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0265" seq="2004-0265" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in modules.php for Php-Nuke 6.x-7.1.0 allows remote attackers to execute arbitrary script as other users via URL-encoded (1) title or (2) fname parameters in the News or Reviews modules.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107634727520936&amp;w=2">20040208 [waraxe-2004-SA#002] - Cross-Site Scripting (XSS) in Php-Nuke 7.1.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9605">9605</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9613">9613</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15076">phpnuke-mulitple-xss(15076)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0266" seq="2004-0266" published="2004-11-23" modified="2017-07-18" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the "public message" capability (public_message) for Php-Nuke 6.x to 7.1.0 allows remote attackers to obtain the administrator password via the c_mid parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107635110327066&amp;w=2">20040208 [waraxe-2004-SA#003] - SQL injection in Php-Nuke 7.1.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9615" adv="1">9615</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15080">phpnuke-publicmessage-sql-injection(15080)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0267" seq="2004-0267" published="2004-11-23" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The (1) inoregupdate, (2) uniftest, or (3) unimove scripts in eTrust InoculateIT for Linux 6.0 allow local users to overwrite arbitrary files via a symlink attack on files in /tmp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107635584431518&amp;w=2">20040209 [local problems] eTrust Virus Protection 6.0 InoculateIT for linux</ref>
      <ref source="MISC" url="http://www.excluded.org/advisories/advisory10.txt">http://www.excluded.org/advisories/advisory10.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9616" adv="1">9616</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15102">etrust-inoculateit-symlink(15102)</ref>
    </refs>
    <vuln_soft>
      <prod name="inoculateit" vendor="ca">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0268" seq="2004-0268" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in EvolutionX 3921 and 3935 allow remote attackers to cause a denial of service (hang) via (1) a long cd command to the FTP server, or (2) a long dir command to the telnet server.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016988.html">20040210 XBOX EvolutionX ftp 'cd' command and telnet 'dir' buffer overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107643394724891&amp;w=2">20040210 XBOX EvolutionX ftp 'cd' command and telnet 'dir' buffer overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9631" adv="1">9631</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15104">evolutionx-command-line-dos(15104)</ref>
    </refs>
    <vuln_soft>
      <prod name="evolutionx" vendor="evolutionx">
        <vers num="build_3921"/>
        <vers num="build_3935"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0269" seq="2004-0269" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">SQL injection vulnerability in PHP-Nuke 6.9 and earlier, and possibly 7.x, allows remote attackers to inject arbitrary SQL code and gain sensitive information via (1) the category variable in the Search module or (2) the admin variable in the Web_Links module.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107643348117646&amp;w=2">20040210 [SCAN Associates Sdn Bhd Security Advisory] PHPNuke 6.9 > and below SQL Injection in multiple module</ref>
      <ref source="MISC" url="http://www.scan-associates.net/papers/phpnuke69.txt">http://www.scan-associates.net/papers/phpnuke69.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9630" adv="1" patch="1">9630</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15115">phpnuke-modules-sql-injection(15115)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="1.0"/>
        <vers num="2.5"/>
        <vers num="3.0"/>
        <vers num="4.0"/>
        <vers num="4.3"/>
        <vers num="4.4"/>
        <vers num="4.4.1a"/>
        <vers num="5.0"/>
        <vers num="5.0.1"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
        <vers num="5.2a"/>
        <vers num="5.3.1"/>
        <vers num="5.4"/>
        <vers num="5.5"/>
        <vers num="5.6"/>
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0270" seq="2004-0270" published="2004-11-23" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">libclamav in Clam AntiVirus 0.65 allows remote attackers to cause a denial of service (crash) via a uuencoded e-mail message with an invalid line length (e.g., a lowercase character), which causes an assert error in clamd that terminates the calling program.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107634700823822&amp;w=2">20040209 clamav 0.65 remote DOS exploit</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200402-07.xml" adv="1">GLSA-200402-07</ref>
      <ref source="CONFIRM" url="http://www.freebsd.org/cgi/query-pr.cgi?pr=62586">http://www.freebsd.org/cgi/query-pr.cgi?pr=62586</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9610" adv="1" patch="1">9610</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15077">clam-antivirus-uuencoded-dos(15077)</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clam_anti-virus">
        <vers num="0.65"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0271" seq="2004-0271" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting vulnerabilities (XSS) in MaxWebPortal allow remote attackers to execute arbitrary web script as other users via (1) the sub_name parameter of dl_showall.asp, (2) the SendTo parameter in Personal Messages, (3) the HTTP_REFERER for down.asp, or (4) the image name of an Avatar in the register form.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product release:
MaxWebPortal, MaxWebPortal, 1.32</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107643014606515&amp;w=2">20040210 XSS, Sql Injection and Avatar ScriptCode Injection in MaxWebPortal</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9625" patch="1">9625</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15120">maxwebportal-multiple-xss(15120)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15122">maxwebportal-register-xss(15122)</ref>
    </refs>
    <vuln_soft>
      <prod name="maxwebportal" vendor="maxwebportal">
        <vers num="1.30"/>
        <vers num="1.31"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0272" seq="2004-0272" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in MaxWebPortal allows remote attackers to inject arbitrary SQL code and gain sensitive information via the SendTo parameter in Personal Messages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107643014606515&amp;w=2">20040210 XSS, Sql Injection and Avatar ScriptCode Injection in MaxWebPortal</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9625" adv="1">9625</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15121">maxwebportal-personalmesssages-sql-injection(15121)</ref>
    </refs>
    <vuln_soft>
      <prod name="maxwebportal" vendor="maxwebportal">
        <vers num="1.30"/>
        <vers num="1.31"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0273" seq="2004-0273" published="2004-11-23" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in RealOne Player, RealOne Player 2.0, and RealOne Enterprise Desktop allows remote attackers to upload arbitrary files via an RMP file that contains .. (dot dot) sequences in a .rjs skin file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107642978524321&amp;w=2">20040210 Directory traversal in RealPlayer allows code execution</ref>
      <ref source="CONFIRM" url="http://service.real.com/help/faq/security/040123_player/EN/" adv="1" patch="1">http://service.real.com/help/faq/security/040123_player/EN/</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/514734">VU#514734</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9580" adv="1" patch="1">9580</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15123">realoneplayer-rmp-directory-traversal(15123)</ref>
    </refs>
    <vuln_soft>
      <prod name="realone_desktop_manager" vendor="realnetworks">
        <vers num=""/>
      </prod>
      <prod name="realone_enterprise_desktop" vendor="realnetworks">
        <vers num="6.0.11.774"/>
      </prod>
      <prod name="realone_player" vendor="realnetworks">
        <vers num="1.0"/>
        <vers num="2.0" edition=":win"/>
        <vers num="6.0.11.818"/>
        <vers num="6.0.11.830"/>
        <vers num="6.0.11.841"/>
        <vers num="6.0.11.853"/>
        <vers num="6.0.11.868"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0274" seq="2004-0274" published="2004-11-23" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Share.mod in Eggheads Eggdrop IRC bot 1.6.10 through 1.6.15 can mistakenly assign STAT_OFFERED status to a bot that is not a sharebot, which allows remote attackers to use STAT_OFFERED to promote a bot to a sharebot and conduct unauthorized activities.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107634593827102&amp;w=2">20040208 Eggrop bug</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107643315623958&amp;w=2">20040210 Re: Eggrop bug</ref>
      <ref source="MISC" url="http://mogan.nonsoloirc.com/egg_advisory.txt">http://mogan.nonsoloirc.com/egg_advisory.txt</ref>
      <ref source="CONFIRM" url="http://www.eggheads.org/news/2004/04/10/26">http://www.eggheads.org/news/2004/04/10/26</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9606" adv="1">9606</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15084">eggdrop-sharemod-gain-access(15084)</ref>
    </refs>
    <vuln_soft>
      <prod name="eggdrop_irc_bot" vendor="eggheads">
        <vers num="1.6.10"/>
        <vers num="1.6.11"/>
        <vers num="1.6.12"/>
        <vers num="1.6.13"/>
        <vers num="1.6.14"/>
        <vers num="1.6.15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0275" seq="2004-0275" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">SQL injection vulnerability in calendar_download.php in BosDates 3.2 and earlier allows remote attackers to obtain sensitive information and gain access via the calendar parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107651618613575&amp;w=2">20040211 ZH2004-05SA (security advisory): Sql Injection Vulnerability in BosDates</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9639" adv="1">9639</ref>
      <ref source="MISC" url="http://www.zone-h.org/en/advisories/read/id=3925/">http://www.zone-h.org/en/advisories/read/id=3925/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15133">bosdates-calendar-sql-injection(15133)</ref>
    </refs>
    <vuln_soft>
      <prod name="bosdates" vendor="bosdev">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0276" seq="2004-0276" published="2004-11-23" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The get_real_string function in Monkey HTTP Daemon (monkeyd) 0.8.1 and earlier allows remote attackers to cause a denial of service (crash) via an HTTP request with a sequence of "%" characters and a missing Host field.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/poc/monkeydos.zip">http://aluigi.altervista.org/poc/monkeydos.zip</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107652610506968&amp;w=2">20040211 Denial of Service in Monkey httpd &lt;= 0.8.1</ref>
      <ref source="CONFIRM" url="http://monkeyd.sourceforge.net/">http://monkeyd.sourceforge.net/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9642" adv="1" patch="1">9642</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15187">monkey-getrealstring-dos(15187)</ref>
    </refs>
    <vuln_soft>
      <prod name="monkey_http_daemon" vendor="monkey-project">
        <vers num="0.1.1"/>
        <vers num="0.5.2"/>
        <vers num="0.6.0"/>
        <vers num="0.6.1"/>
        <vers num="0.6.2"/>
        <vers num="0.6.3"/>
        <vers num="0.7.0"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.8.0"/>
        <vers num="0.8.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0277" seq="2004-0277" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in Dream FTP 1.02 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the username.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016871.html">20040207 DreamFTP Server 1.02 Buffer Overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107656166402882&amp;w=2">20040211 Re: [Full-Disclosure] DreamFTP Server 1.02 Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9600" adv="1">9600</ref>
      <ref source="MISC" url="http://www.security-protocols.com/modules.php?name=News&amp;file=article&amp;sid=1722">http://www.security-protocols.com/modules.php?name=News&amp;file=article&amp;sid=1722</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15070">dreamftp-username-format-string(15070)</ref>
    </refs>
    <vuln_soft>
      <prod name="dream_ftp_server" vendor="bolintech">
        <vers num="1.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0278" seq="2004-0278" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Ratbag game engine, as used in products such as Dirt Track Racing, Leadfoot, and World of Outlaws Spring Cars, allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet that specifies the length of data to read and then sends a second TCP packet that contains less data than specified, which causes Ratbag to repeatedly check the socket for more data.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107655269820530&amp;w=2">20040211 Denial of Service in Ratbag's game engine</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9644" adv="1">9644</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15188">ratbag-data-length-dos(15188)</ref>
    </refs>
    <vuln_soft>
      <prod name="dirt_track_racing" vendor="ratbag">
        <vers num="1.0.3"/>
        <vers num="2.0"/>
      </prod>
      <prod name="dirt_track_racing_australia" vendor="ratbag">
        <vers num=""/>
      </prod>
      <prod name="dirt_track_racing_sprint_cars" vendor="ratbag">
        <vers num=""/>
      </prod>
      <prod name="leadfoot" vendor="ratbag">
        <vers num=""/>
      </prod>
      <prod name="world_of_outlaws_sprint_cars" vendor="ratbag">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0279" seq="2004-0279" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">AIM Sniff (aimSniff.pl) 0.9b allows local users to overwrite arbitrary files via a symlink attack on /tmp/AS.log.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107662243303439&amp;w=2">20040212 aimSniff.pl file "deletion" (local)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9653" adv="1" patch="1">9653</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15199">aim-sniff-symlink(15199)</ref>
    </refs>
    <vuln_soft>
      <prod name="aim_sniff" vendor="aim_sniff">
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="0.9b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0280" seq="2004-0280" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Caucho Technology Resin 2.1.12 allows remote attackers to view JSP source via an HTTP request to a .jsp file that ends in a "%20" (encoded space character), e.g. index.jsp%20.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107635084830547&amp;w=2">20040205 Apache Http Server Reveals Script Source Code to Remote Users And Any Users Can Access Resin Forbidden Directory ("/WEB-INF/")</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9614" adv="1">9614</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15085">resin-source-disclosure(15085)</ref>
    </refs>
    <vuln_soft>
      <prod name="resin" vendor="caucho_technology">
        <vers num="2.1.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0281" seq="2004-0281" published="2004-11-23" modified="2019-06-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Caucho Technology Resin 2.1.12 allows remote attackers to gain sensitive information and view the contents of the /WEB-INF/ directory via an HTTP request for "WEB-INF..", which is equivalent to "WEB-INF" in Windows.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107635084830547&amp;w=2" adv="1">20040205 Apache Http Server Reveals Script Source Code to Remote Users And Any Users Can Access Resin Forbidden Directory ("/WEB-INF/")</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9617" adv="1">9617</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15087" adv="1">resin-dotdot-directory-traversal(15087)</ref>
    </refs>
    <vuln_soft>
      <prod name="resin" vendor="caucho">
        <vers num="2.1.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0282" seq="2004-0282" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Crob FTP daemon 3.5.2 allows remote attackers to cause a denial of service (crash) by repeatedly connecting to and disconnecting from the server.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107665920909374&amp;w=2">20040212 crob ftpd Denial of Service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9651" adv="1">9651</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15201">crob-multiple-connections-dos(15201)</ref>
    </refs>
    <vuln_soft>
      <prod name="crob_ftp_server" vendor="crob">
        <vers num="3.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0283" seq="2004-0283" published="2004-11-23" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mailmgr 1.2.3 allows local users to overwrite arbitrary files via a symlink attack on (1) /tmp/mailmgr.unsort, (2) /tmp/mailmgr.tmp, or (3) /tmp/mailmgr.sort.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107665013714517&amp;w=2">20040212 Symlink vulnerabilities in mailmgr</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9654" adv="1">9654</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15203">mailmgr-insecure-temp-directory(15203)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailmgr" vendor="mailmgr">
        <vers num="1.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0284" seq="2004-0284" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 6.0, Outlook 2002, and Outlook 2003 allow remote attackers to cause a denial of service (CPU consumption), if "Do not save encrypted pages to disk" is disabled, via a web site or HTML e-mail that contains two null characters (%00) after the host name.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107643134712133&amp;w=2">20040210 ASPR #2004-01-20-1: Internet Explorer/Outlook double null character DoS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9629" adv="1" patch="1">9629</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15127">ie-host-null-dos(15127)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp1"/>
      </prod>
      <prod name="outlook" vendor="microsoft">
        <vers num="2002" edition="sp1"/>
        <vers num="2002" edition="sp2"/>
        <vers num="2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0285" seq="2004-0285" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerabilities in include/footer.inc.php in (1) AllMyVisitors, (2) AllMyLinks, and (3) AllMyGuests allow remote attackers to execute arbitrary PHP code via a URL in the _AMVconfig[cfg_serverpath] parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107696209514155&amp;w=2">20040214 AllMyGuests PHP Code Injection vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107696235424865&amp;w=2">20040214 AllMyVisitors PHP Code Injection vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107696291728750&amp;w=2">20040214 AllMyLinks PHP Code Injection vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9664" adv="1" patch="1">9664</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15226">allmylinks-file-include(15226)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15227">allmyguests-php-file-include(15227)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15228">allmyvisitors-file-include(15228)</ref>
    </refs>
    <vuln_soft>
      <prod name="allmyguests" vendor="voice_of_web">
        <vers num="0.1.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.4.1"/>
      </prod>
      <prod name="allmylinks" vendor="voice_of_web">
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.4.1"/>
        <vers num="0.4.3"/>
        <vers num="0.4.4"/>
        <vers num="0.4.9"/>
        <vers num="0.5"/>
      </prod>
      <prod name="allmyvisitors" vendor="voice_of_web">
        <vers num="0.3"/>
        <vers num="0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0286" seq="2004-0286" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in RobotFTP 1.0 and 2.0 beta 1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long username.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107696194306878&amp;w=2">20040215 buffer overflow in Robot FTP Server</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9672" adv="1">9672</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15225">robot-username-bo(15225)</ref>
    </refs>
    <vuln_soft>
      <prod name="robotftp_server" vendor="robotftp">
        <vers num="1.0"/>
        <vers num="2.0_beta_1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0287" seq="2004-0287" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Xlight FTP server 1.52 allows remote authenticated users to cause a denial of service (crash) via a RETR command with a long argument containing a large number of / (slash) characters, possibly triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107695172917263&amp;w=2">20040215 Xlight ftp server 1.52 RETR bug</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9668">9668</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15220">xlight-retr-dos(15220)</ref>
    </refs>
    <vuln_soft>
      <prod name="xlight_ftp_server" vendor="xlight_ftp_server">
        <vers num="1.52"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0288" seq="2004-0288" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the UdmDocToTextBuf function in mnoGoSearch 3.2.13 through 3.2.15 could allow remote attackers to execute arbitrary code by indexing a large document.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107695139930726&amp;w=2">20040215 Buffer overflow in mnoGoSearch</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9667" adv="1" patch="1">9667</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15209">mnogosearch-udmdoctotextbuf-bo(15209)</ref>
    </refs>
    <vuln_soft>
      <prod name="mnogosearch" vendor="mnogosearch">
        <vers num="3.1.19"/>
        <vers num="3.1.20"/>
        <vers num="3.2.10"/>
        <vers num="3.2.13"/>
        <vers num="3.2.14"/>
        <vers num="3.2.15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0289" seq="2004-0289" published="2004-11-23" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in sdbscan in SignatureDB 0.1.1 allows local users to cause a denial of service (segmentation fault) via a database file that contains a large key parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107695113832648&amp;w=2">20040215 problems with database files in 'SignatureDB'</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9661" adv="1">9661</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15217">signaturedb-sdbscan-bo(15217)</ref>
    </refs>
    <vuln_soft>
      <prod name="signaturedb" vendor="paul_l_daniels">
        <vers num="0.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0290" seq="2004-0290" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Purge Jihad 2.0.1 and earlier allows remote game servers to execute arbitrary code via an information packet that contains large (1) battle type and (2) map name fields.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107695064204362&amp;w=2">20040216 Broadcast client buffer-overflow in Purge Jihad &lt;= 2.0.1</ref>
      <ref source="CONFIRM" url="http://purge.worthplaying.com/phpbb/viewtopic.php?t=1167">http://purge.worthplaying.com/phpbb/viewtopic.php?t=1167</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9671" adv="1">9671</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15216">purge-battletype-map-bo(15216)</ref>
    </refs>
    <vuln_soft>
      <prod name="purge" vendor="freeform_interactive">
        <vers num="1.4.7"/>
      </prod>
      <prod name="purge_jihad" vendor="freeform_interactive">
        <vers num="2.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0291" seq="2004-0291" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">SQL injection vulnerability in post.php for YaBB SE 1.5.4 and 1.5.5 allows remote attackers to obtain hashed passwords via the quote parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107696318522985&amp;w=2">20040216 Another YabbSE SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9674" adv="1" patch="1">9674</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15224">yabb-post-sql-injection(15224)</ref>
    </refs>
    <vuln_soft>
      <prod name="yabb" vendor="yabb">
        <vers num="1.5.4" edition=":second_edition"/>
        <vers num="1.5.5" edition=":second_edition"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0292" seq="2004-0292" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in KarjaSoft Sami HTTP Server 1.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107703630913205&amp;w=2">20040217 KarjaSoft Sami HTTP Server 1.0.4 Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9679" adv="1">9679</ref>
      <ref source="MISC" url="http://www.security-protocols.com/modules.php?name=News&amp;file=article&amp;sid=1746">http://www.security-protocols.com/modules.php?name=News&amp;file=article&amp;sid=1746</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15237">sami-http-get-bo(15237)</ref>
    </refs>
    <vuln_soft>
      <prod name="sami_http_server" vendor="karjasoft">
        <vers num="1.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0293" seq="2004-0293" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in ShopCartCGI 2.3 allows remote attackers to retrieve arbitrary files via a .. (dot dot) in a HTTP request to (1) gotopage.cgi or (2) genindexpage.cgi.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107703602707450&amp;w=2">20040217 ZH2004-06SA (security advisory): ShopCartCGI v2.3 Remote</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9670" adv="1">9670</ref>
      <ref source="MISC" url="http://www.zone-h.org/en/advisories/read/id=3962/">http://www.zone-h.org/en/advisories/read/id=3962/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14982">shopcartcgi-dotdot-directory-traversal(14982)</ref>
    </refs>
    <vuln_soft>
      <prod name="shopcartcgi" vendor="shopcartcgi">
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0294" seq="2004-0294" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">YaBB 1 SP 1.3.1 displays different error messages when a user exists or not, which makes it easier for remote attackers to identify valid users and conduct a brute force password guessing attack.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107703591314745&amp;w=2">20040217 YABB information leakage on failed login</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9677" adv="1">9677</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15236">yabb-invalidmessage-obtain-information(15236)</ref>
    </refs>
    <vuln_soft>
      <prod name="yabb" vendor="yabb">
        <vers num="1_gold_-_sp_1.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0295" seq="2004-0295" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">TsFtpSrv.exe in Broker FTP 6.1.0.0 allows remote attackers to cause a denial of service (CPU consumption) via an open idle connection.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107705346817241&amp;w=2">20040217 Broker FTP DoS (Message Server)</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5IP0B0AC1I.html">http://www.securiteam.com/windowsntfocus/5IP0B0AC1I.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9680" adv="1">9680</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15242">broker-ftp-tsftpsrv-dos(15242)</ref>
    </refs>
    <vuln_soft>
      <prod name="broker_ftp_server" vendor="transsoft">
        <vers num="6.1_.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0296" seq="2004-0296" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">TsFtpSrv.exe in Broker FTP 6.1.0.0 allows remote attackers to cause a TsFtpSrv.exe to exit with an exception by opening and immediately closing a connection.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107705346817241&amp;w=2">20040217 Broker FTP DoS (Message Server)</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5IP0B0AC1I.html">http://www.securiteam.com/windowsntfocus/5IP0B0AC1I.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9680" adv="1">9680</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15241">broker-ftp-dos(15241)</ref>
    </refs>
    <vuln_soft>
      <prod name="broker_ftp_server" vendor="transsoft">
        <vers num="6.1_.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0297" seq="2004-0297" published="2004-11-23" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) in Ipswitch IMail Server 8.03 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via an LDAP message with a large tag length.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=74">20040217 Ipswitch IMail LDAP Daemon Remote Buffer Overflow</ref>
      <ref source="CONFIRM" url="http://www.ipswitch.com/support/imail/releases/imail_professional/im805HF2.html">http://www.ipswitch.com/support/imail/releases/imail_professional/im805HF2.html</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/972334" adv="1">VU#972334</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9682" adv="1" patch="1">9682</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15243">imail-ldap-tag-bo(15243)</ref>
    </refs>
    <vuln_soft>
      <prod name="imail" vendor="ipswitch">
        <vers num="8.0.3"/>
        <vers num="8.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0298" seq="2004-0298" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">CesarFTP 0.99e allows remote attackers to cause a denial of service (CPU consumption) via a long RETR parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107712057628250&amp;w=2">20040217 CesarFTP 0.99 : 100% employment of computer resources</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9666" adv="1">9666</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15252">cesarftp-userpass-dos(15252)</ref>
    </refs>
    <vuln_soft>
      <prod name="cesarftp" vendor="aclogic">
        <vers num="0.99e"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0299" seq="2004-0299" published="2004-11-23" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in smallftpd 0.99 allows local users to cause a denial of service (crash) via an FTP request with a large number of "/" (slash) characters.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107714207708375&amp;w=2">20040217 Smallftpd 1.0.3 DoS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9684" adv="1">9684</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15262">smallftpd-forwardslash-dos(15262)</ref>
    </refs>
    <vuln_soft>
      <prod name="smallftpd" vendor="smallftpd">
        <vers num="1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0300" seq="2004-0300" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Online Store Kit 3.0 allows remote attackers to inject arbitrary SQL and gain unauthorized access via (1) the cat parameter in shop.php, (2) the id parameter in more.php, (3) the cat_manufacturer parameter in shop_by_brand.php, or (4) the id parameter in listing.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107712117913185&amp;w=2">20040218 ZH2004-07SA (security advisory): Multiple Sql injection</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Feb/1009092.html">1009092</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9676" adv="1">9676</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9687" adv="1">9687</ref>
      <ref source="MISC" url="http://www.systemsecure.org/advisories/ssadvisory16022004.php">http://www.systemsecure.org/advisories/ssadvisory16022004.php</ref>
      <ref source="MISC" url="http://www.zone-h.org/en/advisories/read/id=3972/">http://www.zone-h.org/en/advisories/read/id=3972/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15232">onlinestorekit-more-sql-injection(15232)</ref>
    </refs>
    <vuln_soft>
      <prod name="store_kit" vendor="ecommerce_corporation_online">
        <vers num="3.0_lite"/>
        <vers num="3.0_pro"/>
        <vers num="3.0_standard"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0301" seq="2004-0301" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in more.php for Online Store Kit 3.0 allows remote attackers to inject arbitrary HTML via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Feb/1009079.html">1009079</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9676">9676</ref>
      <ref source="MISC" url="http://www.systemsecure.org/advisories/ssadvisory16022004.php">http://www.systemsecure.org/advisories/ssadvisory16022004.php</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15235">onlinestorekit-more-xss(15235)</ref>
    </refs>
    <vuln_soft>
      <prod name="store_kit" vendor="ecommerce_corporation_online">
        <vers num="3.0_lite"/>
        <vers num="3.0_pro"/>
        <vers num="3.0_standard"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0302" seq="2004-0302" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in OWLS 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the (1) file parameter in index.php, (2) editfile in glossary.php, or (3) editfile in newmultiplechoice.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107712123305706&amp;w=2">20040218 ZH2004-08SA (security advisory): OWLS 1.0 Remote arbitrary files</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9689" adv="1">9689</ref>
      <ref source="MISC" url="http://www.zone-h.org/en/advisories/read/id=3973/">http://www.zone-h.org/en/advisories/read/id=3973/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15249">owls-file-retrieval(15249)</ref>
    </refs>
    <vuln_soft>
      <prod name="owls_workshop" vendor="fools_workshop">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0303" seq="2004-0303" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">OWLS 1.0 allows remote attackers to retrieve arbitrary files via absolute pathnames in (1) the file parameter in /glossaries/index.php, (2) the filename parameter in /readings/index.php, or (3) the filename parameter in /multiplechoice/resultsignore.php, as demonstrated using /etc/passwd.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107712123305706&amp;w=2">20040218 ZH2004-08SA (security advisory): OWLS 1.0 Remote arbitrary files</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9689" adv="1">9689</ref>
      <ref source="MISC" url="http://www.zone-h.org/en/advisories/read/id=3973/">http://www.zone-h.org/en/advisories/read/id=3973/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15249">owls-file-retrieval(15249)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0304" seq="2004-0304" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in browse_items.asp in WebCortex WebStores 2000 6.0 allows remote attackers to gain unauthorized access and execute arbitrary commands via the Search_Text parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107712159425226&amp;w=2">20040218 WebCortex Webstores2000 version 6.0 multiple security vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/7766" adv="1">7766</ref>
      <ref source="MISC" url="http://www.s-quadra.com/advisories/Adv-20040218.txt">http://www.s-quadra.com/advisories/Adv-20040218.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15253">webstores-browseitems-sql-injection(15253)</ref>
    </refs>
    <vuln_soft>
      <prod name="webstores_2000" vendor="webcortex">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0305" seq="2004-0305" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in error.asp in WebCortex WebStores 2000 6.0 allows remote attackers to execute arbitrary script as other users and steal session IDs via the Message_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107712159425226&amp;w=2">20040218 WebCortex Webstores2000 version 6.0 multiple security vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9693">9693</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15254">webstores-error-xss(15254)</ref>
    </refs>
    <vuln_soft>
      <prod name="webstores_2000" vendor="webcortex">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0306" seq="2004-0306" published="2004-11-23" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS 15600 before 1.3(0) enable TFTP service on UDP port 69 by default, which allows remote attackers to GET or PUT ONS system files on the current active TCC in the /flash0 or /flash1 directories.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" adv="1" patch="1">20040219 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9699" adv="1" patch="1">9699</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15264">cisco-ons-file-upload(15264)</ref>
    </refs>
    <vuln_soft>
      <prod name="optical_networking_systems_software" vendor="cisco">
        <vers num="1.0"/>
        <vers num="4.0(1)"/>
        <vers num="4.0(2)"/>
        <vers num="4.0.0"/>
        <vers num="4.1(0)"/>
        <vers num="4.1(1)"/>
        <vers num="4.1(2)"/>
        <vers num="4.1(3)"/>
        <vers num="4.1.0"/>
        <vers num="4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0307" seq="2004-0307" published="2004-11-23" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), and ONS 15454 SD before 4.1(3) allows remote attackers to cause a denial of service (reset) by not sending the ACK portion of the TCP three-way handshake and sending an invalid response instead.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" adv="1" patch="1">20040219 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9699" adv="1" patch="1">9699</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15265">cisco-ons-ack-dos(15265)</ref>
    </refs>
    <vuln_soft>
      <prod name="optical_networking_systems_software" vendor="cisco">
        <vers num="1.0"/>
        <vers num="4.0(1)"/>
        <vers num="4.0(2)"/>
        <vers num="4.0.0"/>
        <vers num="4.1(0)"/>
        <vers num="4.1(1)"/>
        <vers num="4.1(2)"/>
        <vers num="4.1(3)"/>
        <vers num="4.1.0"/>
        <vers num="4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0308" seq="2004-0308" published="2004-11-24" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and Cisco ONS15600 before 1.3(0) allows a superuser whose account is locked out, disabled, or suspended to gain unauthorized access via a Telnet connection to the VxWorks shell.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml" adv="1" patch="1">20040219 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9699" adv="1" patch="1">9699</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15266">cisco-ons-gain-access(15266)</ref>
    </refs>
    <vuln_soft>
      <prod name="optical_networking_systems_software" vendor="cisco">
        <vers num="1.0"/>
        <vers num="4.0(1)"/>
        <vers num="4.0(2)"/>
        <vers num="4.0.0"/>
        <vers num="4.1(0)"/>
        <vers num="4.1(1)"/>
        <vers num="4.1(2)"/>
        <vers num="4.1(3)"/>
        <vers num="4.1.0"/>
        <vers num="4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0309" seq="2004-0309" published="2004-11-23" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://download.zonelabs.com/bin/free/securityAlert/8.html">http://download.zonelabs.com/bin/free/securityAlert/8.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107722656827427&amp;w=2">20040219 EEYE: ZoneLabs SMTP Processing Buffer Overflow</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-084.shtml">O-084</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/619982" adv="1">VU#619982</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9696" adv="1">9696</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14991">zonelabs-multiple-products-bo(14991)</ref>
    </refs>
    <vuln_soft>
      <prod name="integrity" vendor="zonelabs">
        <vers num="4.0"/>
      </prod>
      <prod name="zonealarm" vendor="zonelabs">
        <vers num="4.0" edition=":plus"/>
        <vers num="4.0" edition=":pro"/>
        <vers num="4.5" edition=":pro"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0310" seq="2004-0310" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in LiveJournal 1.0 and 1.1 allows remote attackers to execute Javascript as other users via the stylesheet, which does not strip the semicolon or parentheses, as demonstrated using a background:url.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107722627800820&amp;w=2">20040219 LiveJournal XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9700">9700</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15268">livejournal-url-xss(15268)</ref>
    </refs>
    <vuln_soft>
      <prod name="livejournal" vendor="livejournal">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0311" seq="2004-0311" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">American Power Conversion (APC) Web/SNMP Management SmartSlot Card 3.0 through 3.0.3 and 3.21 are shipped with a default password of TENmanUFactOryPOWER, which allows remote attackers to gain unauthorized access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107703696631367&amp;w=2">20040216 APC 9606 SmartSlot Web/SNMP management card "backdoor"</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107721020803565&amp;w=2">20040219 Re: Fw: APC 9606 SmartSlot Web/SNMP management card "backdoor"</ref>
      <ref source="CONFIRM" url="http://nam-en.apc.com/cgi-bin/nam_en.cfg/php/enduser/std_adp.php?p_faqid=3131&amp;p_created=1077139129">http://nam-en.apc.com/cgi-bin/nam_en.cfg/php/enduser/std_adp.php?p_faqid=3131&amp;p_created=1077139129</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9681" adv="1" patch="1">9681</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15238">apc-smartslot-default-password(15238)</ref>
    </refs>
    <vuln_soft>
      <prod name="ap9606" vendor="apc">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0312" seq="2004-0312" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Linksys WAP55AG 1.07 allows remote attackers with access to an SNMP read only community string to gain access to read/write communtiy strings via a query for OID 1.3.6.1.4.1.3955.2.1.13.1.2.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107712101324233&amp;w=2">20040217 SNMP community string disclosure in Linksys WAP55AG</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107730681012131&amp;w=2">20040219 Re: SNMP community string disclosure in Linksys WAP55AG</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9688" adv="1">9688</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15257">linksys-snmp-strings-disclosure(15257)</ref>
    </refs>
    <vuln_soft>
      <prod name="wap55ag" vendor="linksys">
        <vers num="1.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0313" seq="2004-0313" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in PSOProxy 0.91 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long HTTP request, as demonstrated using a long (1) GET argument or (2) method name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107730731900261&amp;w=2">20040220 Remote Buffer Overflow in PSOProxy 0.91</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9706" adv="1">9706</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15275">psoproxy-long-get-bo(15275)</ref>
    </refs>
    <vuln_soft>
      <prod name="psoproxy_server" vendor="psoproxy">
        <vers num="0.91"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0314" seq="2004-0314" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in done.jsp in WebzEdit 1.9 and earlier allows remote attackers to execute arbitrary script as other users via the message parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107757029514146&amp;w=2">20040221 Cross Site Scripting in WebzEdit</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15289">webzedit-done-xss(15289)</ref>
    </refs>
    <vuln_soft>
      <prod name="webzedit" vendor="freewebs">
        <vers num="1.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0315" seq="2004-0315" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Avirt Voice 4.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long GET request on port 1080.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107756584609841&amp;w=2">20040223 Remote Buffer Overflow in Avirt Voice 4.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9721" adv="1">9721</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15288">avirt-voice-get-bo(15288)</ref>
    </refs>
    <vuln_soft>
      <prod name="voice" vendor="avirt">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0316" seq="2004-0316" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Avirt Soho 4.3 allows remote attackers to cause a denial of service (crash) via (1) a large GET request to port 1080 or (2) a large GET request of % characters to port 8080.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107756666701194&amp;w=2">20030223 Multiple Remote Buffer Overflow in Avirt Soho 4.3</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9722" adv="1">9722</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9723" adv="1">9723</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15286">avirt-soho-multiple-bo(15286)</ref>
    </refs>
    <vuln_soft>
      <prod name="avirt_soho" vendor="avirt">
        <vers num="4.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0317" seq="2004-0317" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in eauth in Load Sharing Facility 4.x, 5.x, and 6.x allows local users or remote attackers within the LSF cluster to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long LSF_From_PC parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107756611501236&amp;w=2">20040223 Lam3rZ Security Advisory #1/2004: LSF eauth vulnerability leads to remote code execution</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9719" adv="1" patch="1">9719</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15282">lsf-eauth-execute-code(15282)</ref>
    </refs>
    <vuln_soft>
      <prod name="lsf" vendor="platform">
        <vers num="4.0"/>
        <vers num="4.2"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0318" seq="2004-0318" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Load Sharing Facility (LSF) 4.x, 5.x, and 6.x uses the LSF_EAUTH_UID environment variable, if it exists, instead of the real UID of the user, which could allow remote attackers within the local cluster to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107756600403557&amp;w=2">20040223 Lam3rZ Security Advisory #2/2004: LSF eauth vulnerability leads to a possibility of controlling cluster jobs on behalf of other users</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9724" adv="1" patch="1">9724</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15278">lsf-eauth-process-hijack(15278)</ref>
    </refs>
    <vuln_soft>
      <prod name="lsf" vendor="platform">
        <vers num="4.0"/>
        <vers num="4.2"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0319" seq="2004-0319" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the font tag in ezBoard 7.3u allows remote attackers to execute arbitrary script as other users, as demonstrated using the background:url in a (1) font color or (2) font face argument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107756639427140&amp;w=2">20040223 ezBoard Cross Site Scripting Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9725">9725</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15287">ezboard-font-xss(15287)</ref>
    </refs>
    <vuln_soft>
      <prod name="ezboard" vendor="ezboard">
        <vers num="7.3u"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0320" seq="2004-0320" published="2004-11-23" modified="2017-10-09" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in nCipher Hardware Security Modules (HSM) 1.67.x through 1.99.x allows local users to access secrets stored in the module's run-time memory via certain sequences of commands.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107755899018249&amp;w=2">20040223 nCipher Advisory #9: Host-side attackers can access secret data</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9717" adv="1">9717</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15281">ncipher-hsm-obtain-info(15281)</ref>
    </refs>
    <vuln_soft>
      <prod name="nshield" vendor="ncipher">
        <vers num="1.71.11"/>
        <vers num="1.71.15"/>
        <vers num="1.71.90"/>
        <vers num="1.75.15"/>
        <vers num="1.77.9"/>
        <vers num="1.77.93"/>
        <vers num="1.77.97"/>
        <vers num="1.79.12"/>
        <vers num="1.79.80"/>
        <vers num="1.79.81"/>
        <vers num="2.0"/>
        <vers num="2.0.4"/>
        <vers num="2.12"/>
        <vers num="2.12.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0321" seq="2004-0321" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Team Factor 1.25 and earlier allows remote attackers to cause a denial of service (crash) via a packet that uses a negative number to specify the size of the data block that follows, which causes Team Factor to read unallocated memory.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107756001412888&amp;w=2">20040223 Remote server crash in Team Factor &lt;= 1.25</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9708" adv="1">9708</ref>
      <ref source="MISC" url="http://www.zone-h.org/advisories/read/id=4006">http://www.zone-h.org/advisories/read/id=4006</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15274">teamfactor-packet-dos(15274)</ref>
    </refs>
    <vuln_soft>
      <prod name="team_factor" vendor="singularity_software">
        <vers num="1.25"/>
        <vers num="1.25m"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0322" seq="2004-0322" published="2004-02-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in XMB 1.8 Final SP2 allow remote attackers to execute arbitrary script as other users via the (1) member parameter in member.php, (2) uid parameter in u2uadmin.php, (3) user parameter in editprofile.php, (4) an onmouseover event in an align tag when bbcode is allowed, or (5) img tag where bbcode is allowed.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-02/0645.html">20040225 Re: [waraxe-2004-SA#004] - Multiple vulnerabilities in XMB 1.8 Partagium Final SP2</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107756526625179&amp;w=2">20040223 [waraxe-2004-SA#004] - Multiple vulnerabilities in XMB 1.8 Partagium Final SP2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9726" adv="1" patch="1">9726</ref>
      <ref source="CONFIRM" url="http://www.xmbforum.com/community/boards/viewthread.php?tid=746859">http://www.xmbforum.com/community/boards/viewthread.php?tid=746859</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15292">xmb-multiple-scripts-xss(15292)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15294">xmb-bbcode-execute-code(15294)</ref>
    </refs>
    <vuln_soft>
      <prod name="xmb" vendor="xmb_forum">
        <vers num="1.8"/>
        <vers num="1.8_sp1"/>
        <vers num="1.8_sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0323" seq="2004-0323" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in XMB 1.8 Final SP2 allow remote attackers to inject arbitrary SQL and gain privileges via the (1) ppp parameter in viewthread.php, (2) desc parameter in misc.php, (3) tpp parameter in forumdisplay.php, (4) ascdesc parameter in forumdisplay.php, or (5) the addon parameter in stats.php.  NOTE: it has also been shown that item (3) is also in XMB 1.9 beta.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-02/0645.html">20040225 Re: [waraxe-2004-SA#004] - Multiple vulnerabilities in XMB 1.8 Partagium Final SP2</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0265.html">20040326 [waraxe-2004-SA#012 - Multiple vulnerabilities in XMB Forum 1.8 SP3 and 1.9 beta]</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107756526625179&amp;w=2">20040223 [waraxe-2004-SA#004] - Multiple vulnerabilities in XMB 1.8 Partagium Final SP2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9726" patch="1">9726</ref>
      <ref source="CONFIRM" url="http://www.xmbforum.com/community/boards/viewthread.php?tid=746859">http://www.xmbforum.com/community/boards/viewthread.php?tid=746859</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15295">xmb-multiple-sql-injection(15295)</ref>
    </refs>
    <vuln_soft>
      <prod name="xmb" vendor="xmb_forum">
        <vers num="1.8"/>
        <vers num="1.8_sp1"/>
        <vers num="1.8_sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0324" seq="2004-0324" published="2004-02-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Confirm 0.62 and earlier could allow remote attackers to execute arbitrary code via an e-mail header that contains shell metacharacters such as ", `, |, ;, or $.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107757320401858&amp;w=2">20040223 Lam3rZ Security Advisory #3/2004: A bug in Confirm leads to remote command execution</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9728" adv="1" patch="1">9728</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15290">confirm-header-gain-access(15290)</ref>
    </refs>
    <vuln_soft>
      <prod name="confirm" vendor="confirm">
        <vers num="0.50"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.55"/>
        <vers num="0.60"/>
        <vers num="0.61"/>
        <vers num="0.62"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0325" seq="2004-0325" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">TYPSoft FTP Server 1.10 allows remote authenticated users to cause a denial of service (CPU consumption) via "//../" arguments to (1) mkd, (2) xmkd, (3) dele, (4) size, (5) retr, (6) stor, (7) appe, (8) rnfr, (9) rnto, (10) rmd, or (11) xrmd, as demonstrated using "//../qwerty".</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107764173821905&amp;w=2">20040223 TYPSoft FTP Server 1.10 multiple vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9702">9702</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15306">typsoft-ftp-command-dos(15306)</ref>
    </refs>
    <vuln_soft>
      <prod name="typsoft_ftp_server" vendor="typsoft">
        <vers num="1.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0326" seq="2004-0326" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the web proxy for GateKeeper Pro 4.7 allows remote attackers to execute arbitrary code via a long GET request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/017703.html">20040222 GateKeeper Pro 4.7 buffer overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107755692400728&amp;w=2">20040222 GateKeeper Pro 4.7 buffer overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9716" adv="1">9716</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15277">gatekeeper-long-get-bo(15277)</ref>
    </refs>
    <vuln_soft>
      <prod name="professional_gatekeeper" vendor="proxy-pro">
        <vers num="4.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0327" seq="2004-0327" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in functions.php in PhpNewsManager 1.46 allows remote attackers to retrieve arbitrary files via ..  (dot dot) sequences in the clang parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107772470111000&amp;w=2">20040223 ZH2004-09SA (security advisory): PhpNewsManager Remote arbitrary</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9720" adv="1">9720</ref>
      <ref source="MISC" url="http://www.zone-h.org/advisories/read/id=4024">http://www.zone-h.org/advisories/read/id=4024</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15283">phpnewsmanager-dotdot-directory-traversal(15283)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpnewsmanager" vendor="skintech">
        <vers num="1.36"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0328" seq="2004-0328" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Gigabyte Gn-B46B 2.4Ghz wireless broadband router firmware 1.003.00 allows local users on the same local network as the router to bypass authentication by using a copy of the router's html menu on a separate system.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107766719227942&amp;w=2">20040224 Gigabyte Broadband Router  - Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9740" adv="1">9740</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15313">gigabyte-gnb46b-bypass-authentication(15313)</ref>
    </refs>
    <vuln_soft>
      <prod name="gn-b46b" vendor="gigabyte">
        <vers num="1.003.00"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0329" seq="2004-0329" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">FreeChat 1.1.1a allows remote attackers to cause a denial of service (crash) via certain unexpected strings, as demonstrated using "aaaaa".</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107781043621074&amp;w=2">20040226 Denial Of Service in FreeChat 1.1.1a</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9744" adv="1">9744</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15321">freechat-string-dos(15321)</ref>
    </refs>
    <vuln_soft>
      <prod name="freechat" vendor="freechat">
        <vers num="0.1.1a"/>
        <vers num="1.1.1a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0330" seq="2004-0330" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Serv-U ftp before 5.0.0.4 allows remote authenticated users to execute arbitrary code via a long time zone argument to the MDTM command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107781164214399&amp;w=2">20040226 [vulnwatch] Serv-U MDTM Command Buffer Overflow Vulnerability</ref>
      <ref source="MISC" url="http://www.cnhonker.com/advisory/serv-u.mdtm.txt">http://www.cnhonker.com/advisory/serv-u.mdtm.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9751" adv="1">9751</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15323">servu-mdtm-bo(15323)</ref>
    </refs>
    <vuln_soft>
      <prod name="serv-u" vendor="serv-u">
        <vers num="3.0.0.16"/>
        <vers num="3.0.0.17"/>
        <vers num="3.1.0.0"/>
        <vers num="3.1.0.1"/>
        <vers num="3.1.0.3"/>
        <vers num="4.0.0.4"/>
        <vers num="4.1.0.0"/>
        <vers num="4.1.0.3"/>
        <vers num="5.0.0.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0331" seq="2004-0331" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Dell OpenManage Web Server 3.4.0 allows remote attackers to cause a denial of service (crash) via a HTTP POST with a long application variable.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107781539829143&amp;w=2">20040226  Dell OpenManage Web Server Heap Overflow (Pre-Auth)</ref>
      <ref source="MISC" url="http://sh0dan.org/files/domadv.txt">http://sh0dan.org/files/domadv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9750" adv="1" patch="1">9750</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15325">dell-openmanage-ocsgetoeminpathfile-bo(15325)</ref>
    </refs>
    <vuln_soft>
      <prod name="openmanage" vendor="dell">
        <vers num="3.2"/>
        <vers num="3.4"/>
        <vers num="3.7"/>
        <vers num="3.7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0332" seq="2004-0332" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Extremail 1.5.9 does not check passwords correctly when they are all digits or begin with a digit, which allows remote attackers to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107783767517850&amp;w=2">20040226 Extremail Security Problem</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9754" adv="1">9754</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15329">extremail-password-gain-access(15329)</ref>
    </refs>
    <vuln_soft>
      <prod name="extremail" vendor="extremail">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.1.5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="1.1.9"/>
        <vers num="1.1.10"/>
        <vers num="1.5"/>
        <vers num="1.5.5"/>
        <vers num="1.5.8"/>
        <vers num="1.5.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0333" seq="2004-0333" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the UUDeview package, as used in WinZip 6.2 through WinZip 8.1 SR-1, and possibly other packages, allows remote attackers to execute arbitrary code via a MIME archive with certain long MIME parameters.</descript>
    </desc>
    <sols>
      <sol source="nvd">This was fixed in WinZip 8.1 SR-2 in March of 2004. You can find more information on the subject on the following pages of the winzip site:
http://www.winzip.com/wz81sr2.htm
http://www.winzip.com/fmwz90.htm</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-092.shtml">O-092</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=76&amp;type=vulnerabiliti&amp;flashstatus=true">20040227 WinZip MIME Parsing Buffer Overflow Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/116182" adv="1">VU#116182</ref>
      <ref source="CONFIRM" url="http://www.openpkg.org/security/OpenPKG-SA-2004.006-uudeview.html">http://www.openpkg.org/security/OpenPKG-SA-2004.006-uudeview.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9758" adv="1" patch="1">9758</ref>
      <ref source="CONFIRM" url="http://www.winzip.com/fmwz90.htm">http://www.winzip.com/fmwz90.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15336">winzip-mime-bo(15336)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15490">uudeview-multiple-bo(15490)</ref>
    </refs>
    <vuln_soft>
      <prod name="openpkg" vendor="openpkg">
        <vers num=""/>
      </prod>
      <prod name="uudeview" vendor="uudeview">
        <vers num="0.5.18"/>
        <vers num="0.5.19"/>
      </prod>
      <prod name="winzip" vendor="winzip">
        <vers num="7.0"/>
        <vers num="8.0"/>
        <vers num="8.1" edition="sr1"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4" edition="rc1"/>
        <vers num="1.4" edition="rc2"/>
        <vers num="1.4" edition="rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0334" seq="2004-0334" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">InnoMedia VideoPhone allows remote attackers to bypass Basic Authorization via an HTTP request to (1) videophone_admindetail.asp, (2) videophone_syscfg.asp, (3) videophone_upgrade.asp, or (4) videophone_sysctrl.asp that contains a trailing / (slash).  NOTE: the original report mentioned AXIS 2100 Network Camera, but this was likely a cut-and-paste error.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107799556111784&amp;w=2">20040227 InnoMedia VideoPhone Authorization Bypass</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Mar/1009522.html">1009522</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15636">InnoMedia-videophone-bypass-authentication(15636)</ref>
    </refs>
    <vuln_soft>
      <prod name="innomedia_videophone" vendor="innomedia">
        <vers num="au75200xvi04010x"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0335" seq="2004-0335" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">LAN SUITE Web Mail 602Pro, when configured to use the "Directory browsing" feature, allows remote attackers to obtain a directory listing via an HTTP request to (1) index.html, (2) cgi-bin/, or (3) users/.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0096.html">20040310 Re: LAN SUITE Web Mail 602Pro Multiple Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107799540630302&amp;w=2">20040228 LAN SUITE Web Mail 602Pro Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9780">9780</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15349">602pro-directory-listing(15349)</ref>
    </refs>
    <vuln_soft>
      <prod name="602pro_lan_suite" vendor="software602">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0336" seq="2004-0336" published="2004-11-23" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">LAN SUITE Web Mail 602Pro allows remote attackers to gain sensitive information via the mail login form, which contains the path to the mail directory.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0096.html">20040310 Re: LAN SUITE Web Mail 602Pro Multiple Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107799540630302&amp;w=2">20040228 LAN SUITE Web Mail 602Pro Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9781" adv="1">9781</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15350">602pro-path-disclosure(15350)</ref>
    </refs>
    <vuln_soft>
      <prod name="602pro_lan_suite" vendor="software602">
        <vers num="2002"/>
        <vers num="2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0337" seq="2004-0337" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in LAN SUITE Web Mail 602Pro allows remote attackers to execute arbitrary script or HTML as other users via a URL to index.html, followed by a / (slash) and the desired script.  NOTE: the vendor states that this bug could not be reproduced, so this issue may be REJECTed in the future.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0096.html">20040310 Re: LAN SUITE Web Mail 602Pro Multiple Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107799540630302&amp;w=2">20040228 LAN SUITE Web Mail 602Pro Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9777">9777</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15351">602pro-index-xss(15351)</ref>
    </refs>
    <vuln_soft>
      <prod name="602pro_lan_suite" vendor="software602">
        <vers num="2002"/>
        <vers num="2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0338" seq="2004-0338" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in search.php for Invision Board Forum allows remote attackers to execute arbitrary SQL queries via the st parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107799527428834&amp;w=2">20040228 Invision Power Board SQL injection!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9766">9766</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15343">invision-search-sql-injection(15343)</ref>
    </refs>
    <vuln_soft>
      <prod name="invision_board" vendor="invision_power_services">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="2.0_alpha_3"/>
        <vers num="2.0_pdr3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0339" seq="2004-0339" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in ViewTopic.php in phpBB, possibly 2.0.6c and earlier, allows remote attackers to execute arbitrary script or HTML as other users via the postorder parameter.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product release:
phpBB Group, phpBB, 2.0.7</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107799508130700&amp;w=2">20040228 New phpBB ViewTopic.php Cross Site Scripting Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9765" patch="1">9765</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15348">phpbb-viewtopicphp-xss(15348)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb_group">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.6c"/>
        <vers num="2.0_rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0340" seq="2004-0340" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in WFTPD Pro Server 3.21 Release 1, Pro Server 3.20 Release 2, Server 3.21 Release 1, and Server 3.10 allows local users to execute arbitrary code via long (1) LIST, (2) NLST, or (3) STAT commands.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107801208004699&amp;w=2">20040228 Critical WFTPD buffer overflow vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9767" adv="1" patch="1">9767</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15340">wftpd-ftp-commands-bo(15340)</ref>
    </refs>
    <vuln_soft>
      <prod name="wftpd" vendor="texas_imperial_software">
        <vers num="3.0" edition=":pro"/>
        <vers num="3.0_0r3"/>
        <vers num="3.0_0r4" edition=":pro"/>
        <vers num="3.0_0r5" edition=":pro"/>
        <vers num="3.10_r1"/>
        <vers num="3.20"/>
        <vers num="3.21"/>
        <vers num="pro_3.10_r1"/>
        <vers num="pro_3.20"/>
        <vers num="pro_3.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0341" seq="2004-0341" published="2004-11-23" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">WFTPD Pro Server 3.21 Release 1 allocates memory for a command until a 0Ah byte (newline) is sent, which allows local users to cause a denial of service (CPU consumption) by continuing to send a long command that does not contain a newline.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107801142924976&amp;w=2">20040228 Multiple WFTPD Denial of Service vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9767" adv="1" patch="1">9767</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15341">wftpd-string-0Ahbyte-dos(15341)</ref>
    </refs>
    <vuln_soft>
      <prod name="wftpd" vendor="texas_imperial_software">
        <vers num="3.0" edition=":pro"/>
        <vers num="3.0_0r3"/>
        <vers num="3.0_0r4" edition=":pro"/>
        <vers num="3.0_0r5" edition=":pro"/>
        <vers num="3.10_r1"/>
        <vers num="3.20"/>
        <vers num="3.21"/>
        <vers num="pro_3.10_r1"/>
        <vers num="pro_3.20"/>
        <vers num="pro_3.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0342" seq="2004-0342" published="2004-11-23" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">WFTPD Pro Server 3.21 Release 1, with the XeroxDocutech option enabled, allows local users to cause a denial of service (crash) via a (1) MKD or (2) XMKD command that causes an absolute path of 260 characters to be used, which overwrites a cookie with a null character, possibly due to an off-by-one error.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107801142924976&amp;w=2">20040228 Multiple WFTPD Denial of Service vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9767" adv="1" patch="1">9767</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15342">wftpd-ftp-command-dos(15342)</ref>
    </refs>
    <vuln_soft>
      <prod name="wftpd" vendor="texas_imperial_software">
        <vers num="3.0" edition=":pro"/>
        <vers num="3.0_0r3"/>
        <vers num="3.0_0r4" edition=":pro"/>
        <vers num="3.0_0r5" edition=":pro"/>
        <vers num="3.10_r1"/>
        <vers num="3.20"/>
        <vers num="3.21"/>
        <vers num="pro_3.10_r1"/>
        <vers num="pro_3.20"/>
        <vers num="pro_3.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0343" seq="2004-0343" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in YaBB SE 1.5.4 through 1.5.5b allow remote attackers to execute arbitrary SQL via (1) the msg parameter in ModifyMessage.php or (2) the postid parameter in ModifyMessage.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107816202813083&amp;w=2">20040301 YabbSE  (3 on 1)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9774" adv="1" patch="1">9774</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15354">yabb-multiple-sql-injection(15354)</ref>
    </refs>
    <vuln_soft>
      <prod name="yabb" vendor="yabb">
        <vers num="1.5.4" edition=":second_edition"/>
        <vers num="1.5.5" edition=":second_edition"/>
        <vers num="1.5.5b" edition=":second_edition"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0344" seq="2004-0344" published="2004-11-23" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in ModifyMessage.php in YaBB SE 1.5.4 through 1.5.5b allows remote attackers to delete arbitrary files via a .. (dot dot) in the attachOld parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107816202813083&amp;w=2">20040301 YabbSE  (3 on 1)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9774" adv="1" patch="1">9774</ref>
    </refs>
    <vuln_soft>
      <prod name="yabb" vendor="yabb">
        <vers num="1.5.5" edition=":second_edition"/>
        <vers num="1.5.5b" edition=":second_edition"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0345" seq="2004-0345" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Red Faction client 1.20 and earlier allows remote servers to execute arbitrary code via a long server name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107816217901923&amp;w=2">20040301 Clients broadcast buffer overflow in Red Faction &lt;= 1.20</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9775" adv="1">9775</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15353">redfaction-bo(15353)</ref>
    </refs>
    <vuln_soft>
      <prod name="red_faction" vendor="volition">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.20"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0346" seq="2004-0346" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Off-by-one buffer overflow in _xlate_ascii_write() in ProFTPD 1.2.7 through 1.2.9rc2p allows local users to gain privileges via a 1024 byte RETR command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107824679817240&amp;w=2">20040302 The Cult of a Cardinal Number</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9782" adv="1">9782</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15387">proftpd-offbyone-bo(15387)</ref>
    </refs>
    <vuln_soft>
      <prod name="proftpd" vendor="proftpd_project">
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9_rc1"/>
        <vers num="1.2.9_rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0347" seq="2004-0347" published="2004-11-23" modified="2017-10-09" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in delhomepage.cgi in NetScreen-SA 5000 Series running firmware 3.3 Patch 1 (build 4797) allows remote authenticated users to execute arbitrary script as other users via the row parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018120.html">20040302 03-02-04 XSS Bug in NetScreen-SA 5000 Series of SSL VPN appliance</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107826362024112&amp;w=2">20040302 03-02-04 XSS Bug in NetScreen-SA 5000 Series of SSL VPN appliance</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107850564102190&amp;w=2">20040304 NetScreen Advisory 58412: XSS Bug in NetScreen-SA SSL VPN</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/114070">VU#114070</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9791" patch="1">9791</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15368">netscreen-delhomepagecgi-xss(15368)</ref>
    </refs>
    <vuln_soft>
      <prod name="netscreen-sa_5000_series" vendor="netscreen">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0348" seq="2004-0348" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in viewCart.asp in SpiderSales shopping cart software allows remote attackers to execute arbitrary SQL via the userId parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107833097705486&amp;w=2">20040303 Spider Sales shopping cart software multiple security vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9799" adv="1">9799</ref>
      <ref source="MISC" url="http://www.s-quadra.com/advisories/Adv-20040303.txt">http://www.s-quadra.com/advisories/Adv-20040303.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15371">spidersales-userid-sql-injection(15371)</ref>
    </refs>
    <vuln_soft>
      <prod name="spidersales" vendor="spidersales">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0349" seq="2004-0349" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in GWeb HTTP Server 0.6 allows remote attackers to view arbitrary files via a .. (dot dot) in the URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107833161617397&amp;w=2">20040303 directory traversal in GWeb 0.6</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9742" adv="1">9742</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15381">gweb-dotdot-directory-traversal(15381)</ref>
    </refs>
    <vuln_soft>
      <prod name="gweb_http_server" vendor="gweb">
        <vers num="0.5"/>
        <vers num="0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0350" seq="2004-0350" published="2004-11-23" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">SpiderSales shopping cart does not enforce a minimum length for the private key, which can make it easier for local users to obtain the private key by factoring.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018177.html">20040303 Spider Sales shopping cart software multiple security vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107833097705486&amp;w=2">20040303 Spider Sales shopping cart software multiple security vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9799" adv="1">9799</ref>
      <ref source="MISC" url="http://www.s-quadra.com/advisories/Adv-20040303.txt">http://www.s-quadra.com/advisories/Adv-20040303.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15370">spidersales-weak-encryption(15370)</ref>
    </refs>
    <vuln_soft>
      <prod name="spidersales" vendor="spidersales">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0351" seq="2004-0351" published="2004-11-23" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Spider Sales shopping cart stores the private key in the same database and table as the public key, which allows local users with access to the database to decrypt data.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018177.html">20040303 Spider Sales shopping cart software multiple security vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107833097705486&amp;w=2">20040303 Spider Sales shopping cart software multiple security vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9799" adv="1">9799</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15370">spidersales-weak-encryption(15370)</ref>
    </refs>
    <vuln_soft>
      <prod name="spidersales" vendor="spidersales">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0352" seq="2004-0352" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Cisco 11000 Series Content Services Switches (CSS) running WebNS 5.0(x) before 05.0(04.07)S, and 6.10(x) before 06.10(02.05)S allow remote attackers to cause a denial of service (device reset) via a malformed packet to UDP port 5002.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040304-css.shtml" adv="1" patch="1">20040304 Cisco CSS 11000 Series Content Services Switches Malformed UDP Packet Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/363374" adv="1">VU#363374</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9806" adv="1" patch="1">9806</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15388">cisco-css-udp-dos(15388)</ref>
    </refs>
    <vuln_soft>
      <prod name="content_services_switch_11000" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="content_services_switch_11050" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="content_services_switch_11150" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="content_services_switch_11800" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0353" seq="2004-0353" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in auth_ident() function in auth.c for GNU Anubis 3.6.0 through 3.6.2, 3.9.92 and 3.9.93 allow remote attackers to gain privileges via a long string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://mail.gnu.org/archive/html/bug-anubis/2004-02/msg00000.html">[bug-anubis] 20040228 Important security update</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107843915424588&amp;w=2">20040304 GNU Anubis buffer overflows and format string bugs</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107894315012081&amp;w=2">20040310 GNU Anubis 3.6.2 remote root exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9772" adv="1" patch="1">9772</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15345">anubis-ident-bo(15345)</ref>
    </refs>
    <vuln_soft>
      <prod name="anubis" vendor="gnu">
        <vers num="3.6.0"/>
        <vers num="3.6.1"/>
        <vers num="3.6.2"/>
        <vers num="3.9.92"/>
        <vers num="3.9.93"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0354" seq="2004-0354" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple format string vulnerabilities in GNU Anubis 3.6.0 through 3.6.2, 3.9.92 and 3.9.93 allow remote attackers to execute arbitrary code via format string specifiers in strings passed to (1) the info function in log.c, (2) the anubis_error function in errs.c, or (3) the ssl_error function in ssl.c.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://mail.gnu.org/archive/html/bug-anubis/2004-02/msg00000.html">[bug-anubis] 20040228 Important security update</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107843915424588&amp;w=2">20040304 GNU Anubis buffer overflows and format string bugs</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9772" adv="1" patch="1">9772</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15346">anubis-format-string(15346)</ref>
    </refs>
    <vuln_soft>
      <prod name="anubis" vendor="gnu">
        <vers num="3.6.0"/>
        <vers num="3.6.1"/>
        <vers num="3.6.2"/>
        <vers num="3.9.92"/>
        <vers num="3.9.93"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0355" seq="2004-0355" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Invision Power Board 1.3 Final allows remote attackers to gain sensitive information by selecting a file for "Personal Photo" that is not an image file, which displays the installation path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107850510428567&amp;w=2">20040305 Invision Power Board 1.3 Final Path Disclosure Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9810" adv="1">9810</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15400">invision-invalid-path-disclosure(15400)</ref>
    </refs>
    <vuln_soft>
      <prod name="invision_board" vendor="invision_power_services">
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0356" seq="2004-0356" published="2004-11-23" modified="2017-10-09" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Supervisor Report Center in SL Mail Pro 2.0.9 and earlier allows remote attackers to execute arbitrary code via an HTTP request with a long HTTP sub-version.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://216.26.170.92/Download/webfiles/Patches/SLMPPatch-2.0.14.pdf">http://216.26.170.92/Download/webfiles/Patches/SLMPPatch-2.0.14.pdf</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107850488326232&amp;w=2">20040305 SLMail Pro Supervisor Report Center Buffer Overflow (#NISR05022004a)</ref>
      <ref source="MISC" url="http://www.nextgenss.com/advisories/slmailsrc.txt">http://www.nextgenss.com/advisories/slmailsrc.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9809" adv="1">9809</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15398">slmail-src-stack-bo(15398)</ref>
    </refs>
    <vuln_soft>
      <prod name="slmail_pro" vendor="seattle_lab_software">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0357" seq="2004-0357" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflows in SL Mail Pro 2.0.9 allow remote attackers to execute arbitrary code via (1) user.dll, (2) loadpageadmin.dll or (3) loadpageuser.dll.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://216.26.170.92/Download/webfiles/Patches/SLMPPatch-2.0.14.pdf">http://216.26.170.92/Download/webfiles/Patches/SLMPPatch-2.0.14.pdf</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107850432827699&amp;w=2">20040305 SLWebMail Multiple Buffer Overflow Vulnerabilities (#NISR05022004b)</ref>
      <ref source="MISC" url="http://www.nextgenss.com/advisories/slmailwm.txt">http://www.nextgenss.com/advisories/slmailwm.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9808" adv="1" patch="1">9808</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15399">slmail-slwebmail-bo(15399)</ref>
    </refs>
    <vuln_soft>
      <prod name="slmail_pro" vendor="seattle_lab_software">
        <vers num="2.0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0358" seq="2004-0358" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in VirtuaNews Admin Panel Pro 1.0.3 allows remote attackers to execute arbitrary script as other users via (1) the mainnews parameter in admin.php, (2) the expand parameter in admin.php, (3) the id parameter in admin.php, (4) the catid parameter in admin.php, or (5) an unnamed parameter during the newslogo_upload action in admin.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0069.html">20040307 RE: VirtuaNews Admin Panel 1.0.3 Pro Cross Site Scripting Vulnerabillity</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107851556116088&amp;w=2">20040305 VirtuaNews Admin Panel 1.0.3 Pro Cross Site Scripting Vulnerabillity</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9812">9812</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9819">9819</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15402">virtuanews-multiple-xss(15402)</ref>
    </refs>
    <vuln_soft>
      <prod name="virtuanews_pro" vendor="virtuasystems">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0359" seq="2004-0359" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php for Invision Power Board 1.3 final allows remote attackers to execute arbitrary script as other users via the (1) c, (2) f, (3) showtopic, (4) showuser, or (5) username parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107851589701916&amp;w=2">20040305 Invision Power Board v1.3 Final Cross Site Scripting Vulnerabillity</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9768">9768</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15403">invision-xss(15403)</ref>
    </refs>
    <vuln_soft>
      <prod name="invision_board" vendor="invision_power_services">
        <vers num="1.3.1_final"/>
        <vers num="1.3_final"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0360" seq="2004-0360" published="2004-11-23" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in passwd(1) in Solaris 8.0 and 9.0 allows local users to gain privileges via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107852274423414&amp;w=2">200470305 O-088: Sun passwd(1) Command Vulnerability</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57454">57454</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-088.shtml">O-088</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/694782" adv="1">VU#694782</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9757" adv="1" patch="1">9757</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15327">solaris-passwd-gain-privileges(15327)</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0361" seq="2004-0361" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Javascript engine in Safari 1.2 and earlier allows remote attackers to cause a denial of service (segmentation fault) by creating a new Array object with a large size value, then writing into that array.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107861828510106&amp;w=2">20040306 Safari javascript array overflow</ref>
      <ref source="MISC" url="http://www.insecure.ws/article.php?story=2004021918172533">http://www.insecure.ws/article.php?story=2004021918172533</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9815" adv="1">9815</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15413">safari-array-dos(15413)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0362" seq="2004-0362" published="2004-04-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107965651712378&amp;w=2">20040318 EEYE: Internet Security Systems PAM ICQ Server Response Processing Vulnerability</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-104.shtml">O-104</ref>
      <ref source="EEYE" url="http://www.eeye.com/html/Research/Advisories/AD20040318.html">AD20040318</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/947254" adv="1" patch="1">VU#947254</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9913" adv="1" patch="1">9913</ref>
      <ref source="ISS" url="http://xforce.iss.net/xforce/alerts/id/166" adv="1" patch="1">20040318 Vulnerability in ICQ Parsing in ISS Products</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15442">pam-icq-parsing-bo(15442)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15543">witty-worm-propagation(15543)</ref>
    </refs>
    <vuln_soft>
      <prod name="blackice_agent_server" vendor="iss">
        <vers num="3.6ebz"/>
        <vers num="3.6eca"/>
        <vers num="3.6ecb"/>
        <vers num="3.6ecc"/>
        <vers num="3.6ecd"/>
        <vers num="3.6ece"/>
        <vers num="3.6ecf"/>
      </prod>
      <prod name="blackice_pc_protection" vendor="iss">
        <vers num="3.6cbz"/>
        <vers num="3.6cca"/>
        <vers num="3.6ccb"/>
        <vers num="3.6ccc"/>
        <vers num="3.6ccd"/>
        <vers num="3.6cce"/>
        <vers num="3.6ccf"/>
      </prod>
      <prod name="blackice_server_protection" vendor="iss">
        <vers num="3.6cbz"/>
        <vers num="3.6cca"/>
        <vers num="3.6ccb"/>
        <vers num="3.6ccc"/>
        <vers num="3.6ccd"/>
        <vers num="3.6cce"/>
        <vers num="3.6ccf"/>
      </prod>
      <prod name="realsecure_desktop" vendor="iss">
        <vers num="3.6ebz"/>
        <vers num="3.6eca"/>
        <vers num="3.6ecb"/>
        <vers num="3.6ecd"/>
        <vers num="3.6ece"/>
        <vers num="3.6ecf"/>
        <vers num="7.0eba"/>
        <vers num="7.0ebf"/>
        <vers num="7.0ebg"/>
        <vers num="7.0ebh"/>
        <vers num="7.0ebj"/>
        <vers num="7.0ebk"/>
        <vers num="7.0ebl"/>
      </prod>
      <prod name="realsecure_guard" vendor="iss">
        <vers num="3.6ebz"/>
        <vers num="3.6eca"/>
        <vers num="3.6ecb"/>
        <vers num="3.6ecc"/>
        <vers num="3.6ecd"/>
        <vers num="3.6ece"/>
        <vers num="3.6ecf"/>
      </prod>
      <prod name="realsecure_network_sensor" vendor="iss">
        <vers num="7.0" edition="xpu_20.11"/>
        <vers num="7.0" edition="xpu_22.10"/>
        <vers num="7.0" edition="xpu_22.4"/>
        <vers num="7.0" edition="xpu_22.9"/>
      </prod>
      <prod name="realsecure_sentry" vendor="iss">
        <vers num="3.6ebz"/>
        <vers num="3.6eca"/>
        <vers num="3.6ecb"/>
        <vers num="3.6ecc"/>
        <vers num="3.6ecd"/>
        <vers num="3.6ece"/>
        <vers num="3.6ecf"/>
      </prod>
      <prod name="realsecure_server_sensor" vendor="iss">
        <vers num="6.0" edition=":windows"/>
        <vers num="6.0.1" edition=":windows"/>
        <vers num="6.0.1_win_sr1.1"/>
        <vers num="6.5" edition=":windows"/>
        <vers num="6.5" edition="sr3.2:windows"/>
        <vers num="6.5" edition="sr3.3:windows"/>
        <vers num="6.5_win_sr3.1"/>
        <vers num="6.5_win_sr3.4"/>
        <vers num="6.5_win_sr3.5"/>
        <vers num="6.5_win_sr3.6"/>
        <vers num="6.5_win_sr3.7"/>
        <vers num="6.5_win_sr3.8"/>
        <vers num="6.5_win_sr3.9"/>
        <vers num="6.5_win_sr3.10"/>
        <vers num="7.0" edition="xpu22.1"/>
        <vers num="7.0" edition="xpu22.10"/>
        <vers num="7.0" edition="xpu22.11"/>
        <vers num="7.0" edition="xpu22.2"/>
        <vers num="7.0" edition="xpu22.3"/>
        <vers num="7.0" edition="xpu22.4"/>
        <vers num="7.0" edition="xpu22.5"/>
        <vers num="7.0" edition="xpu22.6"/>
        <vers num="7.0" edition="xpu22.7"/>
        <vers num="7.0" edition="xpu22.8"/>
        <vers num="7.0" edition="xpu22.9"/>
      </prod>
      <prod name="proventia_a_series_xpu" vendor="iss">
        <vers num="20.11"/>
        <vers num="22.1"/>
        <vers num="22.2"/>
        <vers num="22.3"/>
        <vers num="22.4"/>
        <vers num="22.5"/>
        <vers num="22.6"/>
        <vers num="22.7"/>
        <vers num="22.8"/>
        <vers num="22.9"/>
        <vers num="22.10"/>
      </prod>
      <prod name="proventia_g_series_xpu" vendor="iss">
        <vers num="22.1"/>
        <vers num="22.2"/>
        <vers num="22.3"/>
        <vers num="22.4"/>
        <vers num="22.5"/>
        <vers num="22.6"/>
        <vers num="22.7"/>
        <vers num="22.8"/>
        <vers num="22.9"/>
        <vers num="22.10"/>
        <vers num="22.11"/>
      </prod>
      <prod name="proventia_m_series_xpu" vendor="iss">
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="1.8"/>
        <vers num="1.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0363" seq="2004-0363" published="2004-04-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the SymSpamHelper ActiveX component (symspam.dll) in Norton AntiSpam 2004, as used in Norton Internet Security 2004, allows remote attackers to execute arbitrary code via a long parameter to the LaunchCustomRuleWizard method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107970870606638&amp;w=2">20040319 Norton AntiSpam Remote Buffer Overrun (#NISR19042004a)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107980262324362&amp;w=2">20040319 Ref: NGSSoftware Advisories NISR19042004a and NISR19042004b</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/344718">VU#344718</ref>
      <ref source="MISC" url="http://www.nextgenss.com/advisories/antispam.txt" adv="1" patch="1">http://www.nextgenss.com/advisories/antispam.txt</ref>
      <ref source="CONFIRM" url="http://www.sarc.com/avcenter/security/Content/2004.03.19.html">http://www.sarc.com/avcenter/security/Content/2004.03.19.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9916" adv="1">9916</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15536">nas-launchcustomrulewizard-bo(15536)</ref>
    </refs>
    <vuln_soft>
      <prod name="norton_antispam" vendor="symantec">
        <vers num="2004"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0364" seq="2004-0364" published="2004-04-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The WrapNISUM ActiveX component (WrapUM.dll) in Norton Internet Security 2004 is marked safe for scripting, which allows remote attackers to execute arbitrary programs via the LaunchURL method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107970885922442&amp;w=2">20040319 Norton Internet Security Remote Command Execution (#NISR19042004b)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107980262324362&amp;w=2">20040319 Ref: NGSSoftware Advisories NISR19042004a and NISR19042004b</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/549054">VU#549054</ref>
      <ref source="MISC" url="http://www.nextgenss.com/advisories/nisrce.txt" adv="1" patch="1">http://www.nextgenss.com/advisories/nisrce.txt</ref>
      <ref source="CONFIRM" url="http://www.sarc.com/avcenter/security/Content/2004.03.19.html">http://www.sarc.com/avcenter/security/Content/2004.03.19.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9915" adv="1">9915</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15538">norton-is-launchurl-command-execution(15538)</ref>
    </refs>
    <vuln_soft>
      <prod name="norton_internet_security" vendor="symantec">
        <vers num="2004" edition=":professional"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0365" seq="2004-0365" published="2004-05-04" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000835">CLA-2004:835</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108058005324316&amp;w=2">20040329 LNSA-#2004-0007: Multiple security problems in Ethereal</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108213710306260&amp;w=2">20040416 [OpenPKG-SA-2004.015] OpenPKG Security Advisory (ethereal)</ref>
      <ref source="MLIST" url="http://marc.info/?l=ethereal-dev&amp;m=107962966700423&amp;w=2">[ethereal-dev] 20040318 ethereal radius dissector vulnerability</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200403-07.xml" adv="1">GLSA-200403-07</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00013.html">http://www.ethereal.com/appnotes/enpa-sa-00013.html</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/124454">VU#124454</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:024">MDKSA-2004:024</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-136.html">RHSA-2004:136</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-137.html">RHSA-2004:137</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15571">ethereal-radius-dos(15571)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A879">oval:org.mitre.oval:def:879</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A891">oval:org.mitre.oval:def:891</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9196">oval:org.mitre.oval:def:9196</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.8.13"/>
        <vers num="0.8.14"/>
        <vers num="0.8.18"/>
        <vers num="0.8.19"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.10"/>
        <vers num="0.9.11"/>
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0366" seq="2004-0366" published="2004-05-04" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the libpam-pgsql library before 0.5.2 allows attackers to execute arbitrary SQL statements.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-469" adv="1" patch="1">DSA-469</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10266">10266</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15651">pam-pgsql-sql-injection(15651)</ref>
    </refs>
    <vuln_soft>
      <prod name="pam-pgsql" vendor="leon_j_breedt">
        <vers num="0.5.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0367" seq="2004-0367" published="2004-05-04" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000835" adv="1">CLA-2004:835</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108058005324316&amp;w=2">20040329 LNSA-#2004-0007: Multiple security problems in Ethereal</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200403-07.xml">GLSA-200403-07</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00013.html">http://www.ethereal.com/appnotes/enpa-sa-00013.html</ref>
      <ref source="MLIST" url="http://www.ethereal.com/lists/ethereal-dev/200404/msg00296.html">[Ethereal-dev] 20040416 Possibly incorrect CVE entry CAN-2004-0367</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/792286">VU#792286</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:024">MDKSA-2004:024</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-136.html">RHSA-2004:136</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-137.html" adv="1" patch="1">RHSA-2004:137</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15570">ethereal-zero-presentation-dos(15570)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11071">oval:org.mitre.oval:def:11071</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A880">oval:org.mitre.oval:def:880</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A905">oval:org.mitre.oval:def:905</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.8.13"/>
        <vers num="0.8.14"/>
        <vers num="0.8.18"/>
        <vers num="0.8.19"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.10"/>
        <vers num="0.9.11"/>
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0368" seq="2004-0368" published="2004-05-04" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Double free vulnerability in dtlogin in CDE on Solaris, HP-UX, and other operating systems allows remote attackers to execute arbitrary code via a crafted XDMCP packet.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040801-01-P">20040801-01-P</ref>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0064.html" adv="1">20040323 how much fun can you have with UDP?</ref>
      <ref source="MLIST" url="http://lists.immunitysec.com/pipermail/dailydave/2004-March/000402.html" adv="1">[Dailydave] 20040323 dtlogin advisory</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101478-1">101478</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57539-1&amp;searchclause=security">57539</ref>
      <ref source="HP" url="http://www.auscert.org.au/render.html?it=4103&amp;cid=3734">HPSBUX01038</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-129.shtml">O-129</ref>
      <ref source="MISC" url="http://www.immunitysec.com/downloads/dtlogin.sxw.pdf">http://www.immunitysec.com/downloads/dtlogin.sxw.pdf</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/179804" adv="1">VU#179804</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9958">9958</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15581">cde-dtlogin-double-free(15581)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1436">oval:org.mitre.oval:def:1436</ref>
    </refs>
    <vuln_soft>
      <prod name="cde_common_desktop_environment" vendor="open_group">
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.1.20"/>
      </prod>
      <prod name="dextop" vendor="xi_graphics">
        <vers num="2.1"/>
        <vers num="3.0"/>
      </prod>
      <prod name="aix" vendor="ibm">
        <vers num="4.3.3"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0369" seq="2004-0369" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Entrust LibKmp ISAKMP library, as used by Symantec Enterprise Firewall 7.0 through 8.0, Gateway Security 5300 1.0, Gateway Security 5400 2.0, and VelociRaptor 1.5, allows remote attackers to execute arbitrary code via a crafted ISAKMP payload.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html" adv="1">http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4339" adv="1">ESB-2004.0538</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-206.shtml" adv="1">O-206</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11039">11039</ref>
      <ref source="ISS" url="http://xforce.iss.net/xforce/alerts/id/181" adv="1" patch="1">20040826 Entrust LibKmp Library Buffer Overflow</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15669">isakmp-spi-size-bo(15669)</ref>
    </refs>
    <vuln_soft>
      <prod name="entrust_libkmp_isakmp_library" vendor="entrust">
        <vers num=""/>
      </prod>
      <prod name="enterprise_firewall" vendor="symantec">
        <vers num="7.0" edition=":solaris"/>
        <vers num="7.0.4" edition=":solaris"/>
        <vers num="7.0.4" edition=":windows_2000_nt"/>
        <vers num="8.0" edition=":solaris"/>
        <vers num="8.0" edition=":windows_2000_nt"/>
      </prod>
      <prod name="velociraptor" vendor="symantec">
        <vers num="1.5"/>
      </prod>
      <prod name="gateway_security_5300" vendor="symantec">
        <vers num="1.0"/>
      </prod>
      <prod name="gateway_security_5400" vendor="symantec">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0370" seq="2004-0370" published="2004-05-04" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The setsockopt call in the KAME Project IPv6 implementation, as used in FreeBSD 5.2, does not properly handle certain IPv6 socket options, which could allow attackers to read kernel memory and cause a system panic.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:06.ipv6.asc">FreeBSD-SA-04:06</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9992">9992</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15662">freebsd-ipv6-dos(15662)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0371" seq="2004-0371" published="2004-05-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Heimdal 0.6.x before 0.6.1 and 0.5.x before 0.5.3 does not properly perform certain consistency checks for cross-realm requests, which allows remote attackers with control of a realm to impersonate others in the cross-realm trust path.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:08.heimdal.asc">FreeBSD-SA-04:08</ref>
      <ref source="OPENBSD" url="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/009_kerberos.patch">20040530 009: SECURITY FIX: May 30, 2004</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-09.xml" adv="1">GLSA-200404-09</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-476" adv="1" patch="1">DSA-476</ref>
      <ref source="CONFIRM" url="http://www.pdc.kth.se/heimdal/advisory/2004-04-01/">http://www.pdc.kth.se/heimdal/advisory/2004-04-01/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15701">heimdal-cross-realm-spoofing(15701)</ref>
    </refs>
    <vuln_soft>
      <prod name="heimdal" vendor="kth">
        <vers num="0.4a"/>
        <vers num="0.4b"/>
        <vers num="0.4c"/>
        <vers num="0.4d"/>
        <vers num="0.4e"/>
        <vers num="0.5"/>
        <vers num="0.5.1"/>
        <vers num="0.5.2"/>
        <vers num="0.6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0372" seq="2004-0372" published="2004-04-15" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">xine allows local users to overwrite arbitrary files via a symlink attack on a bug report email that is generated by the (1) xine-bugreport or (2) xine-check scripts.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107997911025558&amp;w=2">20040320 xine-check/xine-bugreport symlink vulnerability.</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-20.xml">GLSA-200404-20</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-477" adv="1" patch="1">DSA-477</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9939" adv="1">9939</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15564">xine-xinebugreport-xinecheck-symlink(15564)</ref>
    </refs>
    <vuln_soft>
      <prod name="xine" vendor="xine">
        <vers num="0.9.13"/>
        <vers num="1_beta1"/>
        <vers num="1_beta2"/>
        <vers num="1_beta3"/>
        <vers num="1_beta4"/>
        <vers num="1_beta5"/>
        <vers num="1_beta6"/>
        <vers num="1_beta7"/>
        <vers num="1_beta8"/>
        <vers num="1_beta9"/>
        <vers num="1_beta10"/>
        <vers num="1_beta11"/>
        <vers num="1_beta12"/>
        <vers num="1_rc0a"/>
        <vers num="1_rc1"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3"/>
        <vers num="1_rc3a"/>
        <vers num="1_rc3b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0374" seq="2004-0374" published="2004-05-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Interchange before 5.0.1 allows remote attackers to "expose the content of arbitrary variables" and read or modify sensitive SQL information via an HTTP request ending with the "__SQLUSER__" string.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://ftp.icdevgroup.org/interchange/5.0/WHATSNEW">http://ftp.icdevgroup.org/interchange/5.0/WHATSNEW</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-471" adv="1" patch="1">DSA-471</ref>
      <ref source="MLIST" url="http://www.icdevgroup.org/pipermail/interchange-announce/2004/000043.html">[interchange-announce] 20040329 Security Problem in Interchange</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10005">10005</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15670">interchange-url-obtain-information(15670)</ref>
    </refs>
    <vuln_soft>
      <prod name="interchange" vendor="interchange_development_group">
        <vers num="4.8.1"/>
        <vers num="4.8.2"/>
        <vers num="4.8.3"/>
        <vers num="4.8.4"/>
        <vers num="4.8.5"/>
        <vers num="4.8.6"/>
        <vers num="4.8.7"/>
        <vers num="4.8.8"/>
        <vers num="4.8.9"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0375" seq="2004-0375" published="2004-08-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">SYMNDIS.SYS in Symantec Norton Internet Security 2003 and 2004, Norton Personal Firewall 2003 and 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 and 1.1 allow remote attackers to cause a denial of service (infinite loop) via a TCP packet with (1) SACK option or (2) Alternate Checksum Data option followed by a length of zero.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108275582432246&amp;w=2">20040423 EEYE: Symantec Multiple Firewall TCP Options Denial of Service</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009379">1009379</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009380">1009380</ref>
      <ref source="MISC" url="http://www.eeye.com/html/Research/Upcoming/20040309.html">http://www.eeye.com/html/Research/Upcoming/20040309.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9912" adv="1">9912</ref>
      <ref source="CONFIRM" url="http://www.symantec.com/avcenter/security/Content/2004.04.20.html">http://www.symantec.com/avcenter/security/Content/2004.04.20.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15433">norton-firewalls-dos(15433)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15936">symantec-firewall-tcp-dos(15936)</ref>
    </refs>
    <vuln_soft>
      <prod name="client_firewall" vendor="symantec">
        <vers num="5.01"/>
        <vers num="5.1.1"/>
      </prod>
      <prod name="client_security" vendor="symantec">
        <vers num="1.0"/>
        <vers num="1.1"/>
      </prod>
      <prod name="norton_internet_security" vendor="symantec">
        <vers num="2003" edition=":pro"/>
        <vers num="2004" edition=":pro"/>
      </prod>
      <prod name="norton_personal_firewall" vendor="symantec">
        <vers num="2003"/>
        <vers num="2004"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0376" seq="2004-0376" published="2004-05-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">oftpd 0.3.6 and earlier allows remote attackers to cause a denial of service (crash) via a PORT command with a large value.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200403-08.xml">GLSA-200403-08</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-473" adv="1" patch="1">DSA-473</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9980" adv="1" patch="1">9980</ref>
      <ref source="CONFIRM" url="http://www.time-travellers.org/oftpd/oftpd-dos.html">http://www.time-travellers.org/oftpd/oftpd-dos.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15622">oftpd-port-dos(15622)</ref>
    </refs>
    <vuln_soft>
      <prod name="oftpd" vendor="oftpd">
        <vers num="0.3.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0377" seq="2004-0377" published="2004-05-04" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html" adv="1" patch="1">20040405 iDEFENSE Security Advisory 04.05.04: Perl win32_stat Function</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108118694327979&amp;w=2">20040405 [Full-Disclosure] iDEFENSE Security Advisory 04.05.04: Perl win32_stat Function</ref>
      <ref source="CONFIRM" url="http://public.activestate.com/cgi-bin/perlbrowse?patch=22552">http://public.activestate.com/cgi-bin/perlbrowse?patch=22552</ref>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=93&amp;type=vulnerabilities">http://www.idefense.com/application/poi/display?id=93&amp;type=vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/722414" adv="1" patch="1">VU#722414</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15732">perl-win32stat-bo(15732)</ref>
    </refs>
    <vuln_soft>
      <prod name="activeperl" vendor="activestate">
        <vers num=""/>
      </prod>
      <prod name="perl" vendor="larry_wall">
        <vers num="5.8.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0378" seq="2004-0378" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0379" seq="2004-0379" published="2004-05-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Microsoft SharePoint Portal Server 2001 allow remote attackers to process arbitrary web content and steal cookies via certain server scripts.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108118352303273&amp;w=2">20040405 Multiple XSS vulnerabilities in Microsoft SharePoint Portal Server 2001</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15729">sharepoint-portal-xss(15729)</ref>
    </refs>
    <vuln_soft>
      <prod name="sharepoint_portal_server" vendor="microsoft">
        <vers num="2001" edition="sp1"/>
        <vers num="2001" edition="sp2"/>
        <vers num="2001" edition="sp2a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0380" seq="2004-0380" published="2004-05-04" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/323070">VU#323070</ref>
      <ref source="MISC" url="http://www.k-otik.net/bugtraq/02.18.InternetExplorer.php">http://www.k-otik.net/bugtraq/02.18.InternetExplorer.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/354447" adv="1" patch="1">20040219 Microsoft Internet Explorer Unspecified CHM File Processing Arbitrary Code Execution Vulnerability (bid 9658)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/358913" adv="1" patch="1">20040328 IE ms-its: and mk:@MSITStore: vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9105">9105</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9658">9658</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-104A.html">TA04-104A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-013">MS04-013</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15705">outlook-mhtml-execute-code(15705)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1010">oval:org.mitre.oval:def:1010</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1028">oval:org.mitre.oval:def:1028</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A882">oval:org.mitre.oval:def:882</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A990">oval:org.mitre.oval:def:990</ref>
    </refs>
    <vuln_soft>
      <prod name="outlook_express" vendor="microsoft">
        <vers num="5.5"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0381" seq="2004-0381" published="2004-05-04" modified="2019-10-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108023246916294&amp;w=2">20040324 mysqlbug tmpfile/symlink vulnerability.</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108206802810402&amp;w=2">20040414 [OpenPKG-SA-2004.014] OpenPKG Security Advisory (mysql)</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-20.xml">GLSA-200405-20</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-018.shtml">P-018</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-483">DSA-483</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:034">MDKSA-2004:034</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-569.html">RHSA-2004:569</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-597.html">RHSA-2004:597</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9976" adv="1" patch="1">9976</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15617">mysql-mysqlbug-symlink(15617)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557">oval:org.mitre.oval:def:11557</ref>
    </refs>
    <vuln_soft>
      <prod name="mysql" vendor="mysql">
        <vers num="4.1.0" edition="alpha"/>
        <vers num="4.1.0.0"/>
      </prod>
      <prod name="mysql" vendor="oracle">
        <vers num="3.20.32a"/>
        <vers num="3.22.26"/>
        <vers num="3.22.27"/>
        <vers num="3.22.28"/>
        <vers num="3.22.29"/>
        <vers num="3.22.30"/>
        <vers num="3.22.32"/>
        <vers num="3.23.2"/>
        <vers num="3.23.3"/>
        <vers num="3.23.5"/>
        <vers num="3.23.8"/>
        <vers num="3.23.9"/>
        <vers num="3.23.10"/>
        <vers num="3.23.22"/>
        <vers num="3.23.23"/>
        <vers num="3.23.24"/>
        <vers num="3.23.25"/>
        <vers num="3.23.26"/>
        <vers num="3.23.27"/>
        <vers num="3.23.28" edition="gamma"/>
        <vers num="3.23.29"/>
        <vers num="3.23.30"/>
        <vers num="3.23.31"/>
        <vers num="3.23.32"/>
        <vers num="3.23.33"/>
        <vers num="3.23.34"/>
        <vers num="3.23.36"/>
        <vers num="3.23.37"/>
        <vers num="3.23.38"/>
        <vers num="3.23.39"/>
        <vers num="3.23.40"/>
        <vers num="3.23.41"/>
        <vers num="3.23.42"/>
        <vers num="3.23.43"/>
        <vers num="3.23.44"/>
        <vers num="3.23.45"/>
        <vers num="3.23.46"/>
        <vers num="3.23.47"/>
        <vers num="3.23.48"/>
        <vers num="3.23.49"/>
        <vers num="3.23.50"/>
        <vers num="3.23.51"/>
        <vers num="3.23.52"/>
        <vers num="3.23.53"/>
        <vers num="3.23.53a"/>
        <vers num="3.23.54"/>
        <vers num="3.23.54a"/>
        <vers num="3.23.55"/>
        <vers num="3.23.56"/>
        <vers num="3.23.58"/>
        <vers num="4.0.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.5a"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7" edition="gamma"/>
        <vers num="4.0.8" edition="gamma"/>
        <vers num="4.0.9" edition="gamma"/>
        <vers num="4.0.10"/>
        <vers num="4.0.11" edition="gamma"/>
        <vers num="4.0.12"/>
        <vers num="4.0.13"/>
        <vers num="4.0.14"/>
        <vers num="4.0.15"/>
        <vers num="4.0.18"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0382" seq="2004-0382" published="2004-05-04" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in the CUPS printing system in Mac OS X 10.3.3 and Mac OS X 10.2.8 with unknown impact, possibly related to a configuration file setting.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=61798">http://docs.info.apple.com/article.html?artnum=61798</ref>
      <ref source="CONFIRM" url="http://lists.apple.com/mhonarc/security-announce/msg00047.html">http://lists.apple.com/mhonarc/security-announce/msg00047.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15769">macos-cups-configuration-unknown(15769)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0383" seq="2004-0383" published="2004-05-04" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Mail for Mac OS X 10.3.3 and 10.2.8, with unknown impact, related to "the handling of HTML-formatted email."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=61798">http://docs.info.apple.com/article.html?artnum=61798</ref>
      <ref source="CONFIRM" url="http://lists.apple.com/mhonarc/security-announce/msg00047.html">http://lists.apple.com/mhonarc/security-announce/msg00047.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15768">macos-mail-unknown(15768)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0385" seq="2004-0385" published="2004-06-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Oracle 9i Application Server Web Cache 9.0.4.0.0, 9.0.3.1.0, 9.0.2.3.0, and 9.0.0.4.0 allows remote attackers to execute arbitrary code via a long HTTP request method header to the Web Cache listener.  NOTE: due to the vagueness of the Oracle advisory, it is not clear whether there are additional issues besides this overflow, although the advisory alludes to multiple "vulnerabilities."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0078.html">20040408 Heap Overflow in Oracle 9iAS / 10g Application Server Web Cache</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107945649127635&amp;w=2">20040316 new security alert #66 issued in Oracle web cache</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108144419001770&amp;w=2">20040408 Heap Overflow in Oracle 9iAS / 10g Application Server Web Cache</ref>
      <ref source="CONFIRM" url="http://otn.oracle.com/deploy/security/pdf/2004alert66.pdf" adv="1" patch="1">http://otn.oracle.com/deploy/security/pdf/2004alert66.pdf</ref>
      <ref source="MISC" url="http://www.inaccessnetworks.com/ian/services/secadv01.txt" adv="1">http://www.inaccessnetworks.com/ian/services/secadv01.txt</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/413006" adv="1" patch="1">VU#413006</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9868">9868</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15463">oracle-web-cache-vulnerabilities(15463)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server_web_cache" vendor="oracle">
        <vers num="9.0.0.4.0"/>
        <vers num="9.0.2.3.0"/>
        <vers num="9.0.3.1.0"/>
        <vers num="9.0.4.0.0"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11i"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0386" seq="2004-0386" published="2004-05-04" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the HTTP parser for MPlayer 1.0pre3 and earlier, 0.90, and 0.91 allows remote attackers to execute arbitrary code via a long Location header.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108067020624076&amp;w=2">20040330 MPlayer Security Advisory #002 - HTTP parsing vulnerability</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200403-13.xml" adv="1" patch="1">GLSA-200403-13</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/723910" adv="1" patch="1">VU#723910</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:026">MDKSA-2004:026</ref>
      <ref source="CONFIRM" url="http://www.mplayerhq.hu/homepage/design6/news.html">http://www.mplayerhq.hu/homepage/design6/news.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/359025" adv="1" patch="1">20040330 Heap overflow in MPlayer</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10008" patch="1">10008</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15675">mplayer-header-bo(15675)</ref>
    </refs>
    <vuln_soft>
      <prod name="mplayer" vendor="mplayer">
        <vers num="0.90"/>
        <vers num="0.90_pre"/>
        <vers num="0.90_rc"/>
        <vers num="0.91"/>
        <vers num="1.0_pre1"/>
        <vers num="1.0_pre2"/>
        <vers num="1.0_pre3"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="0.5"/>
        <vers num="0.7"/>
        <vers num="1.1a"/>
        <vers num="1.2"/>
        <vers num="1.4" edition="rc1"/>
        <vers num="1.4" edition="rc2"/>
        <vers num="1.4" edition="rc3"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2"/>
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0387" seq="2004-0387" published="2004-06-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the RT3 plugin, as used in RealPlayer 8, RealOne Player, RealOne Player 10 beta, and RealOne Player Enterprise, allows remote attackers to execute arbitrary code via a malformed .R3T file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0077.html">20040307 REAL One Player R3T File Format Stack Overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108135350810135&amp;w=2">20040307 REAL One Player R3T File Format Stack Overflow</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/realr3t.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/realr3t.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10070">10070</ref>
      <ref source="CONFIRM" url="http://www.service.real.com/help/faq/security/040406_r3t/en/" adv="1" patch="1">http://www.service.real.com/help/faq/security/040406_r3t/en/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15774">realplayer-r3t-bo(15774)</ref>
    </refs>
    <vuln_soft>
      <prod name="realone_player" vendor="realnetworks">
        <vers num="" edition=":enterprise"/>
        <vers num="10_beta"/>
      </prod>
      <prod name="realplayer" vendor="realnetworks">
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0388" seq="2004-0388" published="2004-06-01" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The mysqld_multi script in MySQL allows local users to overwrite arbitrary files via a symlink attack.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dev.mysql.com/doc/mysql/en/news-4-1-2.html">http://dev.mysql.com/doc/mysql/en/news-4-1-2.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108206802810402&amp;w=2">20040414 [OpenPKG-SA-2004.014] OpenPKG Security Advisory (mysql)</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-20.xml" adv="1">GLSA-200405-20</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009784">1009784</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-018.shtml">P-018</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-483" adv="1" patch="1">DSA-483</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:034">MDKSA-2004:034</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-569.html">RHSA-2004:569</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-597.html">RHSA-2004:597</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10142">10142</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15883">mysql-mysqldmulti-symlink(15883)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10559">oval:org.mitre.oval:def:10559</ref>
    </refs>
    <vuln_soft>
      <prod name="mysql" vendor="mysql">
        <vers num="5.0.33"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0389" seq="2004-0389" published="2004-06-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">RealNetworks Helix Universal Server 9.0.1 and 9.0.2 allows remote attackers to cause a denial of service (crash) via malformed requests that trigger a null dereference, as demonstrated using (1) GET_PARAMETER or (2) DESCRIBE requests.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=102&amp;type=vulnerabilities" adv="1" patch="1">20040415 RealNetworks Helix Universal Server Denial of Service Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10157">10157</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15880">helix-get-dos(15880)</ref>
    </refs>
    <vuln_soft>
      <prod name="helix_universal_server" vendor="realnetworks">
        <vers num="9.0.1"/>
        <vers num="9.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0390" seq="2004-0390" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SCO OpenServer 5.0.5 through 5.0.7 only supports Xauthority style access control when users log in using scologin, which allows remote attackers to gain unauthorized access to an X session via other X login methods.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0424.html">20040510 OpenServer 5.0.5 OpenServer 5.0.6 OpenServer 5.0.7 : X sessions which are not started by scologin cannot use the X authorization protocol</ref>
      <ref source="SCO" url="http://www.securityfocus.com/advisories/6684">SCOSA-2004.5</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16113">openserver-x-session-insecure(16113)</ref>
    </refs>
    <vuln_soft>
      <prod name="openserver" vendor="sco">
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0391" seq="2004-0391" published="2004-06-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Cisco Wireless LAN Solution Engine (WLSE) 2.0 through 2.5 and Hosting Solution Engine (HSE) 1.7 through 1.7.3 have a hardcoded username and password, which allows remote attackers to add new users, modify existing users, and change configuration.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-111.shtml" adv="1" patch="1">O-111</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040407-username.shtml" adv="1" patch="1">20040407 A Default Username and Password in WLSE and HSE Devices</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/659228" adv="1" patch="1">VU#659228</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10076">10076</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15773">cisco-default-password(15773)</ref>
    </refs>
    <vuln_soft>
      <prod name="wireless_lan_solution_engine" vendor="cisco">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="2.5"/>
      </prod>
      <prod name="hosting_solution_engine" vendor="cisco">
        <vers num="1.7"/>
        <vers num="1.7.0"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="1.7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0392" seq="2004-0392" published="2004-06-14" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">racoon before 20040407b allows remote attackers to cause a denial of service (infinite loop and dropped connections) via an IKE message with a malformed Generic Payload Header containing invalid (1) "Security Association Next Payload" and (2) "RESERVED" fields.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.10/SCOSA-2005.10.txt">SCOSA-2005.10</ref>
      <ref source="CONFIRM" url="http://orange.kame.net/dev/query-pr.cgi?pr=555">http://orange.kame.net/dev/query-pr.cgi?pr=555</ref>
      <ref source="CONFIRM" url="http://www.vuxml.org/freebsd/40fcf20f-8891-11d8-90d1-0020ed76ef5a.html" adv="1">http://www.vuxml.org/freebsd/40fcf20f-8891-11d8-90d1-0020ed76ef5a.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15893">racoon-isakmp-dos(15893)</ref>
    </refs>
    <vuln_soft>
      <prod name="racoon" vendor="kame">
        <vers num="2004-04-07a" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0393" seq="2004-0393" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the msg function for rlpr daemon (rlprd) 2.0.4 allows remote attackers to execute arbitrary code via format string specifiers in a buffer that can not be resolved, which is provided to the syslog function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108810992313652&amp;w=2">20040624 Rlpr Advisory</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-524" adv="1" patch="1">DSA-524</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10578" adv="1" patch="1">10578</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16453">rlpr-msg-format-string(16453)</ref>
    </refs>
    <vuln_soft>
      <prod name="rlpr" vendor="rlpr">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0394" seq="2004-0394" published="2004-08-18" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">A "potential" buffer overflow exists in the panic() function in Linux 2.4.x, although it may not be exploitable due to the functionality of panic.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc">20040504-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040505-01-U.asc">20040505-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000846" adv="1">CLA-2004:846</ref>
      <ref source="MLIST" url="http://lwn.net/Articles/81773/">[fedora-announce] 20040422 Fedora alert FEDORA-2004-111 (kernel)</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-02.xml" adv="1">GLSA-200407-02</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="ENGARDE" url="http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html">ESA-20040428-004</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:037">MDKSA-2004:037</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_10_kernel.html">SuSE-SA:2004:010</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10233">10233</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15953">linux-panic-bo(15953)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.20.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0395" seq="2004-0395" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The xatitv program in the gatos package does not properly drop root privileges when the configuration file does not exist, which allows local users to execute arbitrary commands via shell metacharacters in a system call.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-509" adv="1" patch="1">DSA-509</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10437" adv="1" patch="1">10437</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16273">gatos-xatitv-gain-privileges(16273)</ref>
    </refs>
    <vuln_soft>
      <prod name="gatos" vendor="gatos">
        <vers num=".5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0396" seq="2004-0396" published="2004-06-14" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in CVS 1.11.x up to 1.11.15, and 1.12.x up to 1.12.7, when using the pserver mechanism allows remote attackers to execute arbitrary code via Entry lines.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:10.cvs.asc">FreeBSD-SA-04:10</ref>
      <ref source="NETBSD" url="ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-008.txt.asc">NetBSD-SA2004-008</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0980.html">20040519 Advisory 07/2004: CVS remote vulnerability</ref>
      <ref source="BUGTRAQ" url="http://cert.uni-stuttgart.de/archive/bugtraq/2004/05/msg00219.html">20040519 Advisory 07/2004: CVS remote vulnerability</ref>
      <ref source="SUSE" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021742.html">SuSE-SA:2004:013</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108498454829020&amp;w=2">20040519 Advisory 07/2004: CVS remote vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108500040719512&amp;w=2">20040519 [OpenPKG-SA-2004.022] OpenPKG Security Advisory (cvs)</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=108636445031613&amp;w=2">FEDORA-2004-1620</ref>
      <ref source="OPENBSD" url="http://marc.info/?l=openbsd-security-announce&amp;m=108508894405639&amp;w=2">20040520 cvs server buffer overflow vulnerability</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/072004.html">http://security.e-matters.de/advisories/072004.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-12.xml">GLSA-200405-12</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-147.shtml">O-147</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-505" adv="1" patch="1">DSA-505</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/192038" adv="1" patch="1">VU#192038</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:048">MDKSA-2004:048</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-190.html" adv="1" patch="1">RHSA-2004:190</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10384">10384</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.395865">SSA:2004-140-01</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-147A.html">TA04-147A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16193">cvs-entry-line-bo(16193)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9058">oval:org.mitre.oval:def:9058</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A970">oval:org.mitre.oval:def:970</ref>
    </refs>
    <vuln_soft>
      <prod name="cvs" vendor="cvs">
        <vers num="1.11"/>
        <vers num="1.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0397" seq="2004-0397" published="2004-07-07" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow during the apr_time_t data conversion in Subversion 1.0.2 and earlier allows remote attackers to execute arbitrary code via a (1) DAV2 REPORT query or (2) get-dated-rev svn-protocol command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021737.html">20040519 Advisory 08/2004: Subversion remote vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108498676517697&amp;w=2">20040519 Advisory 08/2004: Subversion remote vulnerability</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/082004.html">http://security.e-matters.de/advisories/082004.html</ref>
      <ref source="CONFIRM" url="http://subversion.tigris.org/svn-sscanf-advisory.txt">http://subversion.tigris.org/svn-sscanf-advisory.txt</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200405-14.xml">GLSA-200405-14</ref>
      <ref source="FEDORA" url="http://www.linuxsecurity.com/advisories/fedora_advisory-4373.html" adv="1">FEDORA-2004-128</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/363814" adv="1" patch="1">20040519 [OpenPKG-SA-2004.023] OpenPKG Security Advisory (subversion)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10386" adv="1" patch="1">10386</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1748">FLSA:1748</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16191">subversion-date-parsing-command-execution(16191)</ref>
    </refs>
    <vuln_soft>
      <prod name="subversion" vendor="subversion">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0398" seq="2004-0398" published="2004-07-07" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the ne_rfc1036_parse date parsing function for the neon library (libneon) 0.24.5 and earlier, as used by cadaver before 0.22, allows remote WebDAV servers to execute arbitrary code on the client.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0982.html" adv="1">20040519 Advisory 06/2004: libneon date parsing vulnerability</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000841" adv="1">CLA-2004:841</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108498433632333&amp;w=2">20040519 Advisory 06/2004: libneon date parsing vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108500057108022&amp;w=2">20040519 [OpenPKG-SA-2004.024] OpenPKG Security Advisory (neon)</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-13.xml" adv="1" patch="1">GLSA-200405-13</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-15.xml" adv="1" patch="1">GLSA-200405-15</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-148.shtml" adv="1">O-148</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-506" adv="1" patch="1">DSA-506</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-507" adv="1" patch="1">DSA-507</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:049">MDKSA-2004:049</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-191.html" adv="1" patch="1">RHSA-2004:191</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10385" patch="1">10385</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1552" patch="1">FEDORA-2004-1552</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16192">neon-library-nerfc1036parse-bo(16192)</ref>
    </refs>
    <vuln_soft>
      <prod name="cadaver_webdav_client" vendor="cadaver">
        <vers num="0.20.0"/>
        <vers num="0.20.1"/>
        <vers num="0.20.2"/>
        <vers num="0.20.3"/>
        <vers num="0.20.4"/>
        <vers num="0.20.5"/>
        <vers num="0.21.0"/>
        <vers num="0.22.0"/>
        <vers num="0.22.1"/>
      </prod>
      <prod name="neon_client_library" vendor="neon">
        <vers num="0.19.3"/>
        <vers num="0.23"/>
        <vers num="0.23.1"/>
        <vers num="0.23.2"/>
        <vers num="0.23.3"/>
        <vers num="0.23.4"/>
        <vers num="0.23.5"/>
        <vers num="0.23.6"/>
        <vers num="0.23.7"/>
        <vers num="0.23.8"/>
        <vers num="0.24"/>
        <vers num="0.24.1"/>
        <vers num="0.24.2"/>
        <vers num="0.24.3"/>
        <vers num="0.24.4"/>
      </prod>
      <prod name="openoffice" vendor="openoffice">
        <vers num="1.1.2"/>
      </prod>
      <prod name="subversion" vendor="subversion">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0399" seq="2004-0399" published="2004-07-07" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021015.html">20040506 Buffer overflows in exim, yet still exim much better than windows</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-501" adv="1" patch="1">DSA-501</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-502" adv="1" patch="1">DSA-502</ref>
      <ref source="MISC" url="http://www.guninski.com/exim1.html" adv="1" patch="1">http://www.guninski.com/exim1.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16079">exim-requireverify-bo(16079)</ref>
    </refs>
    <vuln_soft>
      <prod name="exim" vendor="university_of_cambridge">
        <vers num="3.35"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0400" seq="2004-0400" published="2004-07-07" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021015.html">20040506 Buffer overflows in exim, yet still exim much better than windows</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-501" adv="1" patch="1">DSA-501</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-502" adv="1" patch="1">DSA-502</ref>
      <ref source="MISC" url="http://www.guninski.com/exim1.html" adv="1" patch="1">http://www.guninski.com/exim1.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16077">exim-headerschecksyntax-bo(16077)</ref>
    </refs>
    <vuln_soft>
      <prod name="exim" vendor="university_of_cambridge">
        <vers num="4.32" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0401" seq="2004-0401" published="2004-07-07" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in libtasn1 0.1.x before 0.1.2, and 0.2.x before 0.2.7, related to the DER parsing functions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://packages.debian.org/changelogs/pool/main/libt/libtasn1-2/libtasn1-2_0.2.13-1/changelog">http://packages.debian.org/changelogs/pool/main/libt/libtasn1-2/libtasn1-2_0.2.13-1/changelog</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010159">1010159</ref>
      <ref source="MISC" url="http://www.backports.org/changelog.html" adv="1">http://www.backports.org/changelog.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10360">10360</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16157">libtasn1-der-parsing(16157)</ref>
    </refs>
    <vuln_soft>
      <prod name="libtasn1" vendor="free_software_foundation_inc.">
        <vers num="0.1"/>
        <vers num="0.1.0"/>
        <vers num="0.1.1"/>
        <vers num="0.2.0"/>
        <vers num="0.2.1"/>
        <vers num="0.2.2"/>
        <vers num="0.2.3"/>
        <vers num="0.2.4"/>
        <vers num="0.2.5"/>
        <vers num="0.2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0402" seq="2004-0402" published="2004-07-07" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in xpcd-svga in xpcd before 2.08, and possibly other versions, may allow local users to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-508" adv="1" patch="1">DSA-508</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:053">MDKSA-2004:053</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10403" adv="1" patch="1">10403</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16236">xpcd-svga-pcdopen-bo(16236)</ref>
    </refs>
    <vuln_soft>
      <prod name="xpcd" vendor="xpcd">
        <vers num="2.08"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0403" seq="2004-0403" published="2004-06-01" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Racoon before 20040408a allows remote attackers to cause a denial of service (memory consumption) via an ISAKMP packet with a large length field.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.10/SCOSA-2005.10.txt">SCOSA-2005.10</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040506-01-U.asc">20040506-01-U</ref>
      <ref source="APPLE" url="http://marc.info/?l=bugtraq&amp;m=108369640424244&amp;w=2">APPLE-SA-2004-05-03</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-17.xml">GLSA-200404-17</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009937">1009937</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=232288">http://sourceforge.net/project/shownotes.php?release_id=232288</ref>
      <ref source="CONFIRM" url="http://www.kame.net/dev/cvsweb2.cgi/kame/kame/kame/racoon/isakmp.c.diff?r1=1.180&amp;r2=1.181">http://www.kame.net/dev/cvsweb2.cgi/kame/kame/kame/racoon/isakmp.c.diff?r1=1.180&amp;r2=1.181</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:069">MDKSA-2004:069</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-165.html" adv="1" patch="1">RHSA-2004:165</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10172">10172</ref>
      <ref source="CONFIRM" url="http://www.vuxml.org/freebsd/ccd698df-8e20-11d8-90d1-0020ed76ef5a.html" adv="1">http://www.vuxml.org/freebsd/ccd698df-8e20-11d8-90d1-0020ed76ef5a.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15893">racoon-isakmp-dos(15893)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11220">oval:org.mitre.oval:def:11220</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A984">oval:org.mitre.oval:def:984</ref>
    </refs>
    <vuln_soft>
      <prod name="racoon" vendor="kame">
        <vers num="2004-04-08a" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0404" seq="2004-0404" published="2004-07-07" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="1.2" CVSS_base_score="1.2" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">logcheck before 1.1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary directory in /var/tmp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-488" adv="1" patch="1">DSA-488</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:155">MDKSA-2004:155</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10162" patch="1">10162</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15888">logcheck-directory-symlink(15888)</ref>
    </refs>
    <vuln_soft>
      <prod name="logcheck" vendor="psionic">
        <vers num="1.1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0405" seq="2004-0405" published="2004-06-01" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">CVS before 1.11 allows CVS clients to read arbitrary files via .. (dot dot) sequences in filenames via CVS client requests, a different vulnerability than CVE-2004-0180.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:07.cvs.asc" adv="1" patch="1">FreeBSD-SA-04:07</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc" adv="1" patch="1">20040404-01-U</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=108636445031613&amp;w=2">FEDORA-2004-1620</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-13.xml">GLSA-200404-13</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-486" adv="1" patch="1">DSA-486</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.400181">SSA:2004-108-02</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15891">cvs-dotdot-directory-traversal(15891)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1060">oval:org.mitre.oval:def:1060</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10818">oval:org.mitre.oval:def:10818</ref>
    </refs>
    <vuln_soft>
      <prod name="cvs" vendor="cvs">
        <vers num="1.10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0406" seq="2004-0406" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0407" seq="2004-0407" published="2004-06-01" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The HTML form upload capability in ColdFusion MX 6.1 does not reclaim disk space if an upload is interrupted, which allows remote attackers to cause a denial of service (disk consumption) by repeatedly uploading files and interrupting the uploads before they finish.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108213782629001&amp;w=2">20040416 [securityzone@macromedia.com: New Macromedia Security Zone Bulletin Posted]</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009825">1009825</ref>
      <ref source="CONFIRM" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-06.html" adv="1" patch="1">http://www.macromedia.com/devnet/security/security_zone/mpsb04-06.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10158">10158</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15882">coldfusion-upload-file-dos(15882)</ref>
    </refs>
    <vuln_soft>
      <prod name="coldfusion" vendor="macromedia">
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0408" seq="2004-0408" published="2004-09-28" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the child_service function in the ident2 ident daemon allows remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-494" adv="1" patch="1">DSA-494</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10192" adv="1" patch="1">10192</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15938">ident2-childservice-bo(15938)</ref>
    </refs>
    <vuln_soft>
      <prod name="ident2" vendor="michael_bacarella">
        <vers num=".999c"/>
        <vers num="1.3"/>
        <vers num="1.3_1"/>
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0409" seq="2004-0409" published="2004-06-01" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html" adv="1" patch="1">[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-15.xml">GLSA-200404-15</ref>
      <ref source="FEDORA" url="http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013">FLSA:123013</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-177.html" adv="1" patch="1">RHSA-2004:177</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-585.html">RHSA-2004:585</ref>
      <ref source="CONFIRM" url="http://www.xchat.org/" adv="1" patch="1">http://www.xchat.org/</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312">oval:org.mitre.oval:def:11312</ref>
      <ref source="DEBIAN" url="https://www.debian.org/security/2004/dsa-493">DSA-493</ref>
    </refs>
    <vuln_soft>
      <prod name="xchat" vendor="xchat">
        <vers num="1.8.0"/>
        <vers num="1.8.1"/>
        <vers num="1.8.2"/>
        <vers num="1.8.3"/>
        <vers num="1.8.4"/>
        <vers num="1.8.5"/>
        <vers num="1.8.6"/>
        <vers num="1.8.7"/>
        <vers num="1.8.8"/>
        <vers num="1.8.9"/>
        <vers num="1.9.0"/>
        <vers num="1.9.1"/>
        <vers num="1.9.2"/>
        <vers num="1.9.3"/>
        <vers num="1.9.4"/>
        <vers num="1.9.5"/>
        <vers num="1.9.6"/>
        <vers num="1.9.7"/>
        <vers num="1.9.8"/>
        <vers num="1.9.9"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0410" seq="2004-0410" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0411" seq="2004-0411" published="2004-07-07" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The URI handlers in Konqueror for KDE 3.2.2 and earlier do not properly filter "-" characters that begin a hostname in a (1) telnet, (2) rlogin, (3) ssh, or (4) mailto URI, which allows remote attackers to manipulate the options that are passed to the associated programs, possibly to read arbitrary files or execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000843">CLA-2004:843</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108481412427344&amp;w=2">20040517 KDE Security Advisory: URI Handler Vulnerabilities</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-11.xml">GLSA-200405-11</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-146.shtml">O-146</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-518">DSA-518</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20040517-1.txt" adv="1" patch="1">http://www.kde.org/info/security/advisory-20040517-1.txt</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_14_kdelibs.html">SuSE-SA:2003:014</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-222.html">RHSA-2004:222</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/advisories/6717">FEDORA-2004-121</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/advisories/6743">FEDORA-2004-122</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/363225" adv="1">20040513 Opera Telnet URI Handler Vulnerability also applies to other browsers</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10358">10358</ref>
      <ref source="SLACKWARE" url="http://www.slackware.org/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.362635">SSA:2004-238</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16163">kde-url-handler-gain-access(16163)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A954">oval:org.mitre.oval:def:954</ref>
    </refs>
    <vuln_soft>
      <prod name="konqueror" vendor="kde">
        <vers num="3.2.2" prev="1"/>
      </prod>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="9.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0412" seq="2004-0412" published="2004-08-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Mailman before 2.1.5 allows remote attackers to obtain user passwords via a crafted email request to the Mailman server.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000842" adv="1">CLA-2004:842</ref>
      <ref source="MLIST" url="http://mail.python.org/pipermail/mailman-announce/2004-May/000072.html">[Mailman-Announce] 20040515 RELEASED Mailman 2.1.5</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109034869927955&amp;w=2">FEDORA-2004-1734</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-04.xml" adv="1">GLSA-200406-04</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:051">MDKSA-2004:051</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10412" adv="1" patch="1">10412</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=123559">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=123559</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16256">mailman-obtain-password(16256)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailman" vendor="gnu">
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.4"/>
        <vers num="2.1b1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0413" seq="2004-0413" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">libsvn_ra_svn in Subversion 1.0.4 trusts the length field of (1) svn://, (2) svn+ssh://, and (3) other svn protocol URL strings, which allows remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via an integer overflow that leads to a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://subversion.tigris.org/security/CAN-2004-0413-advisory.txt">http://subversion.tigris.org/security/CAN-2004-0413-advisory.txt</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200406-07.xml" adv="1">GLSA-200406-07</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_18_subversion.html">SuSE-SA:2004:018</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/advisories/6847">FEDORA-2004-165</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/365836">20041012 [FMADV] Subversion &lt;= 1.04 Heap Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10519" adv="1" patch="1">10519</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1748">FLSA:1748</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16396">subversion-svn-bo(16396)</ref>
    </refs>
    <vuln_soft>
      <prod name="openpkg" vendor="openpkg">
        <vers num="2.0"/>
      </prod>
      <prod name="subversion" vendor="subversion">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0414" seq="2004-0414" published="2004-08-06" modified="2018-05-02" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle malformed "Entry" lines, which prevents a NULL terminator from being used and may lead to a denial of service (crash), modification of critical program data, or arbitrary code execution.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc">20040604-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc">20040605-01-U</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/022441.html">20040609 Advisory 09/2004: More CVS remote vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108716553923643&amp;w=2">20040611 [OpenPKG-SA-2004.027] OpenPKG Security Advisory (cvs)</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/092004.html">http://security.e-matters.de/advisories/092004.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-06.xml" adv="1">GLSA-200406-06</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-517" adv="1" patch="1">DSA-517</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:058">MDKSA-2004:058</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-233.html">RHSA-2004:233</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10575">oval:org.mitre.oval:def:10575</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A993">oval:org.mitre.oval:def:993</ref>
    </refs>
    <vuln_soft>
      <prod name="cvs" vendor="cvs">
        <vers num="1.10.7"/>
        <vers num="1.10.8"/>
        <vers num="1.11"/>
        <vers num="1.11.1"/>
        <vers num="1.11.1_p1"/>
        <vers num="1.11.2"/>
        <vers num="1.11.3"/>
        <vers num="1.11.4"/>
        <vers num="1.11.5"/>
        <vers num="1.11.6"/>
        <vers num="1.11.10"/>
        <vers num="1.11.11"/>
        <vers num="1.11.14"/>
        <vers num="1.11.15"/>
        <vers num="1.11.16"/>
        <vers num="1.12.1"/>
        <vers num="1.12.2"/>
        <vers num="1.12.5"/>
        <vers num="1.12.7"/>
        <vers num="1.12.8"/>
      </prod>
      <prod name="openpkg" vendor="openpkg">
        <vers num="1.3"/>
        <vers num="2.0"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0415" seq="2004-0415" published="2004-11-23" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc">20040804-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000879">CLA-2004:879</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml">GLSA-200408-24</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:087">MDKSA-2004:087</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-413.html">RHSA-2004:413</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-418.html" adv="1" patch="1">RHSA-2004:418</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16877">linux-pointer-info-disclosure(16877)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9965">oval:org.mitre.oval:def:9965</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0416" seq="2004-0416" published="2004-08-06" modified="2018-05-02" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Double free vulnerability for the error_prog_name string in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc">20040604-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc">20040605-01-U</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/022441.html">20040609 Advisory 09/2004: More CVS remote vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108716553923643&amp;w=2">20040611 [OpenPKG-SA-2004.027] OpenPKG Security Advisory (cvs)</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/092004.html">http://security.e-matters.de/advisories/092004.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-06.xml">GLSA-200406-06</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-519" adv="1" patch="1">DSA-519</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:058">MDKSA-2004:058</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-233.html">RHSA-2004:233</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10070">oval:org.mitre.oval:def:10070</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A994">oval:org.mitre.oval:def:994</ref>
    </refs>
    <vuln_soft>
      <prod name="cvs" vendor="cvs">
        <vers num="1.10.7"/>
        <vers num="1.10.8"/>
        <vers num="1.11"/>
        <vers num="1.11.1"/>
        <vers num="1.11.1_p1"/>
        <vers num="1.11.2"/>
        <vers num="1.11.3"/>
        <vers num="1.11.4"/>
        <vers num="1.11.5"/>
        <vers num="1.11.6"/>
        <vers num="1.11.10"/>
        <vers num="1.11.11"/>
        <vers num="1.11.14"/>
        <vers num="1.11.15"/>
        <vers num="1.11.16"/>
        <vers num="1.12.1"/>
        <vers num="1.12.2"/>
        <vers num="1.12.5"/>
        <vers num="1.12.7"/>
        <vers num="1.12.8"/>
      </prod>
      <prod name="openpkg" vendor="openpkg">
        <vers num="1.3"/>
        <vers num="2.0"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0417" seq="2004-0417" published="2004-08-06" modified="2018-05-02" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the "Max-dotdot" CVS protocol command (serve_max_dotdot) for CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to cause a server crash, which could cause temporary data to remain undeleted and consume disk space.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc">20040605-01-U</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/022441.html">20040609 Advisory 09/2004: More CVS remote vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108716553923643&amp;w=2">20040611 [OpenPKG-SA-2004.027] OpenPKG Security Advisory (cvs)</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/092004.html">http://security.e-matters.de/advisories/092004.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-06.xml" adv="1">GLSA-200406-06</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-519" adv="1" patch="1">DSA-519</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:058">MDKSA-2004:058</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-233.html">RHSA-2004:233</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1001">oval:org.mitre.oval:def:1001</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11145">oval:org.mitre.oval:def:11145</ref>
    </refs>
    <vuln_soft>
      <prod name="cvs" vendor="cvs">
        <vers num="1.10.7"/>
        <vers num="1.10.8"/>
        <vers num="1.11"/>
        <vers num="1.11.1"/>
        <vers num="1.11.1_p1"/>
        <vers num="1.11.2"/>
        <vers num="1.11.3"/>
        <vers num="1.11.4"/>
        <vers num="1.11.5"/>
        <vers num="1.11.6"/>
        <vers num="1.11.10"/>
        <vers num="1.11.11"/>
        <vers num="1.11.14"/>
        <vers num="1.11.15"/>
        <vers num="1.11.16"/>
        <vers num="1.12.1"/>
        <vers num="1.12.2"/>
        <vers num="1.12.5"/>
        <vers num="1.12.7"/>
        <vers num="1.12.8"/>
      </prod>
      <prod name="openpkg" vendor="openpkg">
        <vers num="1.3"/>
        <vers num="2.0"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0418" seq="2004-0418" published="2004-08-06" modified="2018-05-02" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">serve_notify in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle empty data lines, which may allow remote attackers to perform an "out-of-bounds" write for a single byte to execute arbitrary code or modify critical program data.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc">20040604-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc">20040605-01-U</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/022441.html">20040609 Advisory 09/2004: More CVS remote vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108716553923643&amp;w=2">20040611 [OpenPKG-SA-2004.027] OpenPKG Security Advisory (cvs)</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/092004.html">http://security.e-matters.de/advisories/092004.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-06.xml" adv="1">GLSA-200406-06</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-519" adv="1" patch="1">DSA-519</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:058">MDKSA-2004:058</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-233.html">RHSA-2004:233</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1003">oval:org.mitre.oval:def:1003</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11242">oval:org.mitre.oval:def:11242</ref>
    </refs>
    <vuln_soft>
      <prod name="cvs" vendor="cvs">
        <vers num="1.10.7"/>
        <vers num="1.10.8"/>
        <vers num="1.11"/>
        <vers num="1.11.1"/>
        <vers num="1.11.1_p1"/>
        <vers num="1.11.2"/>
        <vers num="1.11.3"/>
        <vers num="1.11.4"/>
        <vers num="1.11.5"/>
        <vers num="1.11.6"/>
        <vers num="1.11.10"/>
        <vers num="1.11.11"/>
        <vers num="1.11.14"/>
        <vers num="1.11.15"/>
        <vers num="1.11.16"/>
        <vers num="1.12.1"/>
        <vers num="1.12.2"/>
        <vers num="1.12.5"/>
        <vers num="1.12.7"/>
        <vers num="1.12.8"/>
      </prod>
      <prod name="openpkg" vendor="openpkg">
        <vers num="1.3"/>
        <vers num="2.0"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0419" seq="2004-0419" published="2004-08-18" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">XDM in XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0, which could allow remote attackers to connect to the port, in violation of the intended restrictions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.xfree86.org/show_bug.cgi?id=1376">http://bugs.xfree86.org/show_bug.cgi?id=1376</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010306">1010306</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-001.shtml">P-001</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-05.xml" adv="1">GLSA-200407-05</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:073" adv="1" patch="1">MDKSA-2004:073</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata.html#xdm">20040526 008: SECURITY FIX: May 26, 2004</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-478.html">RHSA-2004:478</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10423" adv="1" patch="1">10423</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124900">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124900</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16264">xdm-socket-gain-access(16264)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10161">oval:org.mitre.oval:def:10161</ref>
    </refs>
    <vuln_soft>
      <prod name="x11r6" vendor="x.org">
        <vers num="6.7.0"/>
      </prod>
      <prod name="xdm" vendor="xfree86_project">
        <vers num="cvs"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0420" seq="2004-0420" published="2004-07-07" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Windows Shell application in Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by spoofing the type of a file via a CLSID specifier in the filename, as demonstrated using Internet Explorer 6.0.2800.1106 on Windows XP.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/106324">VU#106324</ref>
      <ref source="BUGTRAQ" url="http://www.security-express.com/archives/bugtraq/2004-01/0300.html">20040127 RE: GOOROO CROSSING: File Spoofing Internet Explorer 6</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/351379" adv="1">20040127 GOOROO CROSSING: File Spoofing Internet Explorer 6</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9510" adv="1">9510</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-196A.html">TA04-196A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-024">MS04-024</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14964">ie-clsid-file-extension-spoofing(14964)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2245">oval:org.mitre.oval:def:2245</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2381">oval:org.mitre.oval:def:2381</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2894">oval:org.mitre.oval:def:2894</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3386">oval:org.mitre.oval:def:3386</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3533">oval:org.mitre.oval:def:3533</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3604">oval:org.mitre.oval:def:3604</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0.2800.1106"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0421" seq="2004-0421" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/mhonarc/security-announce/msg00056.html">APPLE-SA-2004-09-09</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108334922320309&amp;w=2">20040429 [OpenPKG-SA-2004.017] OpenPKG Security Advisory (png)</ref>
      <ref source="TRUSTIX" url="http://marc.info/?l=bugtraq&amp;m=108335030208523&amp;w=2">2004-0025</ref>
      <ref source="FEDORA" url="http://marc.info/?l=fedora-announce-list&amp;m=108451350029261&amp;w=2">FEDORA-2004-105</ref>
      <ref source="FEDORA" url="http://marc.info/?l=fedora-announce-list&amp;m=108451353608968&amp;w=2">FEDORA-2004-106</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-498">DSA-498</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:040">MDKSA-2004:040</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:212">MDKSA-2006:212</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:213">MDKSA-2006:213</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-180.html" adv="1" patch="1">RHSA-2004:180</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-181.html">RHSA-2004:181</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10244" adv="1" patch="1">10244</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16022">libpng-png-dos(16022)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11710">oval:org.mitre.oval:def:11710</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971">oval:org.mitre.oval:def:971</ref>
    </refs>
    <vuln_soft>
      <prod name="libpng" vendor="greg_roelofs">
        <vers num="1.0"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.10"/>
        <vers num="1.0.11"/>
        <vers num="1.0.12"/>
        <vers num="1.0.13"/>
        <vers num="1.0.14"/>
      </prod>
      <prod name="libpng3" vendor="greg_roelofs">
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
      </prod>
      <prod name="openpkg" vendor="openpkg">
        <vers num="1.3"/>
        <vers num="2.0"/>
      </prod>
      <prod name="libpng" vendor="redhat">
        <vers num="1.2.2-16" edition=":i386"/>
        <vers num="1.2.2-16" edition=":i386_dev"/>
        <vers num="1.2.2-20" edition=":i386"/>
        <vers num="1.2.2-20" edition=":i386_dev"/>
        <vers num="10.1.0.13.8" edition=":i386"/>
        <vers num="10.1.0.13.8" edition=":i386_dev"/>
        <vers num="10.1.0.13.11" edition=":i386"/>
        <vers num="10.1.0.13.11" edition=":i386_dev"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0422" seq="2004-0422" published="2004-07-07" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">flim before 1.14.3 creates temporary files insecurely, which allows local users to overwrite arbitrary files of the Emacs user via a symlink attack.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-500" adv="1" patch="1">DSA-500</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-344.html">RHSA-2004:344</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16027">flim-insecure-temporary-file(16027)</ref>
    </refs>
    <vuln_soft>
      <prod name="flim" vendor="gnu">
        <vers num="1.14.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0423" seq="2004-0423" published="2004-07-07" modified="2016-10-17" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The log_event function in ssmtp 2.50.6 and earlier allows local users to overwrite arbitrary files via a symlink attack on the ssmtp.log temporary log file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108239608131119&amp;w=2">20040418 ssmtp insecure file creation</ref>
    </refs>
    <vuln_soft>
      <prod name="ssmtp" vendor="ssmtp">
        <vers num="2.50.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0424" seq="2004-0424" published="2004-07-07" modified="2018-05-02" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc">20040504-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000852">CLA-2004:852</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108253171301153&amp;w=2">20040420 Linux kernel setsockopt MCAST_MSFILTER integer overflow</ref>
      <ref source="MISC" url="http://www.isec.pl/vulnerabilities/isec-0015-msfilter.txt" adv="1" patch="1">http://www.isec.pl/vulnerabilities/isec-0015-msfilter.txt</ref>
      <ref source="ENGARDE" url="http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html" adv="1" patch="1">ESA-20040428-004</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:037">MDKSA-2004:037</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_10_kernel.html">SuSE-SA:2004:010</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-183.html">RHSA-2004:183</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10179" adv="1" patch="1">10179</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.659586">SSA:2004-119</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15907">linux-ipsetsockopt-integer-bo(15907)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11214">oval:org.mitre.oval:def:11214</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A939">oval:org.mitre.oval:def:939</ref>
    </refs>
    <vuln_soft>
      <prod name="propack" vendor="sgi">
        <vers num="3.0"/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
      </prod>
      <prod name="slackware_linux" vendor="slackware">
        <vers num="9.1"/>
        <vers num="current"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0425" seq="2004-0425" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in SiteMinder Affiliate Agent 4.x allows remote attackers to execute arbitrary code via a large SMPROFILE cookie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="ATSTAKE" url="http://www.atstake.com/research/advisories/2004/a042204-1.txt" adv="1">A042204-1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10198" adv="1">10198</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15950">siteminder-affiliate-smprofile-bo(15950)</ref>
    </refs>
    <vuln_soft>
      <prod name="sideminder_affiliate_agent" vendor="netegrity">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0426" seq="2004-0426" published="2004-07-07" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote attackers to write files outside of the module's path.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108515912212018&amp;w=2">20040521 [OpenPKG-SA-2004.025] OpenPKG Security Advisory (rsync)</ref>
      <ref source="CONFIRM" url="http://rsync.samba.org/" adv="1">http://rsync.samba.org/</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-134.shtml">O-134</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-212.shtml">O-212</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-499" adv="1" patch="1">DSA-499</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-10.xml">GLSA-200407-10</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:042">MDKSA-2004:042</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-192.html" adv="1" patch="1">RHSA-2004:192</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10247">10247</ref>
      <ref source="SLACKWARE" url="http://www.slackware.org/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.403462">SSA:2004-124-01</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/misc/2004/TSL-2004-0024-rsync.asc.txt">TSL-2004-0024</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16014">rsync-write-files(16014)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9495">oval:org.mitre.oval:def:9495</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A967">oval:org.mitre.oval:def:967</ref>
    </refs>
    <vuln_soft>
      <prod name="rsync" vendor="andrew_tridgell">
        <vers num="2.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0427" seq="2004-0427" published="2004-07-07" modified="2018-05-02" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The do_fork function in Linux 2.4.x before 2.4.26, and 2.6.x before 2.6.6, does not properly decrement the mm_count counter when an error occurs after the mm_struct for a child process has been activated, which triggers a memory leak that allows local users to cause a denial of service (memory exhaustion) via the clone (CLONE_VM) system call.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc" adv="1" patch="1">20040504-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040505-01-U.asc" adv="1" patch="1">20040505-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000846">CLA-2004:846</ref>
      <ref source="FEDORA" url="http://fedoranews.org/updates/FEDORA-2004-111.shtml">FEDORA-2004-111</ref>
      <ref source="MISC" url="http://linux.bkbits.net:8080/linux-2.4/cset@407bf20eDeeejm8t36_tpvSE-8EFHA">http://linux.bkbits.net:8080/linux-2.4/cset@407bf20eDeeejm8t36_tpvSE-8EFHA</ref>
      <ref source="MISC" url="http://linux.bkbits.net:8080/linux-2.6/cset@407b1217x4jtqEkpFW2g_-RcF0726A">http://linux.bkbits.net:8080/linux-2.6/cset@407b1217x4jtqEkpFW2g_-RcF0726A</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=108139073506983&amp;w=2">[linux-kernel] 20040408 [PATCH]: 2.4/2.6 do_fork() error path memory leak</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-02.xml">GLSA-200407-02</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-164.shtml">O-164</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:037">MDKSA-2004:037</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_10_kernel.html">SuSE-SA:2004:010</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-255.html">RHSA-2004:255</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-260.html">RHSA-2004:260</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-327.html">RHSA-2004:327</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10221">10221</ref>
      <ref source="TURBO" url="http://www.turbolinux.com/security/2004/TLSA-2004-14.txt">TLSA-2004-14</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16002">linux-dofork-memory-leak(16002)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10297">oval:org.mitre.oval:def:10297</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2819">oval:org.mitre.oval:def:2819</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0"/>
        <vers num="2.6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0428" seq="2004-0428" published="2004-05-03" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in CoreFoundation in Mac OS X 10.3.3 and Mac OS X 10.3.3 Server, related to "the handling of an environment variable," has unknown attack vectors and unknown impact.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.virus.org/macsec-0405/msg00000.html" adv="1" patch="1">APPLE-SA-2004-05-03</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010045" adv="1" patch="1">1010045</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4070" adv="1" patch="1">ESB-2004.0314</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10270" adv="1" patch="1">10270</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16051">macos-corefoundation-environment(16051)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0429" seq="2004-0429" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability related to "the handling of large requests" in RAdmin for Apple Mac OS X 10.3.3 and Mac OS X 10.2.8 may allow attackers to have unknown impact via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/May/msg00000.html" patch="1">APPLE-SA-2004-05-03</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108369640424244&amp;w=2">20040503 [product-security@apple.com: APPLE-SA-2004-05-03 Security Update 2004-05-03]</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010045" patch="1">1010045</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4070" patch="1">ESB-2004.0314</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-138.shtml">O-138</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16053">macos-radmin-large-request(16053)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0430" seq="2004-0430" published="2004-07-07" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in AppleFileServer for Mac OS X 10.3.3 and earlier allows remote attackers to execute arbitrary code via a LoginExt packet for a Cleartext Password User Authentication Method (UAM) request with a PathName argument that includes an AFPName type string that is longer than the associated length field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/mhonarc/security-announce/msg00049.html">APPLE-SA-2004-05-03</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010039">1010039</ref>
      <ref source="ATSTAKE" url="http://www.atstake.com/research/advisories/2004/a050304-1.txt" adv="1" patch="1">A050304-1</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/648406">VU#648406</ref>
      <ref source="MISC" url="http://www.securiteam.com/securitynews/5QP0115CUO.html">http://www.securiteam.com/securitynews/5QP0115CUO.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16049">applefileserver-afp-pathname-bo(16049)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3.3" prev="1"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.3.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0431" seq="2004-0431" published="2004-07-07" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in Apple QuickTime (QuickTime.qts) before 6.5.1 allows attackers to execute arbitrary code via a large "number of entries" field in the sample-to-chunk table data for a .mov movie file, which leads to a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/mhonarc/security-announce/msg00048.html">APPLE-SA-2004-04-30</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360110618389&amp;w=2">20040502 EEYE: Apple QuickTime (QuickTime.qts) Heap Overflow</ref>
      <ref source="NTBUGTRAQ" url="http://marc.info/?l=ntbugtraq&amp;m=108356485013237&amp;w=2">20040502 EEYE: Apple QuickTime (QuickTime.qts) Heap Overflow</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/782958">VU#782958</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16026">quicktime-heap-bo(16026)</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="6.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0432" seq="2004-0432" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ProFTPD 1.2.9 treats the Allow and Deny directives for CIDR based ACL entries as if they were AllowAll, which could allow FTP clients to bypass intended access restrictions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.proftpd.org/show_bug.cgi?id=2267">http://bugs.proftpd.org/show_bug.cgi?id=2267</ref>
      <ref source="TRUSTIX" url="http://marc.info/?l=bugtraq&amp;m=108335030208523&amp;w=2">2004-0025</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108335051011341&amp;w=2">20040430 [OpenPKG-SA-2004.018] OpenPKG Security Advisory (proftpd)</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:041">MDKSA-2004:041</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10252" adv="1" patch="1">10252</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16038">proftpd-cidr-acl-bypass(16038)</ref>
    </refs>
    <vuln_soft>
      <prod name="proftpd" vendor="proftpd_project">
        <vers num="1.2.9"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="0.5"/>
        <vers num="0.7"/>
        <vers num="1.1a"/>
        <vers num="1.2"/>
        <vers num="1.4" edition="rc1"/>
        <vers num="1.4" edition="rc2"/>
        <vers num="1.4" edition="rc3"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0433" seq="2004-0433" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the Real-Time Streaming Protocol (RTSP) client for (1) MPlayer before 1.0pre4 and (2) xine lib (xine-lib) before 1-rc4, when playing Real RTSP (realrtsp) streams, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (a) long URLs, (b) long Real server responses, or (c) long Real Data Transport (RDT) packets.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-24.xml" adv="1">GLSA-200405-24</ref>
      <ref source="CONFIRM" url="http://www.xinehq.de/index.php/security/XSA-2004-3">http://www.xinehq.de/index.php/security/XSA-2004-3</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16019">mplayer-rtsp-rdt-bo(16019)</ref>
    </refs>
    <vuln_soft>
      <prod name="mplayer" vendor="mplayer">
        <vers num="1.0_pre3try2"/>
      </prod>
      <prod name="xine-lib" vendor="xine">
        <vers num="1_beta1"/>
        <vers num="1_beta2"/>
        <vers num="1_beta3"/>
        <vers num="1_beta4"/>
        <vers num="1_beta5"/>
        <vers num="1_beta6"/>
        <vers num="1_beta7"/>
        <vers num="1_beta8"/>
        <vers num="1_beta9"/>
        <vers num="1_beta10"/>
        <vers num="1_beta11"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3a"/>
        <vers num="1_rc3b"/>
        <vers num="1_rc3c"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0434" seq="2004-0434" published="2004-07-07" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">k5admind (kadmind) for Heimdal allows remote attackers to execute arbitrary code via a Kerberos 4 compatibility administration request whose framing length is less than 2, which leads to a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc">FreeBSD-SA-04:09</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html">20040506 Advisory: Heimdal kadmind version4 remote heap overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108386148126457&amp;w=2">20040505 Advisory: Heimdal kadmind version4 remote heap overflow</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-23.xml">GLSA-200405-23</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-504" adv="1" patch="1">DSA-504</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16071">heimdal-kadmind-bo(16071)</ref>
    </refs>
    <vuln_soft>
      <prod name="heimdal" vendor="kth">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0435" seq="2004-0435" published="2004-08-18" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Certain "programming errors" in the msync system call for FreeBSD 5.2.1 and earlier, and 4.10 and earlier, do not properly handle the MS_INVALIDATE operation, which leads to cache consistency problems that allow a local user to prevent certain changes to files from being committed to disk.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:11.msync.asc">FreeBSD-SA-04:11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10416">10416</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16254">freebsd-msync-gain-privileges(16254)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="4.0" edition="releng"/>
        <vers num="4.8" edition="pre-release"/>
        <vers num="4.8" edition="release_p6"/>
        <vers num="4.8" edition="releng"/>
        <vers num="4.9" edition="pre-release"/>
        <vers num="4.9" edition="releng"/>
        <vers num="4.10" edition="release"/>
        <vers num="4.10" edition="releng"/>
        <vers num="5.2"/>
        <vers num="5.2.1" edition="release"/>
        <vers num="5.2.1" edition="releng"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0437" seq="2004-0437" published="2004-07-07" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Titan FTP Server version 3.01 build 163, and possibly other versions before build 169, allows remote authenticated users to cause a denial of service (crash) by disconnecting from the system during a "LIST -L" command, which causes Titan to access an invalid socket.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q2/0025.html" adv="1" patch="1">20040505 Titan FTP Server Aborted LIST DoS</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108378048513596&amp;w=2">20040505 Titan FTP Server Aborted LIST DoS</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5RP0215CUU.html" adv="1" patch="1">http://www.securiteam.com/windowsntfocus/5RP0215CUU.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16057">titan-list-command-dos(16057)</ref>
    </refs>
    <vuln_soft>
      <prod name="titan_ftp_server" vendor="south_river_technologies">
        <vers num="3.01_build_163"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0444" seq="2004-0444" published="2004-07-07" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allow remote attackers to cause a denial of service or execute arbitrary code via (1) a manipulated length byte in the first-level decoding routine for NetBIOS Name Service (NBNS) that modifies an index variable and leads to a stack-based buffer overflow, (2) a heap-based corruption problem in an NBNS response that is missing certain RR fields, and (3) a stack-based buffer overflow in the DNS component via a Resource Record (RR) with a long canonical name (CNAME) field composed of many smaller components.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021360.html">20040512 EEYE: Symantec Multiple Firewall NBNS Response Processing Stack Overflow</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021361.html">20040512 EEYE: Symantec Multiple Firewall Remote DNS KERNEL Overflow</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021362.html">20040512 EEYE: Symantec Multiple Firewall NBNS Response Remote Heap Corruption</ref>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html">http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010144">1010144</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010145">1010145</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010146">1010146</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-141.shtml">O-141</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/294998" adv="1" patch="1">VU#294998</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/634414" adv="1" patch="1">VU#634414</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/637318">VU#637318</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10333">10333</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10334">10334</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10335">10335</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16134">symantec-nbns-response-bo(16134)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16135">symantec-firewalls-nbns-bo(16135)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16137">symantec-dns-response-bo(16137)</ref>
    </refs>
    <vuln_soft>
      <prod name="client_firewall" vendor="symantec">
        <vers num="5.01"/>
        <vers num="5.1.1"/>
      </prod>
      <prod name="client_security" vendor="symantec">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="1.8"/>
        <vers num="1.9"/>
        <vers num="2.0"/>
      </prod>
      <prod name="norton_antispam" vendor="symantec">
        <vers num="2004"/>
      </prod>
      <prod name="norton_internet_security" vendor="symantec">
        <vers num="2002" edition=":pro"/>
        <vers num="2003" edition=":pro"/>
        <vers num="2004" edition=":pro"/>
      </prod>
      <prod name="norton_personal_firewall" vendor="symantec">
        <vers num="2002"/>
        <vers num="2003"/>
        <vers num="2004"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0445" seq="2004-0445" published="2004-07-07" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a DNS response with a compressed name pointer that points to itself.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021359.html">20040512 EEYE: Symantec Multiple Firewall DNS Response Denial-of-Service</ref>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html" adv="1" patch="1">http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010144">1010144</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010145">1010145</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010146">1010146</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-141.shtml">O-141</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/682110" adv="1" patch="1">VU#682110</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10336">10336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16132">symantec-firewall-dns-dos(16132)</ref>
    </refs>
    <vuln_soft>
      <prod name="client_firewall" vendor="symantec">
        <vers num="5.01"/>
        <vers num="5.1.1"/>
      </prod>
      <prod name="client_security" vendor="symantec">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="1.8"/>
        <vers num="1.9"/>
        <vers num="2.0"/>
      </prod>
      <prod name="norton_antispam" vendor="symantec">
        <vers num="2004"/>
      </prod>
      <prod name="norton_internet_security" vendor="symantec">
        <vers num="2002" edition=":pro"/>
        <vers num="2003" edition=":pro"/>
        <vers num="2004" edition=":pro"/>
      </prod>
      <prod name="norton_personal_firewall" vendor="symantec">
        <vers num="2002"/>
        <vers num="2003"/>
        <vers num="2004"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0447" seq="2004-0447" published="2004-08-06" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Linux before 2.4.26 for IA64 allows local users to cause a denial of service, with unknown impact.  NOTE: due to a typo, this issue was accidentally assigned CVE-2004-0477.  This is the proper candidate to use for the Linux local DoS.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc">20040804-01-U</ref>
      <ref source="MLIST" url="http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html" adv="1">[owl-users] 20040619 Linux 2.4.26-ow2</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-16.xml">GLSA-200407-16</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-193.shtml">O-193</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-413.html">RHSA-2004:413</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10783" adv="1" patch="1">10783</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16661">linux-ia64-dos(16661)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10918">oval:org.mitre.oval:def:10918</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.25" prev="1" edition=":ia64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0448" seq="2004-0448" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the log function for jftpgw 0.13.4 and earlier allows remote authenticated users to execute arbitrary code via format string specifiers in certain syslog messages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-510" adv="1" patch="1">DSA-510</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10438" adv="1" patch="1">10438</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16271">jftpgw-log-format-string(16271)</ref>
    </refs>
    <vuln_soft>
      <prod name="jftpgw" vendor="jftpgw">
        <vers num="0.13"/>
        <vers num="0.13.1"/>
        <vers num="0.13.2"/>
        <vers num="0.13.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0449" seq="2004-0449" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0450" seq="2004-0450" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the printlog function in log2mail before 0.2.5.2 allows local users or remote attackers to execute arbitrary code via format string specifiers in a logfile monitored by log2mail.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://felinemenace.org/~jaguar/advisories/log2mail.txt">http://felinemenace.org/~jaguar/advisories/log2mail.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-513" adv="1" patch="1">DSA-513</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10460" adv="1" patch="1">10460</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16311">log2mail-syslog-format-string(16311)</ref>
    </refs>
    <vuln_soft>
      <prod name="log2mail" vendor="log2mail">
        <vers num="0.2.2.2"/>
        <vers num="0.2.5.0"/>
        <vers num="0.2.5.1"/>
        <vers num="0.2.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0451" seq="2004-0451" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple format string vulnerabilities in the (1) logquit, (2) logerr, or (3) loginfo functions in Software Upgrade Protocol (SUP) allows remote attackers to execute arbitrary code via format string specifiers in messages that are logged by syslog.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010539">1010539</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-521" adv="1" patch="1">DSA-521</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10571" adv="1" patch="1">10571</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16459">sup-format-string(16459)</ref>
    </refs>
    <vuln_soft>
      <prod name="sup" vendor="sup">
        <vers num="1.8"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0452" seq="2004-0452" published="2004-12-21" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U">20060101-01-U</ref>
      <ref source="FEDORA" url="http://fedoranews.org/updates/FEDORA--.shtml">FLSA-2006:152845</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110547693019788&amp;w=2">20050111 [OpenPKG-SA-2005.001] OpenPKG Security Advisory (perl)</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-620" adv="1" patch="1">DSA-620</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml" adv="1" patch="1">GLSA-200501-38</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-103.html" adv="1" patch="1">RHSA-2005:103</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-105.html">RHSA-2005:105</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12072">12072</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18650">perl-filepathrmtree-insecure-permissions(18650)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9938">oval:org.mitre.oval:def:9938</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-44-1/">USN-44-1</ref>
    </refs>
    <vuln_soft>
      <prod name="perl" vendor="larry_wall">
        <vers num="5.6.1"/>
        <vers num="5.8.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0453" seq="2004-0453" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the monitor "memory dump" command in VICE 1.6 to 1.14 allows local users to cause a denial of service (emulator crash) and possibly execute arbitrary code via format string specifiers in an output string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108723630730487&amp;w=2">20040614 VICE emulator format string vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10543" adv="1" patch="1">10543</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16404">vice-memory-dump-format-string(16404)</ref>
    </refs>
    <vuln_soft>
      <prod name="vice" vendor="vice">
        <vers num="1.6"/>
        <vers num="1.13"/>
        <vers num="1.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0454" seq="2004-0454" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the msg function for rlpr daemon (rlprd) 2.04 allows local users to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-524" adv="1" patch="1">DSA-524</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10578" adv="1" patch="1">10578</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16454">rlpr-msg-bo(16454)</ref>
    </refs>
    <vuln_soft>
      <prod name="rlpr" vendor="rlpr">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0455" seq="2004-0455" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in cgi.c in www-sql before 0.5.7 allows local users to execute arbitrary code via a web page that is processed by www-sql.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-523">DSA-523</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10577">10577</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16455">wwwsql-cgi-command-execution(16455)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0456" seq="2004-0456" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.6" CVSS_base_score="7.6" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in pavuk 0.9pl28, 0.9pl27, and possibly other versions allows remote web sites to execute arbitrary code via a long HTTP Location header.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023322.html">20040702 pavuk buffer overflow</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-22.xml" adv="1" patch="1">GLSA-200406-22</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-527" adv="1" patch="1">DSA-527</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10633" adv="1" patch="1">10633</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16551">pavuk-location-bo(16551)</ref>
    </refs>
    <vuln_soft>
      <prod name="pavuk" vendor="pavuk">
        <vers num="0.9pl28i"/>
        <vers num="0.928r1"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.1a"/>
        <vers num="1.2"/>
        <vers num="1.4" edition="rc1"/>
        <vers num="1.4" edition="rc2"/>
        <vers num="1.4" edition="rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0457" seq="2004-0457" published="2004-09-28" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The mysqlhotcopy script in mysql 4.0.20 and earlier, when using the scp method from the mysql-server package, allows local users to overwrite arbitrary files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-018.shtml">P-018</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-540">DSA-540</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-597.html" adv="1" patch="1">RHSA-2004:597</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17030">mysql-mysqlhotcopy-insecure-file(17030)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10693">oval:org.mitre.oval:def:10693</ref>
    </refs>
    <vuln_soft>
      <prod name="mysql" vendor="mysql">
        <vers num="4.0.20" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0458" seq="2004-0458" published="2004-09-28" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">mah-jong before 1.6.2 allows remote attackers to cause a denial of service (server crash) via a missing argument, which triggers a null pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-503" adv="1" patch="1">DSA-503</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10343" adv="1" patch="1">10343</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16143">mah-jong-null-dos(16143)</ref>
    </refs>
    <vuln_soft>
      <prod name="mah-jong" vendor="nicolas_boullis">
        <vers num="1.4"/>
        <vers num="1.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0459" seq="2004-0459" published="2004-07-07" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Clear Channel Assessment (CCA) algorithm in the IEEE 802.11 wireless protocol, when using DSSS transmission encoding, allows remote attackers to cause a denial of service via a certain RF signal that causes a channel to appear busy (aka "jabber"), which prevents devices from transmitting data.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0631.html">20040513 802.11b (others) single packet DoS</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010152">1010152</ref>
      <ref source="MISC" url="http://support.avaya.com/elmodocs2/security/ASA-2004-009.pdf">http://support.avaya.com/elmodocs2/security/ASA-2004-009.pdf</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4091" adv="1">AA-2004.02</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/106678" adv="1">VU#106678</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10342">10342</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16138">ieee80211-cca-dos(16138)</ref>
    </refs>
    <vuln_soft>
      <prod name="802.11_wireless_protocol" vendor="ieee">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0460" seq="2004-0460" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the logging capability for the DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13 allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via multiple hostname options in (1) DISCOVER, (2) OFFER, (3) REQUEST, (4) ACK, or (5) NAK messages, which can generate a long string when writing to a log file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108795911203342&amp;w=2">20040622 DHCP Vuln // no code 0day //</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108843959502356&amp;w=2">20040628 ISC DHCP overflows</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108938625206063&amp;w=2">20040708 [OpenPKG-SA-2004.031] OpenPKG Security Advisory (dhcpd)</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/317350">VU#317350</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:061">MDKSA-2004:061</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_19_dhcp_server.html">SuSE-SA:2004:019</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10590" adv="1" patch="1">10590</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-174A.html" adv="1">TA04-174A</ref>
      <ref source="CONFIRM" url="http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf">http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16475">dhcp-ascii-log-bo(16475)</ref>
    </refs>
    <vuln_soft>
      <prod name="dhcpd" vendor="isc">
        <vers num="3.0.1" edition="rc12"/>
        <vers num="3.0.1" edition="rc13"/>
      </prod>
      <prod name="suse_email_server" vendor="suse">
        <vers num="iii"/>
      </prod>
      <prod name="suse_linux_admin-cd_for_firewall" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_connectivity_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_database_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_firewall_cd" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_office_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="dns_one_appliance" vendor="infoblox">
        <vers num="2.3.1_r5"/>
        <vers num="2.4.0.8"/>
        <vers num="2.4.0.8a"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.0"/>
        <vers num="9.1" edition=":ppc"/>
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="7" edition=":enterprise_server"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0461" seq="2004-0461" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13, when compiled in environments that do not provide the vsnprintf function, uses C include files that define vsnprintf to use the less safe vsprintf function, which can lead to buffer overflow vulnerabilities that enable a denial of service (server crash) and possibly execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108795911203342&amp;w=2">20040622 DHCP Vuln // no code 0day //</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108843959502356&amp;w=2">20040628 ISC DHCP overflows</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108938625206063&amp;w=2">20040708 [OpenPKG-SA-2004.031] OpenPKG Security Advisory (dhcpd)</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/654390">VU#654390</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:061">MDKSA-2004:061</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_19_dhcp_server.html">SuSE-SA:2004:019</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10591" adv="1" patch="1">10591</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-174A.html" adv="1">TA04-174A</ref>
      <ref source="CONFIRM" url="http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf">http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16476">dhcp-c-include-bo(16476)</ref>
    </refs>
    <vuln_soft>
      <prod name="dhcpd" vendor="isc">
        <vers num="3.0.1" edition="rc12"/>
        <vers num="3.0.1" edition="rc13"/>
      </prod>
      <prod name="suse_email_server" vendor="suse">
        <vers num="iii"/>
      </prod>
      <prod name="suse_linux_admin-cd_for_firewall" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_connectivity_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_database_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_firewall_cd" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_office_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="dns_one_appliance" vendor="infoblox">
        <vers num="2.3.1_r5"/>
        <vers num="2.4.0.8"/>
        <vers num="2.4.0.8a"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.0"/>
        <vers num="9.1" edition=":ppc"/>
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="7" edition=":enterprise_server"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0462" seq="2004-0462" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The built-in web servers for multiple networking devices do not set the Secure attribute for sensitive cookies in HTTPS sessions, which could cause the user agent to send those cookies in plaintext over an HTTP session with the same server.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/546483" adv="1">VU#546483</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17702">network-device-secure-plaintext(17702)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0463" seq="2004-0463" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0464" seq="2004-0464" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0465" seq="2004-0465" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in jretest.html in WebConnect 6.5 and 6.4.4, and possibly earlier versions, allows remote attackers to read keys within arbitrary INI formatted files via "..//" sequences in the WCP_USER parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110910838600145&amp;w=2">20050220 The WebConnect 6.4.4 and 6.5 contains several vulnerabilities</ref>
      <ref source="MISC" url="http://www.cirt.dk/advisories/cirt-29-advisory.pdf" adv="1" patch="1">http://www.cirt.dk/advisories/cirt-29-advisory.pdf</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/628411" adv="1">VU#628411</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/JSHA-69HVPK" adv="1">http://www.kb.cert.org/vuls/id/JSHA-69HVPK</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19394">webconnect-wcpuser-directory-traversal(19394)</ref>
    </refs>
    <vuln_soft>
      <prod name="webconnect" vendor="openconnect">
        <vers num="6.4.4"/>
        <vers num="6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0466" seq="2004-0466" published="2004-02-21" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">WebConnect 6.5, 6.4.4, and possibly earlier versions allows remote attackers to cause a denial of service (hang) via a URL containing an MS-DOS device name such as (1) AUX, (2) CON, (3) PRN, (4) COM1, or (5) LPT1.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110910838600145&amp;w=2">20050220 The WebConnect 6.4.4 and 6.5 contains several vulnerabilities</ref>
      <ref source="MISC" url="http://www.cirt.dk/advisories/cirt-29-advisory.pdf" adv="1">http://www.cirt.dk/advisories/cirt-29-advisory.pdf</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/552561" adv="1" patch="1">VU#552561</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/JSHA-69FVMM" adv="1" patch="1">http://www.kb.cert.org/vuls/id/JSHA-69FVMM</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19393">webconnect-device-name-dos(19393)</ref>
    </refs>
    <vuln_soft>
      <prod name="webconnect" vendor="openconnect">
        <vers num="6.4.4"/>
        <vers num="6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0467" seq="2004-0467" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Juniper JUNOS 5.x through JUNOS 7.x allows remote attackers to cause a denial of service (routing disabled) via a large number of MPLS packets, which are not filtered or verified before being sent to the Routing Engine, which reduces the speed at which other packets are processed.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1013039">1013039</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/409555" adv="1" patch="1">VU#409555</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/JSHA-68ZJCQ" adv="1" patch="1">http://www.kb.cert.org/vuls/id/JSHA-68ZJCQ</ref>
      <ref source="MISC" url="http://www.niscc.gov.uk/niscc/docs/al-20050126-00067.html?lang=en" adv="1" patch="1">http://www.niscc.gov.uk/niscc/docs/al-20050126-00067.html?lang=en</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-081.html">RHSA-2005:081</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12379" patch="1">12379</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19094">junos-dos(19094)</ref>
    </refs>
    <vuln_soft>
      <prod name="junos" vendor="juniper">
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="5.4"/>
        <vers num="5.5"/>
        <vers num="5.6"/>
        <vers num="5.7"/>
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0468" seq="2004-0468" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Memory leak in Juniper JUNOS Packet Forwarding Engine (PFE) allows remote attackers to cause a denial of service (memory exhaustion and device reboot) via certain IPv6 packets.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.jpcert.or.jp/at/2004/at040009.txt" adv="1" patch="1">http://www.jpcert.or.jp/at/2004/at040009.txt</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/658859" adv="1" patch="1">VU#658859</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/JSHA-6253CC" adv="1" patch="1">http://www.kb.cert.org/vuls/id/JSHA-6253CC</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16548">juniper-ipv6-dos(16548)</ref>
    </refs>
    <vuln_soft>
      <prod name="junos" vendor="juniper">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0469" seq="2004-0469" published="2004-07-07" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the ISAKMP functionality for Check Point VPN-1 and FireWall-1 NG products, before VPN-1/FireWall-1 R55 HFA-03, R54 HFA-410 and NG FP3 HFA-325, or VPN-1 SecuRemote/SecureClient R56, may allow remote attackers to execute arbitrary code during VPN tunnel negotiation.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CHECKPOINT" url="http://www.checkpoint.com/techsupport/alerts/ike_vpn.html" adv="1" patch="1">20040504 ISAKMP Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10273" adv="1" patch="1">10273</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16060">vpn1-isakmp-bo(16060)</ref>
    </refs>
    <vuln_soft>
      <prod name="firewall-1" vendor="checkpoint">
        <vers num="" edition=":vsx-ng-ai"/>
        <vers num="2.0" edition=":gx"/>
        <vers num="2.0.1" edition=":vsx"/>
      </prod>
      <prod name="next_generation" vendor="checkpoint">
        <vers num="" edition=":fp3"/>
      </prod>
      <prod name="ng-ai" vendor="checkpoint">
        <vers num="r54"/>
        <vers num="r55"/>
      </prod>
      <prod name="vpn-1" vendor="checkpoint">
        <vers num="vsx_2.0.1"/>
        <vers num="vsx_ng_with_application_intelligence"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0470" seq="2004-0470" published="2004-07-07" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">BEA WebLogic Server and WebLogic Express 7.0 through SP5 and 8.1 through SP2, when editing weblogic.xml using WebLogic Builder or the SecurityRoleAssignmentMBean.toXML method, inadvertently removes security-role-assignment tags when weblogic.xml does not have a principal-name tag, which can remove intended access restrictions for the associated web application.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_59.00.jsp" adv="1" patch="1">http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_59.00.jsp</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010128">1010128</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/950070" adv="1">VU#950070</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10328">10328</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16123">weblogic-application-unauth-access(16123)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="7.0" edition=":express"/>
        <vers num="8.1" edition=":express"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0471" seq="2004-0471" published="2004-07-07" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">BEA WebLogic Server and WebLogic Express 7.0 through SP5 and 8.1 through SP2 does not enforce site restrictions for starting and stopping servers for users in the Admin and Operator security roles, which allows unauthorized users to cause a denial of service (service shutdown).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_60.00.jsp" adv="1" patch="1">http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_60.00.jsp</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010129">1010129</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10327">10327</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16121">weblogic-server-policy-bypass(16121)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="7.0" edition=":express"/>
        <vers num="8.1" edition=":express"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0472" seq="2004-0472" published="2004-07-07" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate is a reservation duplicate of CVE-2004-0434.  Notes: All CVE users should reference CVE-2004-0434 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0473" seq="2004-0473" published="2004-07-07" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Argument injection vulnerability in Opera before 7.50 does not properly filter "-" characters that begin a hostname in a telnet URI, which allows remote attackers to insert options to the resulting command line and overwrite arbitrary files via (1) the "-f" option on Windows XP or (2) the "-n" option on Linux.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-19.xml">GLSA-200405-19</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010142">1010142</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=104&amp;type=vulnerabilities">20040512 Opera Telnet URI Handler File Creation/Truncation Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.opera.com/linux/changelogs/750/index.dml">http://www.opera.com/linux/changelogs/750/index.dml</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10341">10341</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16139">opera-telnet-file-overwrite(16139)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="9.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0474" seq="2004-0474" published="2004-07-07" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Help Center (HelpCtr.exe) may allow remote attackers to read or execute arbitrary files via an "http://" or "file://" argument to the topic parameter in an hcp:// URL.  NOTE: since the initial report of this problem, several researchers have been unable to reproduce this issue.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-02/0440.html" adv="1">20040210 Re: HelpCtr - allow open any page or run</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-02/0450.html">20040210 Re: HelpCtr - allow open any page or run</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-02/0688.html">20040213 Re: HelpCtr - allow open any page or run</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107652584102003&amp;w=2">20040211 Re: HelpCtr - allow open any page or run</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/353248">20040207 HelpCtr - allow open any page or run</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9621" adv="1">9621</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15101">winxp-helpctr-hcp-xss(15101)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":home"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:home"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0475" seq="2004-0475" published="2004-07-07" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The showHelp function in Internet Explorer 6 on Windows XP Pro allows remote attackers to execute arbitrary local .CHM files via a double backward slash ("\\") before the target CHM file, as demonstrated using an "ms-its" URL to ntshared.chm.  NOTE: this bug may overlap CVE-2003-1041.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/363202" adv="1">20040513 Showhelp() local CHM file execution</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10348" adv="1">10348</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16147">ie-showhelp-chm-execution(16147)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0476" seq="2004-0476" published="2004-08-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in 3Com OfficeConnect Remote 812 ADSL Router 1.1.9.4 allows remote attackers to cause a denial of service (reboot or packet loss) via a long string containing Telnet escape characters to the Telnet port.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=105&amp;type=vulnerabilities" adv="1">20040526 OfficeConnect Remote 812 ADSL Router Telnet Protocol DoS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10419" adv="1">10419</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16257">3com-officeconnect-telnet-bo(16257)</ref>
    </refs>
    <vuln_soft>
      <prod name="3cp4144" vendor="3com">
        <vers num="1.1.9.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0477" seq="2004-0477" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in 3Com OfficeConnect Remote 812 ADSL Router allows remote attackers to bypass authentication via repeated attempts using any username and password.  NOTE: this identifier was inadvertently re-used for another issue due to a typo; that issue was assigned CVE-2004-0447.  This candidate is ONLY for the ADSL router bypass.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=106&amp;type=vulnerabilities&amp;flashstatus=false" adv="1" patch="1">20040527 iDEFENSE Security Advisory 05.27.04: 3Com OfficeConnect Remote 812 ADSL Router Authentication Bypass Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10426" adv="1" patch="1">10426</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16267">3com-officeconnect-gain-access(16267)</ref>
    </refs>
    <vuln_soft>
      <prod name="3cp4144" vendor="3com">
        <vers num="1.1.9.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0478" seq="2004-0478" published="2004-07-07" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown versions of Mozilla allow remote attackers to cause a denial of service (high CPU/RAM consumption) using Javascript with an infinite loop  that continues to add input to a form, possibly as the result of inserting control characters, as demonstrated using an embedded ctrl-U.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=243540" adv="1">http://bugzilla.mozilla.org/show_bug.cgi?id=243540</ref>
      <ref source="MLIST" url="http://lists.immunitysec.com/pipermail/dailydave/2004-May/000587.html" adv="1">[Dailydave] 20040514 Mozilla bug might even get fixed!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16225">mozilla-javascript-dos(16225)</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0479" seq="2004-0479" published="2004-07-07" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Internet Explorer 6 allows remote attackers to cause a denial of service (crash) via Javascript that creates a new popup window and disables the imagetoolbar functionality with a META tag, which triggers a null dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021500.html">20040514 IE Crash - Anyone Seen This Before?</ref>
      <ref source="VULN-DEV" url="http://marc.info/?l=vuln-dev&amp;m=108457938412310&amp;w=2">20040514 IE Crash - Anyone Seen This Before?</ref>
      <ref source="VULN-DEV" url="http://marc.info/?l=vuln-dev&amp;m=108476938219070&amp;w=2">20040516 Re: IE Crash - Anyone Seen This Before?</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6" edition="windows_server_2003_sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0480" seq="2004-0480" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Argument injection vulnerability in IBM Lotus Notes 6.0.3 and 6.5 allows remote attackers to execute arbitrary code via a notes: URI that uses a UNC network share pathname to provide an alternate notes.ini configuration file to notes.exe.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108843896506099&amp;w=2">20040627 Lotus Notes URL argument injection vulnerability</ref>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=111&amp;type=vulnerabilities" adv="1" patch="1">http://www.idefense.com/application/poi/display?id=111&amp;type=vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10600" adv="1" patch="1">10600</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?rs=475/context=SSKTWP&amp;uid=swg21169510" adv="1" patch="1">http://www-1.ibm.com/support/docview.wss?rs=475/context=SSKTWP&amp;uid=swg21169510</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16496">lotus-notes-xss(16496)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_notes" vendor="ibm">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.5"/>
        <vers num="6.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0481" seq="2004-0481" published="2005-02-23" modified="2018-10-30" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The logging feature in kcms_configure in the KCMS package on Solaris 8 and 9, and possibly other versions, allows local users to corrupt arbitrary files via a symlink attack on the KCS_ClogFile file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57706-1" adv="1" patch="1">57706</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=206&amp;type=vulnerabilities" adv="1" patch="1">20050223 Sun Solaris kcms_configure Arbitrary File Corruption Vulnerability</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0482" seq="2004-0482" published="2004-07-07" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple integer overflows in (1) procfs_cmdline.c, (2) procfs_fpregs.c, (3) procfs_linux.c, (4) procfs_regs.c, (5) procfs_status.c, and (6) procfs_subr.c in procfs for OpenBSD 3.5 and earlier allow local users to read sensitive kernel memory and possibly perform other unauthorized activities.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/020_procfs.patch" patch="1">ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/020_procfs.patch</ref>
      <ref source="CONFIRM" url="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/006_procfs.patch" patch="1">ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/006_procfs.patch</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108481812926420&amp;w=2">20040517 OpenBSD procfs</ref>
      <ref source="MLIST" url="http://marc.info/?l=openbsd-security-announce&amp;m=108445767103004&amp;w=2">[openbsd-security-announce] 20040513 procfs vulnerability</ref>
      <ref source="MISC" url="http://www.deprotect.com/advisories/DEPROTECT-20041305.txt">http://www.deprotect.com/advisories/DEPROTECT-20041305.txt</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata34.html">20040513 [3.4] 020: SECURITY FIX: May 13, 2004</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata35.html">20040513 [3.5] 006: SECURITY FIX: May 13, 2004</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16226">openbsd-procfs-gain-privileges(16226)</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0483" seq="2004-0483" published="2004-07-07" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in rpc.mountd for SGI IRIX 6.5.24 allows remote attackers to cause a denial of service (infinite loop) via certain RPC requests.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040503-01-P">20040503-01-P</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010185">1010185</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10372" patch="1">10372</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16175">rpcmountd-rpc-dos(16175)</ref>
    </refs>
    <vuln_soft>
      <prod name="irix" vendor="sgi">
        <vers num="6.5.24"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0484" seq="2004-0484" published="2004-07-07" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">mshtml.dll in Microsoft Internet Explorer 6.0.2800 allows remote attackers to cause a denial of service (crash) via a table containing a form that crosses multiple td elements, and whose "float: left" class is defined in a link to a CSS stylesheet after the end of the table, which may trigger a null dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108490218632590&amp;w=2">20040518 Unknown IE bug with css-styles</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10382">10382</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16189">ie-css-dos(16189)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0.2900"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0485" seq="2004-0485" published="2004-07-07" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The default protocol helper for the disk: URI on Mac OS X 10.3.3 and 10.2.8 allows remote attackers to write arbitrary files by causing a disk image file (.dmg) to be mounted as a disk volume.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://fundisom.com/owned/warning" adv="1">http://fundisom.com/owned/warning</ref>
      <ref source="APPLE" url="http://lists.apple.com/mhonarc/security-announce/msg00053.html">APPLE-SA-2004-05-21</ref>
      <ref source="APPLE" url="http://lists.seifried.org/pipermail/security/2004-May/003743.html">APPLE-SA-2004-05-28</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/210606" adv="1" patch="1">VU#210606</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16166">macos-runscript-code-execution(16166)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0486" seq="2004-0486" published="2004-07-07" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.6" CVSS_base_score="7.6" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">HelpViewer in Mac OS X 10.3.3 and 10.2.8 processes scripts that it did not initiate, which can allow attackers to execute arbitrary code, an issue that was originally reported as a directory traversal vulnerability in the Safari web browser using the runscript parameter in a help: URI handler.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0837.html">20040516 Vuln. MacOSX/Safari: Remote help-call, execute scripts</ref>
      <ref source="APPLE" url="http://lists.apple.com/mhonarc/security-announce/msg00053.html">APPLE-SA-2004-05-21</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010167">1010167</ref>
      <ref source="MISC" url="http://www.fundisom.com/owned/warning" adv="1">http://www.fundisom.com/owned/warning</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/578798" adv="1" patch="1">VU#578798</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10356" adv="1" patch="1">10356</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16166">macos-runscript-code-execution(16166)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0487" seq="2004-0487" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">A certain ActiveX control in Symantec Norton AntiVirus 2004 allows remote attackers to cause a denial of service (resource consumption) and possibly execute arbitrary programs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108515369718455&amp;w=2">20040521 [SNS Advisory No.72] Symantec Norton AntiVirus 2004 ActiveX Control Vulnerability</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-149.shtml">O-149</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/312510" adv="1">VU#312510</ref>
      <ref source="MISC" url="http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/72_e.html">http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/72_e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10392" adv="1">10392</ref>
      <ref source="CONFIRM" url="http://www.symantec.com/avcenter/security/Content/2004.05.20.html">http://www.symantec.com/avcenter/security/Content/2004.05.20.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16220">nav-activex-code-execution(16220)</ref>
    </refs>
    <vuln_soft>
      <prod name="norton_antivirus" vendor="symantec">
        <vers num="2.1" edition=":ms_exchange"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0488" seq="2004-0488" published="2004-07-07" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc">20040605-01-U</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021610.html">20040517 mod_ssl ssl_util_uuencode_binary potential problem</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108567431823750&amp;w=2">20040527 [OpenPKG-SA-2004.026] OpenPKG Security Advisory (apache)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108619129727620&amp;w=2">20040601 TSSA-2004-008 - apache</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109181600614477&amp;w=2">SSRT4777</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109215056218824&amp;w=2">SSRT4788</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-245.html">RHSA-2004:245</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-05.xml">GLSA-200406-05</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-532">DSA-532</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:054">MDKSA-2004:054</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:055">MDKSA-2004:055</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-342.html">RHSA-2004:342</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-405.html">RHSA-2004:405</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-816.html">RHSA-2005:816</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10355" adv="1" patch="1">10355</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0031/">2004-0031</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1888">FLSA:1888</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16214">apache-modssl-uuencode-bo(16214)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11458">oval:org.mitre.oval:def:11458</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.6"/>
        <vers num="1.3.7" edition=":dev"/>
        <vers num="1.3.9"/>
        <vers num="1.3.11"/>
        <vers num="1.3.12"/>
        <vers num="1.3.14"/>
        <vers num="1.3.17"/>
        <vers num="1.3.18"/>
        <vers num="1.3.19"/>
        <vers num="1.3.20"/>
        <vers num="1.3.22"/>
        <vers num="1.3.23"/>
        <vers num="1.3.24"/>
        <vers num="1.3.25"/>
        <vers num="1.3.26"/>
        <vers num="1.3.27"/>
        <vers num="1.3.28"/>
        <vers num="1.3.29"/>
        <vers num="1.3.31"/>
        <vers num="2.0"/>
        <vers num="2.0.9"/>
        <vers num="2.0.28" edition="beta"/>
        <vers num="2.0.32"/>
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.0.40"/>
        <vers num="2.0.41"/>
        <vers num="2.0.42"/>
        <vers num="2.0.43"/>
        <vers num="2.0.44"/>
        <vers num="2.0.45"/>
        <vers num="2.0.46"/>
        <vers num="2.0.47"/>
        <vers num="2.0.48"/>
        <vers num="2.0.49"/>
      </prod>
      <prod name="mandrake_multi_network_firewall" vendor="mandrakesoft">
        <vers num="8.2"/>
      </prod>
      <prod name="mod_ssl" vendor="mod_ssl">
        <vers num="2.8.7"/>
        <vers num="2.8.10"/>
        <vers num="2.8.12"/>
        <vers num="2.8.15"/>
        <vers num="2.8.16"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
      </prod>
      <prod name="tinysofa_enterprise_server" vendor="tinysofa">
        <vers num="1.0"/>
        <vers num="1.0_u1"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.1" edition=":ppc"/>
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4"/>
        <vers num="3.5"/>
        <vers num="current"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0489" seq="2004-0489" published="2004-07-07" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.6" CVSS_base_score="7.6" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Argument injection vulnerability in the SSH URI handler for Safari on Mac OS 10.3.3 and earlier allows remote attackers to (1) execute arbitrary code via the ProxyCommand option or (2) conduct port forwarding via the -R option.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021871.html">20040524 SSH URI handler remote arbitrary code execution</ref>
      <ref source="MISC" url="http://www.insecure.ws/article.php?story=200405222251133" adv="1">http://www.insecure.ws/article.php?story=200405222251133</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16242">macos-ssh-code-execution(16242)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0490" seq="2004-0490" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">cPanel, when compiling Apache 1.3.29 and PHP with the mod_phpsuexec option, does not set the --enable-discard-path option, which causes php to use the SCRIPT_FILENAME variable to find and execute a script instead of the PATH_TRANSLATED variable, which allows local users to execute arbitrary PHP code as other users via a URL that references the attacker's script after the user's script, which executes the attacker's script with the user's privileges, a different vulnerability than CVE-2004-0529.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugzilla.cpanel.net/show_bug.cgi?id=283">http://bugzilla.cpanel.net/show_bug.cgi?id=283</ref>
      <ref source="CONFIRM" url="http://bugzilla.cpanel.net/show_bug.cgi?id=664">http://bugzilla.cpanel.net/show_bug.cgi?id=664</ref>
      <ref source="MISC" url="http://www.a-squad.com/audit/explain10.html">http://www.a-squad.com/audit/explain10.html</ref>
      <ref source="MISC" url="http://www.securiteam.com/tools/5TP0N15CUA.html" adv="1">http://www.securiteam.com/tools/5TP0N15CUA.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/364112">20040524 cPanel mod_phpsuexec Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10407" adv="1">10407</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16239">cpanel-modphpsuexec-execute-commands(16239)</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="5.0"/>
        <vers num="5.3"/>
        <vers num="6.0"/>
        <vers num="6.2"/>
        <vers num="6.4"/>
        <vers num="6.4.1"/>
        <vers num="6.4.2"/>
        <vers num="6.4.2_stable_48"/>
        <vers num="7.0"/>
        <vers num="8.0"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.1.0_r85"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0491" seq="2004-0491" published="2004-12-31" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The linux-2.4.21-mlock.patch in Red Hat Enterprise Linux 3 does not properly maintain the mlock page count when one process unlocks pages that belong to another process, which allows local users to mlock more memory than specified by the rlimit.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U">20060402-01-U</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=108087017610947&amp;w=2">[linux-kernel] 20040402 Re: disable-cap-mlock</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-472.html">RHSA-2005:472</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/13769">13769</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10672">oval:org.mitre.oval:def:10672</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1117">oval:org.mitre.oval:def:1117</ref>
    </refs>
    <vuln_soft>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0492" seq="2004-0492" published="2004-08-06" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc">20040605-01-U</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108711172710140&amp;w=2">20040611 [OpenPKG-SA-2004.029] OpenPKG Security Advisory (apache)</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=130497311408250&amp;w=2">SSRT090208</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-245.html" adv="1" patch="1">RHSA-2004:245</ref>
      <ref source="FULLDISC" url="http://seclists.org/lists/fulldisclosure/2004/Jun/0296.html">20040610 Buffer overflow in apache mod_proxy,yet still apache much better than windows</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1">101555</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1">101841</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1">57628</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-525" adv="1" patch="1">DSA-525</ref>
      <ref source="MISC" url="http://www.guninski.com/modproxy1.html">http://www.guninski.com/modproxy1.html</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/541310">VU#541310</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:065">MDKSA-2004:065</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1737">FLSA:1737</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16387">apache-modproxy-contentlength-bo(16387)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100112">oval:org.mitre.oval:def:100112</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4863">oval:org.mitre.oval:def:4863</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="1.3.26"/>
        <vers num="1.3.27"/>
        <vers num="1.3.28"/>
        <vers num="1.3.29"/>
        <vers num="1.3.31"/>
      </prod>
      <prod name="virtualvault" vendor="hp">
        <vers num="11.0.4"/>
      </prod>
      <prod name="webproxy" vendor="hp">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
      <prod name="http_server" vendor="ibm">
        <vers num="1.3.26"/>
        <vers num="1.3.26.1"/>
        <vers num="1.3.26.2"/>
        <vers num="1.3.28"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
      </prod>
      <prod name="vvos" vendor="hp">
        <vers num="11.04"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0493" seq="2004-0493" published="2004-08-06" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote attackers to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading to a heap-based buffer overflow on 64 bit systems, via long header lines with large numbers of space or tab characters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/023133.html">20040628 DoS in apache httpd 2.0.49, yet still apache much better than windows</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108853066800184&amp;w=2">20040629 TSSA-2004-012 - apache</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109181600614477&amp;w=2">SSRT4777</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-03.xml">GLSA-200407-03</ref>
      <ref source="CONFIRM" url="http://www.apacheweek.com/features/security-20">http://www.apacheweek.com/features/security-20</ref>
      <ref source="MISC" url="http://www.guninski.com/httpd1.html">http://www.guninski.com/httpd1.html</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:064">MDKSA-2004:064</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-342.html">RHSA-2004:342</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10619" adv="1" patch="1">10619</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0039/">2004-0039</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16524">apache-apgetmimeheaderscore-dos(16524)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10605">oval:org.mitre.oval:def:10605</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0.47"/>
        <vers num="2.0.48"/>
        <vers num="2.0.49"/>
      </prod>
      <prod name="http_server" vendor="ibm">
        <vers num="2.0.42"/>
        <vers num="2.0.42.1"/>
        <vers num="2.0.42.2"/>
        <vers num="2.0.47"/>
        <vers num="2.0.47.1"/>
      </prod>
      <prod name="converged_communications_server" vendor="avaya">
        <vers num="2.0"/>
      </prod>
      <prod name="s8300" vendor="avaya">
        <vers num="r2.0.0"/>
      </prod>
      <prod name="s8500" vendor="avaya">
        <vers num="r2.0.0"/>
      </prod>
      <prod name="s8700" vendor="avaya">
        <vers num="r2.0.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0494" seq="2004-0494" published="2004-11-23" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple extfs backend scripts for GNOME virtual file system (VFS) before 1.0.1 may allow remote attackers to perform certain unauthorized actions via a gnome-vfs URI.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://rpmfind.net/linux/RPM/suse/9.3/i386/suse/i586/gnome-vfs-1.0.5-816.2.i586.html">http://rpmfind.net/linux/RPM/suse/9.3/i386/suse/i586/gnome-vfs-1.0.5-816.2.i586.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-373.html" adv="1" patch="1">RHSA-2004:373</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1944">FLSA:1944</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16897">gnome-vfs-extfs-gain-access(16897)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9854">oval:org.mitre.oval:def:9854</ref>
    </refs>
    <vuln_soft>
      <prod name="cvlan" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0495" seq="2004-0495" published="2004-08-06" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000845">CLA-2004:845</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000846">CLA-2004:846</ref>
      <ref source="FEDORA" url="http://lwn.net/Articles/91155/">FEDORA-2004-186</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-02.xml" adv="1">GLSA-200407-02</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066">MDKSA-2004:066</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_20_kernel.html">SUSE-SA:2004:020</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-255.html" adv="1" patch="1">RHSA-2004:255</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-260.html">RHSA-2004:260</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10566" adv="1" patch="1">10566</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16449">linux-drivers-gain-privileges(16449)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10155">oval:org.mitre.oval:def:10155</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2961">oval:org.mitre.oval:def:2961</ref>
    </refs>
    <vuln_soft>
      <prod name="intuity_audix" vendor="avaya">
        <vers num="" edition=":lx"/>
      </prod>
      <prod name="suse_email_server" vendor="suse">
        <vers num="3.1"/>
        <vers num="iii"/>
      </prod>
      <prod name="suse_linux_admin-cd_for_firewall" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_connectivity_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_database_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_firewall_cd" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_office_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_office_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="converged_communications_server" vendor="avaya">
        <vers num="2.0"/>
      </prod>
      <prod name="s8300" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8500" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8700" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="s3400"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="8.0"/>
        <vers num="9.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.18"/>
        <vers num="2.4.19"/>
        <vers num="2.4.21"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23"/>
        <vers num="2.4.24"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.6.0"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="7" edition=":enterprise_server"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0496" seq="2004-0496" published="2004-12-06" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unknown vulnerabilities in Linux kernel 2.6 allow local users to gain privileges or access kernel memory, a different set of vulnerabilities than those identified in CVE-2004-0495, as found by the Sparse source code checking tool.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_20_kernel.html">SUSE-SA:2004:020</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16625">linux-gain-privileges(16625)</ref>
    </refs>
    <vuln_soft>
      <prod name="mandrake_multi_network_firewall" vendor="mandrakesoft">
        <vers num="8.2"/>
      </prod>
      <prod name="suse_email_server" vendor="suse">
        <vers num="3"/>
        <vers num="3.1"/>
      </prod>
      <prod name="suse_linux_connectivity_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_database_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_firewall" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_office_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.1"/>
        <vers num="9.2"/>
        <vers num="10.0"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1"/>
      </prod>
      <prod name="solaris" vendor="sun">
        <vers num="9.0" edition=":sparc"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
        <vers num="5.9"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="7" edition=":enterprise_server"/>
        <vers num="8" edition=":enterprise_server"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0497" seq="2004-0497" published="2004-12-06" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000852" adv="1" patch="1">CLA-2004:852</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066" adv="1" patch="1">MDKSA-2004:066</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_20_kernel.html">SUSE-SA:2004:020</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-354.html" adv="1" patch="1">RHSA-2004:354</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-360.html">RHSA-2004:360</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16599">linux-fchown-groupid-modify(16599)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9867">oval:org.mitre.oval:def:9867</ref>
    </refs>
    <vuln_soft>
      <prod name="mandrake_multi_network_firewall" vendor="mandrakesoft">
        <vers num="8.2"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="10"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.0"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.1"/>
        <vers num="9.2"/>
        <vers num="10.0"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0498" seq="2004-0498" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The H.323 protocol agent in StoneSoft firewall engine 2.2.8 and earlier allows remote attackers to cause a denial of service (crash) via crafted H.323 packets.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.stonesoft.com/support/Security_Advisories/6735.html" adv="1">http://www.stonesoft.com/support/Security_Advisories/6735.html</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/niscc/docs/re-20041026-00956.pdf?lang=en" adv="1">http://www.uniras.gov.uk/niscc/docs/re-20041026-00956.pdf?lang=en</ref>
    </refs>
    <vuln_soft>
      <prod name="firewall_engine" vendor="stonesoft">
        <vers num="2.2.8" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0499" seq="2004-0499" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0500" seq="2004-0500" published="2004-09-28" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gaim.sourceforge.net/security/?id=0">http://gaim.sourceforge.net/security/?id=0</ref>
      <ref source="FEDORA" url="http://www.fedoranews.org/updates/FEDORA-2004-278.shtml">FEDORA-2004-278</ref>
      <ref source="FEDORA" url="http://www.fedoranews.org/updates/FEDORA-2004-279.shtml">FEDORA-2004-279</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-12.xml" adv="1" patch="1">GLSA-200408-12</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-27.xml">GLSA-200408-27</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:081">MDKSA-2004:081</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_25_gaim.html">SUSE-SA:2004:025</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-400.html">RHSA-2004:400</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10865" adv="1" patch="1">10865</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16920">gaim-msn-bo(16920)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9429">oval:org.mitre.oval:def:9429</ref>
    </refs>
    <vuln_soft>
      <prod name="gaim" vendor="rob_flynn">
        <vers num="0.10"/>
        <vers num="0.10.3"/>
        <vers num="0.50"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.55"/>
        <vers num="0.56"/>
        <vers num="0.57"/>
        <vers num="0.58"/>
        <vers num="0.59"/>
        <vers num="0.59.1"/>
        <vers num="0.60"/>
        <vers num="0.61"/>
        <vers num="0.62"/>
        <vers num="0.63"/>
        <vers num="0.64"/>
        <vers num="0.65"/>
        <vers num="0.66"/>
        <vers num="0.67"/>
        <vers num="0.68"/>
        <vers num="0.69"/>
        <vers num="0.70"/>
        <vers num="0.71"/>
        <vers num="0.72"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.75"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0501" seq="2004-0501" published="2004-08-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Outlook 2003 allows remote attackers to bypass intended access restrictions and cause Outlook to request a URL from a remote site via an HTML e-mail message containing a Vector Markup Language (VML) entity whose src parameter points to the remote site, which could allow remote attackers to know when a message has been read, verify valid e-mail addresses, and possibly leak other information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108430168919965&amp;w=2">20040511 PING: Outlook 2003 Spam</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108637351805607&amp;w=2">20040604 RE: PING: Outlook 2003 Spam</ref>
      <ref source="NTBUGTRAQ" url="http://marc.info/?l=ntbugtraq&amp;m=108644231209698&amp;w=2">20040604 RE: PING: Outlook 2003 Spam</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10323" adv="1">10323</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16116">outlook-vml-obtain-information(16116)</ref>
    </refs>
    <vuln_soft>
      <prod name="outlook" vendor="microsoft">
        <vers num="2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0502" seq="2004-0502" published="2004-08-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Outlook 2003, when replying to an e-mail message, stores certain files in a predictable location for the "src" of an img tag of the original message, which allows remote attackers to bypass zone restrictions and exploit other issues that rely on predictable locations, as demonstrated using a shell: URI.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108420583612655&amp;w=2">20040509 OUTLOOK 2003: OuchLook</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108637351805607&amp;w=2">20040604 RE: PING: Outlook 2003 Spam</ref>
      <ref source="NTBUGTRAQ" url="http://marc.info/?l=ntbugtraq&amp;m=108644231209698&amp;w=2">20040604 RE: PING: Outlook 2003 Spam</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10307" adv="1">10307</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16104">outlook-file-location-predictable(16104)</ref>
    </refs>
    <vuln_soft>
      <prod name="outlook" vendor="microsoft">
        <vers num="2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0503" seq="2004-0503" published="2004-08-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Microsoft Outlook 2003 allows remote attackers to bypass the default zone restrictions and execute script within media files via a Rich Text Format (RTF) message containing an OLE object for the Windows Media Player, which bypasses Media Player's setting to disallow scripting and may lead to unprompted installation of an executable when exploited in conjunction with predictable-file-location exposures such as CVE-2004-0502.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0885.html">20040517 ROCKET SCIENCE: Outllook 2003</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108483193328605&amp;w=2">20040517 ROCKET SCIENCE: Outllook 2003</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10369" adv="1" patch="1">10369</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16173">outlook-ole-restriction-bypass(16173)</ref>
    </refs>
    <vuln_soft>
      <prod name="outlook" vendor="microsoft">
        <vers num="2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0504" seq="2004-0504" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Ethereal 0.10.3 allows remote attackers to cause a denial of service (crash) via certain SIP messages between Hotsip servers and clients.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc">20040604-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc">20040605-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000916">CLA-2005:916</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-01.xml" adv="1">GLSA-200406-01</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010158">1010158</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-150.shtml">O-150</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00014.html">http://www.ethereal.com/appnotes/enpa-sa-00014.html</ref>
      <ref source="MLIST" url="http://www.ethereal.com/lists/ethereal-users/200405/msg00018.html">[Ethereal-users] 20040503 Re: HotSIP sip-messages crasching ethereal</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-234.html" adv="1" patch="1">RHSA-2004:234</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10347" adv="1" patch="1">10347</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16148">ethereal-sip-packet-dos(16148)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9769">oval:org.mitre.oval:def:9769</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A982">oval:org.mitre.oval:def:982</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.10.3"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0505" seq="2004-0505" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The AIM dissector in Ethereal 0.10.3 allows remote attackers to cause a denial of service (assert error) via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc">20040604-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc">20040605-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000916">CLA-2005:916</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-01.xml" adv="1">GLSA-200406-01</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010158">1010158</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-150.shtml">O-150</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00014.html">http://www.ethereal.com/appnotes/enpa-sa-00014.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-234.html" adv="1" patch="1">RHSA-2004:234</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10347" adv="1" patch="1">10347</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16150">ethereal-aim-dissector-dos(16150)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9433">oval:org.mitre.oval:def:9433</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A986">oval:org.mitre.oval:def:986</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.10.3"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0506" seq="2004-0506" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The SPNEGO dissector in Ethereal 0.9.8 to 0.10.3 allows remote attackers to cause a denial of service (crash) via unknown attack vectors that cause a null pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc">20040604-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc">20040605-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000916">CLA-2005:916</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-01.xml" adv="1">GLSA-200406-01</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010158">1010158</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-150.shtml">O-150</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00014.html">http://www.ethereal.com/appnotes/enpa-sa-00014.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-234.html" adv="1" patch="1">RHSA-2004:234</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10347" adv="1" patch="1">10347</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16151">ethereal-spnego-dos(16151)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9695">oval:org.mitre.oval:def:9695</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A987">oval:org.mitre.oval:def:987</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.10.3"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0507" seq="2004-0507" published="2004-08-18" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the MMSE dissector for Ethereal 0.10.1 to 0.10.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc">20040604-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc">20040605-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000916">CLA-2005:916</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-234.html">RHSA-2004:234</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-01.xml" adv="1">GLSA-200406-01</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010158">1010158</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-150.shtml">O-150</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00014.html" adv="1">http://www.ethereal.com/appnotes/enpa-sa-00014.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10347">10347</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16152">ethereal-mmse-bo(16152)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11026">oval:org.mitre.oval:def:11026</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A988">oval:org.mitre.oval:def:988</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.10.3"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0510" seq="2004-0510" published="2004-12-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in MMDF on OpenServer 5.0.6 and 5.0.7, and possibly other operating systems, may allow attackers to execute arbitrary code, as demonstrated via the execmail program.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.7/SCOSA-2004.7.txt">SCOSA-2004.7</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109889281711636&amp;w=2">20041027 MMDF deliver local root exploit for SCO OpenServer 5.0.7 x86</ref>
      <ref source="MISC" url="http://www.deprotect.com/advisories/DEPROTECT-20040206.txt">http://www.deprotect.com/advisories/DEPROTECT-20040206.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10758" adv="1" patch="1">10758</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16738">openserver-mmdf-bo(16738)</ref>
    </refs>
    <vuln_soft>
      <prod name="openserver" vendor="sco">
        <vers num="5.0.6"/>
        <vers num="5.0.6a"/>
        <vers num="5.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0511" seq="2004-0511" published="2004-12-23" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple unknown vulnerabilities in MMDF on OpenServer 5.0.6 and 5.0.7, and possibly other operating systems, may allow attackers to cause a denial of service by triggering a null dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.7/SCOSA-2004.7.txt" adv="1" patch="1">SCOSA-2004.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10758" adv="1" patch="1">10758</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16739">openserver-mmdf-name-dos(16739)</ref>
    </refs>
    <vuln_soft>
      <prod name="openserver" vendor="sco">
        <vers num="5.0.6"/>
        <vers num="5.0.6a"/>
        <vers num="5.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0512" seq="2004-0512" published="2004-12-23" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple unknown vulnerabilities in MMDF on OpenServer 5.0.6 and 5.0.7, and possibly other operating systems, may allow attackers to cause a denial of service by triggering a core dump.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.7/SCOSA-2004.7.txt" adv="1" patch="1">SCOSA-2004.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10758" adv="1" patch="1">10758</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16740">openserver-mmdf-dos(16740)</ref>
    </refs>
    <vuln_soft>
      <prod name="openserver" vendor="sco">
        <vers num="5.0.6"/>
        <vers num="5.0.6a"/>
        <vers num="5.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0513" seq="2004-0513" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Mac OS X before 10.3.4 has unknown impact and attack vectors related to "logging when tracing system calls."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/May/msg00005.html">APPLE-SA-2004-05-28</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10432">10432</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/May/1010329.html">1010329</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16291">macosx-nfs-logging(16291)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0514" seq="2004-0514" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in LoginWindow for Mac OS X 10.3.4, related to "handling of directory services lookups."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.seifried.org/pipermail/security/2004-May/003743.html">APPLE-SA-2004-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010330">1010330</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/174790" adv="1">VU#174790</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10432" adv="1" patch="1">10432</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16289">macosx-loginwindow-gain-privileges(16289)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0515" seq="2004-0515" published="2004-08-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in LoginWindow for Mac OS X 10.3.4, related to "handling of console log files."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.seifried.org/pipermail/security/2004-May/003743.html">APPLE-SA-2004-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010330">1010330</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10432" adv="1" patch="1">10432</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16289">macosx-loginwindow-gain-privileges(16289)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0516" seq="2004-0516" published="2004-08-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Mac OS X 10.3.4, related to "package installation scripts," a different vulnerability than CVE-2004-0517.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.seifried.org/pipermail/security/2004-May/003743.html">APPLE-SA-2004-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010331">1010331</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10432" adv="1" patch="1">10432</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16290">macosx-package-installation(16290)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0517" seq="2004-0517" published="2004-08-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Mac OS X 10.3.4, related to "handling of process IDs during package installation," a different vulnerability than CVE-2004-0516.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.seifried.org/pipermail/security/2004-May/003743.html">APPLE-SA-2004-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010331">1010331</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10432" adv="1" patch="1">10432</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16290">macosx-package-installation(16290)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0518" seq="2004-0518" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in AppleFileServer for Mac OS X 10.3.4, related to "the use of SSH and reporting errors," has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.seifried.org/pipermail/security/2004-May/003743.html">APPLE-SA-2004-05-28</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010333">1010333</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16288">applefileserver-reporting-error(16288)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0519" seq="2004-0519" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc" patch="1">20040604-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000858">CLA-2004:858</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108334862800260">20040429 SquirrelMail Cross Scripting Attacks....</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-240.html" adv="1" patch="1">RHSA-2004:240</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-16.xml" adv="1">GLSA-200405-16</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-535" adv="1" patch="1">DSA-535</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_19_sr.html" adv="1">SUSE-SR:2005:019</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/advisories/6827" adv="1" patch="1">FEDORA-2004-160</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/361857">20040430 Re: SquirrelMail Cross Scripting Attacks....</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10246" patch="1">10246</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1733" patch="1">FEDORA-2004-1733</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16025">squirrel-composephp-xss(16025)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1006">oval:org.mitre.oval:def:1006</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10274">oval:org.mitre.oval:def:10274</ref>
    </refs>
    <vuln_soft>
      <prod name="propack" vendor="sgi">
        <vers num="3.0"/>
      </prod>
      <prod name="squirrelmail" vendor="squirrelmail">
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0520" seq="2004-0520" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in mime.php for SquirrelMail before 1.4.3 allows remote attackers to insert arbitrary HTML and script via the content-type mail header, as demonstrated using read_body.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc" patch="1">20040604-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000858">CLA-2004:858</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108611554415078&amp;w=2">20040530 RS-2004-1: SquirrelMail "Content-Type" XSS vulnerability</ref>
      <ref source="MLIST" url="http://marc.info/?l=squirrelmail-cvs&amp;m=108532891231712">[squirrelmail-cvs] 20040523 [SM-CVS] CVS: squirrelmail/functions mime.php,1.265.2.27,1.265.2.28</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-240.html" adv="1" patch="1">RHSA-2004:240</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-535" adv="1" patch="1">DSA-535</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200406-08.xml" adv="1">GLSA-200406-08</ref>
      <ref source="MISC" url="http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt" adv="1">http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/advisories/6827" adv="1" patch="1">FEDORA-2004-160</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10439" patch="1">10439</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1733" patch="1">FEDORA-2004-1733</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1012">oval:org.mitre.oval:def:1012</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10766">oval:org.mitre.oval:def:10766</ref>
    </refs>
    <vuln_soft>
      <prod name="open_webmail" vendor="open_webmail">
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="3.0"/>
      </prod>
      <prod name="squirrelmail" vendor="squirrelmail">
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3_rc1"/>
        <vers num="1.5_dev"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0521" seq="2004-0521" published="2004-08-18" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in SquirrelMail before 1.4.3 RC1 allows remote attackers to execute unauthorized SQL statements, with unknown impact, probably via abook_database.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc">20040604-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000858">CLA-2004:858</ref>
      <ref source="MLIST" url="http://marc.info/?l=squirrelmail-cvs&amp;m=108309375029888">[squirrelmail-cvs] 20040427 [SM-CVS] CVS: squirrelmail/functions abook_database.php,1.15.2.1,1.15.2.2</ref>
      <ref source="MLIST" url="http://marc.info/?l=squirrelmail-cvs&amp;m=108532891231712">[squirrelmail-devel] 20040511 [SM-DEVEL] SquirrelMail 1.4.3-RC1 Release</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-240.html">RHSA-2004:240</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-16.xml" adv="1">GLSA-200405-16</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-212.shtml">O-212</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-535">DSA-535</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/advisories/6827">FEDORA-2004-160</ref>
      <ref source="APPLE" url="http://www.securityfocus.com/advisories/7148">APPLE-SA-2004-09-07</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10397" adv="1" patch="1">10397</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1733">FEDORA-2004-1733</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16235">squirrelmail-sql-injection(16235)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1033">oval:org.mitre.oval:def:1033</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11446">oval:org.mitre.oval:def:11446</ref>
    </refs>
    <vuln_soft>
      <prod name="propack" vendor="sgi">
        <vers num="3.0"/>
      </prod>
      <prod name="squirrelmail" vendor="squirrelmail">
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0522" seq="2004-0522" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Gallery 1.4.3 and earlier allows remote attackers to bypass authentication and obtain Gallery administrator privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-10.xml">GLSA-200406-10</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-512" adv="1" patch="1">DSA-512</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10451" adv="1" patch="1">10451</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16301">gallery-user-bypass-authentication(16301)</ref>
    </refs>
    <vuln_soft>
      <prod name="gallery" vendor="gallery_project">
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3_pl1"/>
        <vers num="1.4_pl1"/>
        <vers num="1.4_pl2"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0523" seq="2004-0523" published="2004-08-18" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5) 1.3.3 and earlier allow remote attackers to execute arbitrary code as root.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc">20040604-01-U</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc">20040605-01-U</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000860">CLA-2004:860</ref>
      <ref source="FEDORA" url="http://lwn.net/Articles/88206/">FEDORA-2004-149</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108612325909496&amp;w=2">20040601 MITKRB5-SA-2004-001: buffer overflows in krb5_aname_to_localname</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108619161815320&amp;w=2">20040602 TSSA-2004-009 - kerberos5</ref>
      <ref source="TRUSTIX" url="http://marc.info/?l=bugtraq&amp;m=108619250923790&amp;w=2">2004-0032</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101512-1">101512</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-520" adv="1" patch="1">DSA-520</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200406-21.xml">GLSA-200406-21</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/686862" adv="1">VU#686862</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:056">MDKSA-2004:056</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-236.html">RHSA-2004:236</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10448">10448</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16268">Kerberos-krb5anametolocalname-bo(16268)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10295">oval:org.mitre.oval:def:10295</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2002">oval:org.mitre.oval:def:2002</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A724">oval:org.mitre.oval:def:724</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A991">oval:org.mitre.oval:def:991</ref>
    </refs>
    <vuln_soft>
      <prod name="kerberos" vendor="mit">
        <vers num="1.0"/>
        <vers num="1.0.8"/>
        <vers num="1.2.2.beta1"/>
        <vers num="5-1.1"/>
        <vers num="5-1.2"/>
        <vers num="5-1.2.1"/>
        <vers num="5-1.2.2"/>
        <vers num="5-1.2.3"/>
        <vers num="5-1.2.4"/>
        <vers num="5-1.2.5"/>
        <vers num="5-1.2.6"/>
        <vers num="5-1.2.7"/>
        <vers num="5-1.3" edition="alpha1"/>
        <vers num="5_1.0"/>
        <vers num="5_1.0.6"/>
        <vers num="5_1.1"/>
        <vers num="5_1.1.1"/>
        <vers num="5_1.2" edition="beta1"/>
        <vers num="5_1.2" edition="beta2"/>
        <vers num="5_1.3.3"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
      <prod name="seam" vendor="sun">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
      </prod>
      <prod name="tinysofa_enterprise_server" vendor="tinysofa">
        <vers num="1.0"/>
        <vers num="1.0_u1"/>
      </prod>
      <prod name="solaris" vendor="sun">
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0524" seq="2004-0524" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the chpasswd command in the Change_passwd plugin before 4.0, as used in SquirrelMail, allows local users to gain root privileges via a long user name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108222863917958&amp;w=2">20040417 Squirrelmail Chpasswod bof</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108311782032370&amp;w=2">20040427 Re:  Squirrelmail Chpasswod bof</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10166" adv="1" patch="1">10166</ref>
      <ref source="CONFIRM" url="http://www.squirrelmail.org/plugin_view.php?id=117">http://www.squirrelmail.org/plugin_view.php?id=117</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15889">squirrelmail-chpasswd-binary-bo(15889)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0525" seq="2004-0525" published="2004-08-06" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">HP Integrated Lights-Out (iLO) 1.10 and other versions before 1.55 allows remote attackers to cause a denial of service (hang) by accessing iLO using the TCP/IP reserved port zero.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://seclists.org/lists/bugtraq/2004/May/0281.html">SSRT4724</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10415" adv="1" patch="1">10415</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16251">ilo-port-zero-dos(16251)</ref>
    </refs>
    <vuln_soft>
      <prod name="integrated_lights-out_firmware" vendor="hp">
        <vers num="1.6a"/>
        <vers num="1.10"/>
        <vers num="1.15"/>
        <vers num="1.15a"/>
        <vers num="1.16a"/>
        <vers num="1.20a"/>
        <vers num="1.26a"/>
        <vers num="1.27a"/>
        <vers num="1.40a"/>
        <vers num="1.41a"/>
        <vers num="1.42a"/>
        <vers num="1.50"/>
        <vers num="1.50a"/>
        <vers num="1.51a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0526" seq="2004-0526" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unknown versions of Internet Explorer and Outlook allow remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-05/0161.html">20040517 Microsoft Internet Explorer ImageMap URL Spoof Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108422905510713&amp;w=2">20040510 DEEP SEA PHISHING: Internet Explorer / Outlook Express</ref>
      <ref source="MISC" url="http://www.kurczaba.com/securityadvisories/0405132poc.htm">http://www.kurczaba.com/securityadvisories/0405132poc.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10308" adv="1">10308</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16102">ie-ahref-url-spoofing(16102)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.0"/>
        <vers num="5.0.1" edition="sp1"/>
        <vers num="5.0.1" edition="sp2"/>
        <vers num="5.0.1" edition="sp3"/>
        <vers num="5.0.1" edition="sp4"/>
        <vers num="5.5" edition="sp1"/>
        <vers num="5.5" edition="sp2"/>
        <vers num="6.0" edition="sp1"/>
      </prod>
      <prod name="outlook" vendor="microsoft">
        <vers num="97"/>
        <vers num="98"/>
        <vers num="2000" edition="sp2"/>
        <vers num="2000" edition="sp3"/>
        <vers num="2000" edition="sr1"/>
        <vers num="2002" edition="sp1"/>
        <vers num="2002" edition="sp2"/>
        <vers num="2002" edition="sp3"/>
        <vers num="2003"/>
      </prod>
      <prod name="outlook_express" vendor="microsoft">
        <vers num="4.0"/>
        <vers num="4.01" edition="sp2"/>
        <vers num="4.27.3110"/>
        <vers num="4.72.2106"/>
        <vers num="4.72.3120.0"/>
        <vers num="4.72.3612"/>
        <vers num="5.0"/>
        <vers num="5.0.1"/>
        <vers num="5.5"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0527" seq="2004-0527" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">KDE Konqueror 2.1.1 and 2.2.2 allows remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10383" adv="1">10383</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16102">ie-ahref-url-spoofing(16102)</ref>
    </refs>
    <vuln_soft>
      <prod name="konqueror" vendor="kde">
        <vers num="2.1.1"/>
        <vers num="2.2.2"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.5"/>
        <vers num="3.1"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0528" seq="2004-0528" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Netscape Navigator 7.1 allows remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10389" adv="1">10389</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16102">ie-ahref-url-spoofing(16102)</ref>
    </refs>
    <vuln_soft>
      <prod name="navigator" vendor="netscape">
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0529" seq="2004-0529" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The modified suexec program in cPanel, when configured for mod_php and compiled for Apache 1.3.31 and earlier without mod_phpsuexec, allows local users to execute untrusted shared scripts and gain privileges, as demonstrated using untainted scripts such as (1) proftpdvhosts or (2) addalink.cgi, a different vulnerability than CVE-2004-0490.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.cpanel.net/show_bug.cgi?id=668">http://bugzilla.cpanel.net/show_bug.cgi?id=668</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108663003608211&amp;w=2">20040605 cPanel mod_php suEXEC Taint Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010411">1010411</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10478" adv="1">10478</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16347">cpanel-suexec-command-execute(16347)</ref>
    </refs>
    <vuln_soft>
      <prod name="suexec.patch" vendor="cluecentral">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0530" seq="2004-0530" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The PHP package in Slackware 8.1, 9.0, and 9.1, when linked against a static library, includes /tmp in the search path, which allows local users to execute arbitrary code as the PHP user by inserting shared libraries into the appropriate path.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10461">10461</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.419765" adv="1" patch="1">SSA:2004-154</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16310">linux-php-gain-privileges(16310)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0533" seq="2004-0533" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Business Objects WebIntelligence 2.7.0 through 2.7.4 only enforces access controls on the client, which allows remote authenticated users to delete arbitrary files on the server via a crafted delete request using the InfoView web client.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0056.html" adv="1">20040917 Corsaire Security Advisory - Business Objects WebIntelligence arbitrary document deletion issue</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026549.html" adv="1">20040907 Corsaire Security Advisory - Business Objects WebIntelligence arbitrary document deletion issue</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11208">11208</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17422">webintelligence-url-delete-files(17422)</ref>
    </refs>
    <vuln_soft>
      <prod name="infoview" vendor="businessobjects">
        <vers num="5.1.4"/>
        <vers num="5.1.5"/>
        <vers num="5.1.6"/>
        <vers num="5.1.7"/>
        <vers num="5.1.8"/>
      </prod>
      <prod name="webintelligence" vendor="businessobjects">
        <vers num="2.7"/>
        <vers num="2.7.1"/>
        <vers num="2.7.2"/>
        <vers num="2.7.3"/>
        <vers num="2.7.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0534" seq="2004-0534" published="2004-09-17" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Business Objects InfoView 5.1.4 through 5.1.8 for WebIntelligence 2.7.0 through 2.7.4 allows remote attackers to inject arbitrary web script or HTML via document names when uploading a document.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0057.html" adv="1" patch="1">20040917 Corsaire Security Advisory - Business Objects WebIntelligence XSS issue</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026550.html" adv="1" patch="1">20040907 Corsaire Security Advisory - Business Objects WebIntelligence XSS issue</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11209">11209</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17419">webintelligence-input-document-xss(17419)</ref>
    </refs>
    <vuln_soft>
      <prod name="infoview" vendor="businessobjects">
        <vers num="5.1.4"/>
        <vers num="5.1.5"/>
        <vers num="5.1.6"/>
        <vers num="5.1.7"/>
        <vers num="5.1.8"/>
      </prod>
      <prod name="webintelligence" vendor="businessobjects">
        <vers num="2.7"/>
        <vers num="2.7.1"/>
        <vers num="2.7.2"/>
        <vers num="2.7.3"/>
        <vers num="2.7.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0535" seq="2004-0535" published="2004-08-06" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory.  NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc">20040804-01-U</ref>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=125168">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=125168</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000845">CLA-2004:845</ref>
      <ref source="FEDORA" url="http://lwn.net/Articles/91155/">FEDORA-2004-186</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-02.xml" adv="1">GLSA-200407-02</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.4/testing/patch-2.4.27.log">http://www.kernel.org/pub/linux/kernel/v2.4/testing/patch-2.4.27.log</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:062">MDKSA-2004:062</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_20_kernel.html">SUSE-SA:2004:020</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-413.html" adv="1" patch="1">RHSA-2004:413</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-418.html">RHSA-2004:418</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10352" adv="1" patch="1">10352</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16159">linux-e1000-bo(16159)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11136">oval:org.mitre.oval:def:11136</ref>
    </refs>
    <vuln_soft>
      <prod name="mandrake_multi_network_firewall" vendor="mandrakesoft">
        <vers num="8.2"/>
      </prod>
      <prod name="suse_email_server" vendor="suse">
        <vers num="3.1"/>
        <vers num="iii"/>
      </prod>
      <prod name="suse_linux_admin-cd_for_firewall" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_connectivity_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_database_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_firewall_cd" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_firewall_live-cd" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_office_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_office_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="8.0"/>
        <vers num="9.0"/>
      </prod>
      <prod name="secure_community" vendor="engardelinux">
        <vers num="2.0"/>
      </prod>
      <prod name="secure_linux" vendor="engardelinux">
        <vers num="1.5" edition=":professional"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.1" edition=":ppc"/>
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="7" edition=":enterprise_server"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0536" seq="2004-0536" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in Tripwire commercial 4.0.1 and earlier, including 2.4, and open source 2.3.1 and earlier, allows local users to gain privileges via format string specifiers in a file name, which is used in the generation of an email report.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108627481507249&amp;w=2">20040602 Format String Vulnerability in Tripwire</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108630983009228&amp;w=2">20040603 Re: Format String Vulnerability in Tripwire</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-02.xml" adv="1">GLSA-200406-02</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-244.html">RHSA-2004:244</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10454">10454</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16309">tripwire-fprintf-format-string(16309)</ref>
    </refs>
    <vuln_soft>
      <prod name="tripwire" vendor="tripwire">
        <vers num="2.2.1"/>
        <vers num="2.3.0"/>
        <vers num="2.3.1"/>
        <vers num="2.3.1.2"/>
        <vers num="2.4.0"/>
        <vers num="2.4.2"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="4.0"/>
        <vers num="4.0.1"/>
        <vers num="4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0537" seq="2004-0537" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Opera 7.50 and earlier allows remote web sites to provide a "Shortcut Icon" (favicon) that is wider than expected, which could allow the web sites to spoof a trusted domain and facilitate phishing attacks using a wide icon and extra spaces.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/022263.html">20040603 Phishing for Opera (GM#007-OP)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108627581717738&amp;w=2">20040603 Phishing for Opera (GM#007-OP)</ref>
      <ref source="MISC" url="http://security.greymagic.com/security/advisories/gm007-op/">http://security.greymagic.com/security/advisories/gm007-op/</ref>
      <ref source="CONFIRM" url="http://www.opera.com/linux/changelogs/751/index.dml">http://www.opera.com/linux/changelogs/751/index.dml</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10452" adv="1" patch="1">10452</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16307">opera-favicon-spoofing(16307)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="7.23"/>
        <vers num="7.50"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0538" seq="2004-0538" published="2004-08-06" modified="2017-10-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">LaunchServices in Mac OS X 10.3.4 and 10.2.8 automatically registers and executes new applications, which could allow attackers to execute arbitrary code without warning the user.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://docs.info.apple.com/article.html?artnum=25785">APPLE-SA-2004-06-07</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.4"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0539" seq="2004-0539" published="2004-08-06" modified="2017-10-11" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The "Show in Finder" button in the Safari web browser in Mac OS X 10.3.4 and 10.2.8 may execute downloaded applications, which could allow remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://docs.info.apple.com/article.html?artnum=25785">APPLE-SA-2004-06-07</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/773190">VU#773190</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.4"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0540" seq="2004-0540" published="2004-08-06" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Windows 2000, when running in a domain whose Fully Qualified Domain Name (FQDN) is exactly 8 characters long, does not prevent users with expired passwords from logging on to the domain.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MSKB" url="http://support.microsoft.com/default.aspx?scid=kb;en-us;830847" adv="1">830847</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0541" seq="2004-0541" published="2004-08-06" modified="2018-05-02" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc">20040604-01-U</ref>
      <ref source="FEDORA" url="http://fedoranews.org/updates/FEDORA--.shtml">FLSA-2006:152809</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200406-13.xml" adv="1" patch="1">GLSA-200406-13</ref>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=107&amp;type=vulnerabilities" adv="1" patch="1">http://www.idefense.com/application/poi/display?id=107&amp;type=vulnerabilities</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-242.html" adv="1" patch="1">RHSA-2004:242</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10500">10500</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0033/" adv="1">2004-0033</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16360">squid-ntlm-bo(16360)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10722">oval:org.mitre.oval:def:10722</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A980">oval:org.mitre.oval:def:980</ref>
    </refs>
    <vuln_soft>
      <prod name="squid_web_proxy_cache" vendor="national_science_foundation">
        <vers num="2.5_stable"/>
        <vers num="3_pre"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0542" seq="2004-0542" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">PHP before 4.3.7 on Win32 platforms does not properly filter all shell metacharacters, which allows local or remote attackers to execute arbitrary code, overwrite files, and access internal environment variables via (1) the "%", "|", or ">" characters to the escapeshellcmd function, or (2) the "%" character to the escapeshellarg function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=108" adv="1">http://www.idefense.com/application/poi/display?id=108</ref>
      <ref source="CONFIRM" url="http://www.php.net/release_4_3_7.php" patch="1">http://www.php.net/release_4_3_7.php</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16331">php-escapeshellarg-execute-command(16331)</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="4.4.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0543" seq="2004-0543" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Oracle Applications 11.0 and Oracle E-Business Suite 11.5.1 through 11.5.8 allow remote attackers to execute arbitrary SQL procedures and queries.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q2/0032.html">20040604 Integrigy Security Alert - Multiple SQL Injection Vulnerabilities in Oracle E-Business Suite</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108638417302229&amp;w=2">20040604 Integrigy Security Alert - Multiple SQL Injection Vulnerabilities in Oracle E-Business Suite</ref>
      <ref source="CONFIRM" url="http://otn.oracle.com/deploy/security/pdf/2004alert67.pdf">http://otn.oracle.com/deploy/security/pdf/2004alert67.pdf</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-153.shtml">O-153</ref>
      <ref source="MISC" url="http://www.integrigy.com/alerts/OraAppsSQLInjection.htm">http://www.integrigy.com/alerts/OraAppsSQLInjection.htm</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/961579" adv="1" patch="1">VU#961579</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10465" adv="1" patch="1">10465</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-160A.html" adv="1" patch="1">TA04-160A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16324">oracle-ebusiness-sql-injection(16324)</ref>
    </refs>
    <vuln_soft>
      <prod name="applications" vendor="oracle">
        <vers num="11.0"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.1"/>
        <vers num="11.5.2"/>
        <vers num="11.5.3"/>
        <vers num="11.5.4"/>
        <vers num="11.5.5"/>
        <vers num="11.5.6"/>
        <vers num="11.5.7"/>
        <vers num="11.5.8"/>
        <vers num="11i"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0544" seq="2004-0544" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in LVM for AIX 5.1 and 5.2 allow local users to gain privileges via the (1) putlvcb or (2) getlvcb commands.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-131.shtml" adv="1" patch="1">O-131</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9905" adv="1" patch="1">9905</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9906">9906</ref>
      <ref source="IBM" url="http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.0544.2">MSS-OAR-E01-2004.0544</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=isg1IY55681">IY55681</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=isg1IY55682">IY55682</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15555">aix-putlvcb-bo(15555)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18317">aix-getlvcb-bo(18317)</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="4.3.3"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0545" seq="2004-0545" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">LVM for AIX 5.1 and 5.2 allows local users to overwrite arbitrary files via a symlink attack.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-131.shtml">O-131</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10230" adv="1" patch="1">10230</ref>
      <ref source="IBM" url="http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.0544.2">MSS-OAR-E01-2004.0544</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16011">aix-lvm-commands-symlink(16011)</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.1"/>
        <vers num="5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0547" seq="2004-0547" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the ODBC driver for PostgreSQL before 7.2.1 allows remote attackers to cause a denial of service (crash).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-516" adv="1" patch="1">DSA-516</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:072">MDKSA-2004:072</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16329">postgresql-odbc-bo(16329)</ref>
    </refs>
    <vuln_soft>
      <prod name="postgresql" vendor="postgresql">
        <vers num="7.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0548" seq="2004-0548" published="2004-08-06" modified="2016-11-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108675120224531&amp;w=2">20040608 Aspell 'word-list-compress' stack overflow vulnerability</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200406-14.xml" adv="1">GLSA-200406-14</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html">http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10497">10497</ref>
    </refs>
    <vuln_soft>
      <prod name="aspell" vendor="gnu">
        <vers num="0.50.5"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0549" seq="2004-0549" published="2004-08-06" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://62.131.86.111/analysis.htm">http://62.131.86.111/analysis.htm</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0031.html">20040602 180 Solutions Exploits and Toolbars Hacking Patched Users(I.E Exploits)</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0104.html">20040606 Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108786396622284&amp;w=2">20040621 IE/0DAY -> Insider Prototype</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108852642021426&amp;w=2">20040628 JS.Scob.Trojan Source Code ...</ref>
      <ref source="MISC" url="http://umbrella.name/originalvuln/msie/InsiderPrototype/">http://umbrella.name/originalvuln/msie/InsiderPrototype/</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/713878">VU#713878</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-163A.html" adv="1" patch="1">TA04-163A</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-184A.html">TA04-184A</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-212A.html">TA04-212A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-025">MS04-025</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16348">ie-location-restriction-bypass(16348)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1133">oval:org.mitre.oval:def:1133</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A207">oval:org.mitre.oval:def:207</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A241">oval:org.mitre.oval:def:241</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A519">oval:org.mitre.oval:def:519</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.01"/>
        <vers num="5.5"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0550" seq="2004-0550" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Real Networks RealPlayer 10 allows remote attackers to execute arbitrary code via a URL with a large number of "." (period) characters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=109&amp;type=vulnerabilities&amp;flashstatus=false" adv="1">http://www.idefense.com/application/poi/display?id=109&amp;type=vulnerabilities&amp;flashstatus=false</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16388">realplayer-dot-file-bo(16388)</ref>
    </refs>
    <vuln_soft>
      <prod name="realplayer" vendor="realnetworks">
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0551" seq="2004-0551" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml">20040609 Cisco CatOS Telnet, HTTP and SSH Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/245190" adv="1">VU#245190</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16370">cisco-catalyst-ack-dos(16370)</ref>
    </refs>
    <vuln_soft>
      <prod name="catalyst_2901" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_2902" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_2926" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_2926f" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_2926gl" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_2926gs" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_2926t" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_2948" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_2948-ge-tx" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_2948g-l3" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_2980g" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_2980g-a" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_4000" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_4500" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_4503" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_4506" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_4507r" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_4510r" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_4912g" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_5000" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_6000_ws-svc-nam-1" vendor="cisco">
        <vers num="2.2(1a)"/>
        <vers num="3.1(1a)"/>
      </prod>
      <prod name="catalyst_6000_ws-svc-nam-2" vendor="cisco">
        <vers num="2.2(1a)"/>
        <vers num="3.1(1a)"/>
      </prod>
      <prod name="catalyst_6000_ws-x6380-nam" vendor="cisco">
        <vers num="2.1(2)"/>
        <vers num="3.1(1a)"/>
      </prod>
      <prod name="catos" vendor="cisco">
        <vers num="2.1(1)"/>
        <vers num="2.1(2)"/>
        <vers num="2.1(3)"/>
        <vers num="2.1(4)"/>
        <vers num="2.1(5)"/>
        <vers num="2.1(6)"/>
        <vers num="2.1(7)"/>
        <vers num="2.1(8)"/>
        <vers num="2.1(9)"/>
        <vers num="2.1(10)"/>
        <vers num="2.1(11)"/>
        <vers num="2.1(12)"/>
        <vers num="2.2(1)"/>
        <vers num="2.2(2)"/>
        <vers num="2.3(1)"/>
        <vers num="2.4(1)"/>
        <vers num="2.4(2)"/>
        <vers num="2.4(3)"/>
        <vers num="2.4(4)"/>
        <vers num="2.4(5)"/>
        <vers num="2.4(5a)"/>
        <vers num="3.0(7)"/>
        <vers num="3.1(1)"/>
        <vers num="3.1(2)"/>
        <vers num="3.1(2a)"/>
        <vers num="3.2(1)"/>
        <vers num="3.2(1b)"/>
        <vers num="3.2(2)"/>
        <vers num="3.2(3)"/>
        <vers num="3.2(4)"/>
        <vers num="3.2(5)"/>
        <vers num="3.2(6)"/>
        <vers num="3.2(7)"/>
        <vers num="3.2(8)gdr"/>
        <vers num="4.1(1)"/>
        <vers num="4.1(2)"/>
        <vers num="4.1(3)"/>
        <vers num="4.2(1)"/>
        <vers num="4.2(2)"/>
        <vers num="4.3(1a)"/>
        <vers num="4.4(1)"/>
        <vers num="4.5(1)"/>
        <vers num="4.5(2)"/>
        <vers num="4.5(3)"/>
        <vers num="4.5(4)"/>
        <vers num="4.5(4b)"/>
        <vers num="4.5(5)"/>
        <vers num="4.5(6)"/>
        <vers num="4.5(6a)"/>
        <vers num="4.5(7)"/>
        <vers num="4.5(8)"/>
        <vers num="4.5(9)"/>
        <vers num="4.5(10)"/>
        <vers num="4.5(11)"/>
        <vers num="4.5(12)"/>
        <vers num="4.5(12a)"/>
        <vers num="4.5(13)"/>
        <vers num="4.5(13a)"/>
        <vers num="4.5(14)"/>
        <vers num="4.5.10"/>
        <vers num="5.1"/>
        <vers num="5.1(1)"/>
        <vers num="5.1(1)csx"/>
        <vers num="5.1(1a)"/>
        <vers num="5.1(1a)csx"/>
        <vers num="5.1(2a)"/>
        <vers num="5.1(2b)"/>
        <vers num="5.2"/>
        <vers num="5.2(1)"/>
        <vers num="5.2(1)csx"/>
        <vers num="5.2(1a)"/>
        <vers num="5.2(2)"/>
        <vers num="5.2(2)csx"/>
        <vers num="5.2(3)"/>
        <vers num="5.2(3)csx"/>
        <vers num="5.2(3a)csx"/>
        <vers num="5.2(4)"/>
        <vers num="5.2(5)"/>
        <vers num="5.2(6)"/>
        <vers num="5.2(7)"/>
        <vers num="5.2(7a)"/>
        <vers num="5.3(1)csx"/>
        <vers num="5.3(1a)csx"/>
        <vers num="5.3(2)csx"/>
        <vers num="5.3(3)csx"/>
        <vers num="5.3(4)csx"/>
        <vers num="5.3(5)csx"/>
        <vers num="5.3(5a)csx"/>
        <vers num="5.3(6)csx"/>
        <vers num="5.3(6a)csx"/>
        <vers num="5.4"/>
        <vers num="5.4(1)"/>
        <vers num="5.4(1)deferred"/>
        <vers num="5.4(2)"/>
        <vers num="5.4(2a)"/>
        <vers num="5.4(3)"/>
        <vers num="5.4(4)"/>
        <vers num="5.4(4a)"/>
        <vers num="5.5"/>
        <vers num="5.5(1)"/>
        <vers num="5.5(1a)"/>
        <vers num="5.5(2)"/>
        <vers num="5.5(3)"/>
        <vers num="5.5(4)"/>
        <vers num="5.5(4a)"/>
        <vers num="5.5(4b)"/>
        <vers num="5.5(5)"/>
        <vers num="5.5(6)"/>
        <vers num="5.5(6a)"/>
        <vers num="5.5(7)"/>
        <vers num="5.5(7a)"/>
        <vers num="5.5(8)"/>
        <vers num="5.5(8a)"/>
        <vers num="5.5(8a)cv"/>
        <vers num="5.5(9)"/>
        <vers num="5.5(10)"/>
        <vers num="5.5(10a)"/>
        <vers num="5.5(11)"/>
        <vers num="5.5(11a)"/>
        <vers num="5.5(12)"/>
        <vers num="5.5(12a)"/>
        <vers num="5.5(13)"/>
        <vers num="5.5(13.5)"/>
        <vers num="5.5(13a)"/>
        <vers num="5.5(14)"/>
        <vers num="5.5(15)"/>
        <vers num="5.5(16)"/>
        <vers num="5.5(16.2)"/>
        <vers num="5.5(17)"/>
        <vers num="5.5(18)"/>
        <vers num="5.5(19)"/>
        <vers num="6.1"/>
        <vers num="6.1(1)"/>
        <vers num="6.1(1a)"/>
        <vers num="6.1(1b)"/>
        <vers num="6.1(1c)"/>
        <vers num="6.1(1d)"/>
        <vers num="6.1(1e)"/>
        <vers num="6.1(2)"/>
        <vers num="6.1(2.13)"/>
        <vers num="6.1(2a)"/>
        <vers num="6.1(3)"/>
        <vers num="6.1(3a)"/>
        <vers num="6.1(4)"/>
        <vers num="6.1(4b)"/>
        <vers num="6.2(0.110)"/>
        <vers num="6.2(0.111)"/>
        <vers num="6.2(1)"/>
        <vers num="6.2(1a)"/>
        <vers num="6.2(2)"/>
        <vers num="6.2(2a)"/>
        <vers num="6.2(3)"/>
        <vers num="6.2(3a)"/>
        <vers num="6.3(0.7)pan"/>
        <vers num="6.3(1)"/>
        <vers num="6.3(1a)"/>
        <vers num="6.3(2)"/>
        <vers num="6.3(2a)"/>
        <vers num="6.3(3)"/>
        <vers num="6.3(3)x"/>
        <vers num="6.3(3)x1"/>
        <vers num="6.3(3a)"/>
        <vers num="6.3(4)"/>
        <vers num="6.3(4a)"/>
        <vers num="6.3(5)"/>
        <vers num="6.3(5.10)"/>
        <vers num="6.3(6)"/>
        <vers num="6.3(7)"/>
        <vers num="6.3(8)"/>
        <vers num="6.3(8.3)"/>
        <vers num="6.3(9)"/>
        <vers num="6.3(10)"/>
        <vers num="6.4(1)"/>
        <vers num="6.4(2)"/>
        <vers num="6.4(3)"/>
        <vers num="6.4(4a)"/>
        <vers num="6.4(5)"/>
        <vers num="6.4(6)"/>
        <vers num="6.4(7)"/>
        <vers num="6.4(8)"/>
        <vers num="7.1"/>
        <vers num="7.1(1)"/>
        <vers num="7.1(1a)"/>
        <vers num="7.1(2)"/>
        <vers num="7.1(2a)"/>
        <vers num="7.2(0.65)"/>
        <vers num="7.2(1)"/>
        <vers num="7.2(2)"/>
        <vers num="7.3"/>
        <vers num="7.3(1)"/>
        <vers num="7.3(2)"/>
        <vers num="7.4"/>
        <vers num="7.4(0.2)clr"/>
        <vers num="7.4(0.63)"/>
        <vers num="7.4(1)"/>
        <vers num="7.4(2)"/>
        <vers num="7.4(3)"/>
        <vers num="7.5"/>
        <vers num="7.5(1)"/>
        <vers num="7.6"/>
        <vers num="7.6(1)"/>
        <vers num="7.6(2)"/>
        <vers num="7.6(3)"/>
        <vers num="7.6(4)"/>
        <vers num="7.6(5)"/>
        <vers num="8.1"/>
        <vers num="8.1(2)"/>
        <vers num="8.1(3)"/>
        <vers num="8.2"/>
        <vers num="8.2(1)"/>
        <vers num="8.3(1)glx"/>
        <vers num="8.3glx"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0552" seq="2004-0552" published="2004-11-03" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Sophos Small Business Suite 1.00 on Windows does not properly handle files whose names contain reserved MS-DOS device names such as (1) LPT1, (2) COM1, (3) AUX, (4) CON, or (5) PRN, which can allow malicious code to bypass detection when it is installed, copied, or executed.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=143&amp;type=vulnerabilities">20040922 Sophos Small Business Suite Reserved Device Name Handling Vulnerability</ref>
      <ref source="MISC" url="http://www.seifried.org/security/advisories/kssa-005.html" adv="1" patch="1">http://www.seifried.org/security/advisories/kssa-005.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17468">sophos-business-security-bypass(17468)</ref>
    </refs>
    <vuln_soft>
      <prod name="small_business_suite" vendor="sophos">
        <vers num="1.00" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0554" seq="2004-0554" published="2004-08-06" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a "crash.c" program.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000845">CLA-2004:845</ref>
      <ref source="MISC" url="http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905">http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905</ref>
      <ref source="MISC" url="http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html">http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html</ref>
      <ref source="FEDORA" url="http://lwn.net/Articles/91155/">FEDORA-2004-186</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108786114032681&amp;w=2">20040620 TSSA-2004-011 - kernel</ref>
      <ref source="ENGARDE" url="http://marc.info/?l=bugtraq&amp;m=108793699910896&amp;w=2">ESA-20040621-005</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=108681568931323&amp;w=2">[linux-kernel] 20040609 timer + fpu stuff locks my console race</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-02.xml">GLSA-200407-02</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/973654" adv="1">VU#973654</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:062">MDKSA-2004:062</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_17_kernel.html">SuSE-SA:2004:017</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-255.html">RHSA-2004:255</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-260.html">RHSA-2004:260</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10538">10538</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0034/">2004-0034</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16412">linux-dos(16412)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2915">oval:org.mitre.oval:def:2915</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9426">oval:org.mitre.oval:def:9426</ref>
    </refs>
    <vuln_soft>
      <prod name="intuity_audix" vendor="avaya">
        <vers num="" edition=":lx"/>
      </prod>
      <prod name="suse_email_server" vendor="suse">
        <vers num="3.1"/>
        <vers num="iii"/>
      </prod>
      <prod name="suse_linux_admin-cd_for_firewall" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_connectivity_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_database_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_firewall_cd" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_linux_office_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="suse_office_server" vendor="suse">
        <vers num=""/>
      </prod>
      <prod name="converged_communications_server" vendor="avaya">
        <vers num="2.0"/>
      </prod>
      <prod name="s8300" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8500" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8700" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="s3400"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="8.0"/>
        <vers num="9.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.18"/>
        <vers num="2.4.19"/>
        <vers num="2.4.21"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23"/>
        <vers num="2.4.24"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.6.0"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="7" edition=":enterprise_server"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0555" seq="2004-0555" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in (1) queue.c and (2) queued.c in queue before 1.30.1 may allow remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012929">1012929</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-643" adv="1" patch="1">DSA-643</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18945">queue-bo(18945)</ref>
    </refs>
    <vuln_soft>
      <prod name="queue" vendor="gnu">
        <vers num="1.12.7"/>
        <vers num="1.12.8"/>
        <vers num="1.12.9"/>
        <vers num="1.20.0"/>
        <vers num="1.20.1"/>
        <vers num="1.20.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0556" seq="2004-0556" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0557" seq="2004-0557" published="2004-08-06" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 through 12.17.4 allow remote attackers to execute arbitrary code via certain WAV file header fields.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0014.html">20040728 SoX buffer overflows when handling .WAV files</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000855">CLA-2004:855</ref>
      <ref source="FEDORA" url="http://lwn.net/Articles/95529/">FEDORA-2004-235</ref>
      <ref source="FEDORA" url="http://lwn.net/Articles/95530/">FEDORA-2004-244</ref>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2004/Jul/1227.html">20040728 SoX buffer overflows when handling .WAV files</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-565">DSA-565</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-23.xml" adv="1">GLSA-200407-23</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:076">MDKSA-2004:076</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-409.html" adv="1" patch="1">RHSA-2004:409</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10819" adv="1" patch="1">10819</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1945">FLSA:1945</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16827">sox-wav-bo(16827)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9801">oval:org.mitre.oval:def:9801</ref>
    </refs>
    <vuln_soft>
      <prod name="sox" vendor="sox">
        <vers num="12.17.2"/>
        <vers num="12.17.3"/>
        <vers num="12.17.4"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="8.0"/>
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
        <vers num="core_2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0558" seq="2004-0558" published="2004-09-28" modified="2018-03-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows remote attackers to cause a denial of service (service hang) via a certain UDP packet to the IPP port.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000872">CLA-2004:872</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html">APPLE-SA-2004-09-30</ref>
      <ref source="SCO" url="http://marc.info/?l=bugtraq&amp;m=109760654431316&amp;w=2">SCOSA-2004.15</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57646-1">57646</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201005-1">201005</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000757.1-1">1000757</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-545" adv="1" patch="1">DSA-545</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-449.html" adv="1" patch="1">RHSA-2004:449</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11183">11183</ref>
      <ref source="SUSE" url="http://www.suse.com/de/security/2004_31_cups.html">SUSE-SA:2004:031</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0047/" adv="1">2004-0047</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2072" patch="1">FLSA:2072</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17389">cups-udp-dos(17389)</ref>
      <ref source="MISC" url="https://github.com/fibonascii/CVE-2004-0558">https://github.com/fibonascii/CVE-2004-0558</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11732">oval:org.mitre.oval:def:11732</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.1.21" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0559" seq="2004-0559" published="2004-10-20" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The maketemp.pl script in Usermin 1.070 and 1.080 allows local users to overwrite arbitrary files at install time via a symlink attack on the /tmp/.usermin directory.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-15.xml" adv="1" patch="1">GLSA-200409-15</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11153" adv="1" patch="1">11153</ref>
      <ref source="CONFIRM" url="http://www.webmin.com/uchanges-1.089.html">http://www.webmin.com/uchanges-1.089.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17299">usermin-installation-unspecified(17299)</ref>
    </refs>
    <vuln_soft>
      <prod name="usermin" vendor="usermin">
        <vers num="1.000"/>
        <vers num="1.010"/>
        <vers num="1.020"/>
        <vers num="1.030"/>
        <vers num="1.040"/>
        <vers num="1.051"/>
        <vers num="1.060"/>
        <vers num="1.070"/>
        <vers num="1.080"/>
      </prod>
      <prod name="webmin" vendor="webmin">
        <vers num="1.0.00"/>
        <vers num="1.0.20"/>
        <vers num="1.0.50"/>
        <vers num="1.0.60"/>
        <vers num="1.0.70"/>
        <vers num="1.0.80"/>
        <vers num="1.0.90"/>
        <vers num="1.1.00"/>
        <vers num="1.1.10"/>
        <vers num="1.1.21"/>
        <vers num="1.1.30"/>
        <vers num="1.1.40"/>
        <vers num="1.1.50"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0560" seq="2004-0560" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in gopher daemon (gopherd) 3.0.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted content of a certain size that triggers the overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-638">DSA-638</ref>
    </refs>
    <vuln_soft>
      <prod name="gopherd" vendor="university_of_minnesota">
        <vers num="3.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0561" seq="2004-0561" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the log routine for gopher daemon (gopherd) 3.0.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-638">DSA-638</ref>
    </refs>
    <vuln_soft>
      <prod name="gopherd" vendor="university_of_minnesota">
        <vers num="3.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0562" seq="2004-0562" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0563" seq="2004-0563" published="2004-12-23" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The tspc.conf configuration file in freenet6 before 0.9.6 and before 1.0 on Debian Linux has world readable permissions, which could allow local users to gain sensitive information, such as a username and password.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011460">1011460</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-555" adv="1" patch="1">DSA-555</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11280" adv="1" patch="1">11280</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17544">freenet6-world-readable(17544)</ref>
    </refs>
    <vuln_soft>
      <prod name="freenet6" vendor="freenet6">
        <vers num="0.9.6"/>
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0564" seq="2004-0564" published="2004-12-23" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Roaring Penguin pppoe (rp-ppoe), if installed or configured to run setuid root contrary to its design, allows local users to overwrite arbitrary files.  NOTE: the developer has publicly disputed the claim that this is a vulnerability because pppoe "is NOT designed to run setuid-root."  Therefore this identifier applies *only* to those configurations and installations under which pppoe is run setuid root despite the developer's warnings.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MANDRAKE" url="http://marc.info/?l=bugtraq&amp;m=110247119200510&amp;w=2">MDKSA-2004:145</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110253341209450&amp;w=2">20041208 Re: MDKSA-2004:145 - Updated rp-pppoe packages fix vulnerability</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-557" adv="1" patch="1">DSA-557</ref>
      <ref source="FEDORA" url="http://www.fedoralegacy.org/updates/FC1/2005-11-14-FLSA_2005_152794__Updated_rp_pppoe_package_fixes_security_issue.html">FLSA:152794</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11315" adv="1" patch="1">11315</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17576">pppoe-file-overwrite(17576)</ref>
    </refs>
    <vuln_soft>
      <prod name="pppoe" vendor="roaring_penguin">
        <vers num="3.0"/>
        <vers num="3.3"/>
        <vers num="3.5"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0565" seq="2004-0565" published="2004-12-06" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html" adv="1">[owl-users] 20040619 Linux 2.4.26-ow2</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:066">MDKSA-2004:066</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-504.html">RHSA-2004:504</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10687">10687</ref>
      <ref source="MISC" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734" adv="1">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16644">linux-ia64-info-disclosure(16644)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10714">oval:org.mitre.oval:def:10714</ref>
    </refs>
    <vuln_soft>
      <prod name="mandrake_multi_network_firewall" vendor="mandrakesoft">
        <vers num="8.2"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.1"/>
        <vers num="9.2"/>
        <vers num="10.0"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0566" seq="2004-0566" published="2004-07-27" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in imgbmp.cxx for Windows 2000 allows remote attackers to execute arbitrary code via a BMP image with a large bfOffBits value.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-02/0806.html" adv="1">20040215 GAYER THAN AIDS ADVISORY #01: IE 5 remote code execution</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/266926">VU#266926</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-212A.html" adv="1">TA04-212A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-025">MS04-025</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15210">ie-bmp-integer-overflow(15210)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A216">oval:org.mitre.oval:def:216</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A306">oval:org.mitre.oval:def:306</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A322">oval:org.mitre.oval:def:322</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A507">oval:org.mitre.oval:def:507</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A515">oval:org.mitre.oval:def:515</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.0"/>
        <vers num="5.0.1" edition="sp1"/>
        <vers num="5.0.1" edition="sp2"/>
        <vers num="5.0.1" edition="sp3"/>
        <vers num="5.0.1" edition="sp4"/>
        <vers num="5.5" edition="sp1"/>
        <vers num="5.5" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0567" seq="2004-0567" published="2004-12-31" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012517">1012517</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-054.shtml" adv="1" patch="1">P-054</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/378160" adv="1" patch="1">VU#378160</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11922">11922</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-045">MS04-045</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18259">wins-memory-pointer-hijack(18259)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="64-bit"/>
        <vers num="r2"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition="sp6:terminal_server"/>
        <vers num="4.0" edition="sp6a:server"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0568" seq="2004-0568" published="2005-01-10" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110312618614849&amp;w=2">20041214 HyperTerminal - Buffer Overflow In .ht File</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-043">MS04-043</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18336">win-hyperterminal-session-bo(18336)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1603">oval:org.mitre.oval:def:1603</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2545">oval:org.mitre.oval:def:2545</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3138">oval:org.mitre.oval:def:3138</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3973">oval:org.mitre.oval:def:3973</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4508">oval:org.mitre.oval:def:4508</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4741">oval:org.mitre.oval:def:4741</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="datacenter_64-bit" edition="sp1_beta_1"/>
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise" edition="sp1_beta_1"/>
        <vers num="enterprise_64-bit" edition="sp1_beta_1"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="r2" edition="sp1_beta_1"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="standard" edition="sp1_beta_1"/>
        <vers num="web" edition="sp1_beta_1"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition=":alpha"/>
        <vers num="4.0" edition=":enterprise_server"/>
        <vers num="4.0" edition=":server"/>
        <vers num="4.0" edition=":terminal_server"/>
        <vers num="4.0" edition=":terminal_server_alpha"/>
        <vers num="4.0" edition=":workstation"/>
        <vers num="4.0" edition="sp1:alpha"/>
        <vers num="4.0" edition="sp1:enterprise_server"/>
        <vers num="4.0" edition="sp1:server"/>
        <vers num="4.0" edition="sp1:terminal_server"/>
        <vers num="4.0" edition="sp1:workstation"/>
        <vers num="4.0" edition="sp2:alpha"/>
        <vers num="4.0" edition="sp2:enterprise_server"/>
        <vers num="4.0" edition="sp2:server"/>
        <vers num="4.0" edition="sp2:terminal_server"/>
        <vers num="4.0" edition="sp2:workstation"/>
        <vers num="4.0" edition="sp3:alpha"/>
        <vers num="4.0" edition="sp3:enterprise_server"/>
        <vers num="4.0" edition="sp3:server"/>
        <vers num="4.0" edition="sp3:terminal_server"/>
        <vers num="4.0" edition="sp3:workstation"/>
        <vers num="4.0" edition="sp4:alpha"/>
        <vers num="4.0" edition="sp4:enterprise_server"/>
        <vers num="4.0" edition="sp4:server"/>
        <vers num="4.0" edition="sp4:terminal_server"/>
        <vers num="4.0" edition="sp4:workstation"/>
        <vers num="4.0" edition="sp5:alpha"/>
        <vers num="4.0" edition="sp5:enterprise_server"/>
        <vers num="4.0" edition="sp5:server"/>
        <vers num="4.0" edition="sp5:terminal_server"/>
        <vers num="4.0" edition="sp5:workstation"/>
        <vers num="4.0" edition="sp6:alpha"/>
        <vers num="4.0" edition="sp6:enterprise_server"/>
        <vers num="4.0" edition="sp6:server"/>
        <vers num="4.0" edition="sp6:terminal_server"/>
        <vers num="4.0" edition="sp6:workstation"/>
        <vers num="4.0" edition="sp6a:alpha"/>
        <vers num="4.0" edition="sp6a:enterprise_server"/>
        <vers num="4.0" edition="sp6a:server"/>
        <vers num="4.0" edition="sp6a:workstation"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":home"/>
        <vers num="" edition=":media_center"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:home"/>
        <vers num="" edition="sp1:media_center"/>
        <vers num="" edition="sp2:home"/>
        <vers num="" edition="sp2:media_center"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0569" seq="2004-0569" published="2004-11-03" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The RPC Runtime Library for Microsoft Windows NT 4.0 allows remote attackers to read active memory or cause a denial of service (system crash) via a malicious message, possibly related to improper length values.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109769394209518&amp;w=2">20041013 BindView Advisory: Memory Leak and DoS in NT4 RPC server</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-029">MS04-029</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17646">wins-rpc-obtain-information(17646)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17663">win-ms04029-patch(17663)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2505">oval:org.mitre.oval:def:2505</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5277">oval:org.mitre.oval:def:5277</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0571" seq="2004-0571" published="2005-01-10" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-041">MS04-041</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18337">win-converter-table-code-execution(18337)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1168">oval:org.mitre.oval:def:1168</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1417">oval:org.mitre.oval:def:1417</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1959">oval:org.mitre.oval:def:1959</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1976">oval:org.mitre.oval:def:1976</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3416">oval:org.mitre.oval:def:3416</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3743">oval:org.mitre.oval:def:3743</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4328">oval:org.mitre.oval:def:4328</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A685">oval:org.mitre.oval:def:685</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise_64-bit"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="web"/>
      </prod>
      <prod name="windows_98" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
      <prod name="windows_98se" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_me" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition=":enterprise_server"/>
        <vers num="4.0" edition=":server"/>
        <vers num="4.0" edition=":terminal_server"/>
        <vers num="4.0" edition=":workstation"/>
        <vers num="4.0" edition="sp1:enterprise_server"/>
        <vers num="4.0" edition="sp1:server"/>
        <vers num="4.0" edition="sp1:terminal_server"/>
        <vers num="4.0" edition="sp1:workstation"/>
        <vers num="4.0" edition="sp2:enterprise_server"/>
        <vers num="4.0" edition="sp2:server"/>
        <vers num="4.0" edition="sp2:terminal_server"/>
        <vers num="4.0" edition="sp2:workstation"/>
        <vers num="4.0" edition="sp3:enterprise_server"/>
        <vers num="4.0" edition="sp3:server"/>
        <vers num="4.0" edition="sp3:terminal_server"/>
        <vers num="4.0" edition="sp3:workstation"/>
        <vers num="4.0" edition="sp4:enterprise_server"/>
        <vers num="4.0" edition="sp4:server"/>
        <vers num="4.0" edition="sp4:terminal_server"/>
        <vers num="4.0" edition="sp4:workstation"/>
        <vers num="4.0" edition="sp5:enterprise_server"/>
        <vers num="4.0" edition="sp5:server"/>
        <vers num="4.0" edition="sp5:terminal_server"/>
        <vers num="4.0" edition="sp5:workstation"/>
        <vers num="4.0" edition="sp6:enterprise_server"/>
        <vers num="4.0" edition="sp6:server"/>
        <vers num="4.0" edition="sp6:terminal_server"/>
        <vers num="4.0" edition="sp6:workstation"/>
        <vers num="4.0" edition="sp6a:enterprise_server"/>
        <vers num="4.0" edition="sp6a:server"/>
        <vers num="4.0" edition="sp6a:workstation"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":home"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:home"/>
        <vers num="" edition="sp2:home"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0572" seq="2004-0572" published="2004-11-03" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the Windows Program Group Converter (grpconv.exe) may allow remote attackers to execute arbitrary code via a shell: URL with a long filename and a .grp extension, which is not properly handled when the shell capability launches grpconv.exe.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0290.html" adv="1">20040707 Re: shell:windows command question</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/543864" adv="1" patch="1">VU#543864</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10677" adv="1" patch="1">10677</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-037">MS04-037</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16664">win-grpconv-bo(16664)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17662">win-ms04037-patch(17662)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1279">oval:org.mitre.oval:def:1279</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1837">oval:org.mitre.oval:def:1837</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1843">oval:org.mitre.oval:def:1843</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2753">oval:org.mitre.oval:def:2753</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3071">oval:org.mitre.oval:def:3071</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3768">oval:org.mitre.oval:def:3768</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3822">oval:org.mitre.oval:def:3822</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4244">oval:org.mitre.oval:def:4244</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4493">oval:org.mitre.oval:def:4493</ref>
    </refs>
    <vuln_soft>
      <prod name="grpconv" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0573" seq="2004-0573" published="2004-09-28" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109519646030906&amp;w=2">20040914 Microsoft Office WordPerfect Converter Buffer Overflow Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011249">1011249</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011250">1011250</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011251">1011251</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011252">1011252</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/449438">VU#449438</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-027">MS04-027</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17306">wordperfect-converter-message-bo(17306)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2670">oval:org.mitre.oval:def:2670</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3311">oval:org.mitre.oval:def:3311</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3333">oval:org.mitre.oval:def:3333</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4005">oval:org.mitre.oval:def:4005</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5021">oval:org.mitre.oval:def:5021</ref>
    </refs>
    <vuln_soft>
      <prod name="frontpage" vendor="microsoft">
        <vers num="2000"/>
        <vers num="2002"/>
        <vers num="2003"/>
      </prod>
      <prod name="office" vendor="microsoft">
        <vers num="2000"/>
        <vers num="2003"/>
        <vers num="xp"/>
      </prod>
      <prod name="publisher" vendor="microsoft">
        <vers num="2000"/>
        <vers num="2002"/>
        <vers num="2003"/>
      </prod>
      <prod name="word" vendor="microsoft">
        <vers num="2000"/>
        <vers num="2002"/>
        <vers num="2003"/>
      </prod>
      <prod name="works" vendor="microsoft">
        <vers num="2001"/>
        <vers num="2002"/>
        <vers num="2003"/>
        <vers num="2004"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0574" seq="2004-0574" published="2004-11-03" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109761632831563&amp;w=2">20041012 CORE-2004-0802: IIS NNTP Service XPAT Command Vulnerabilities</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-012.shtml" adv="1">P-012</ref>
      <ref source="MISC" url="http://www.coresecurity.com/common/showdoc.php?idx=420&amp;idxseccion=10">http://www.coresecurity.com/common/showdoc.php?idx=420&amp;idxseccion=10</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/203126" adv="1" patch="1">VU#203126</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-036">MS04-036</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17641">win-nntp-bo(17641)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17661">win-ms04036-patch(17661)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A246">oval:org.mitre.oval:def:246</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4392">oval:org.mitre.oval:def:4392</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5021">oval:org.mitre.oval:def:5021</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5070">oval:org.mitre.oval:def:5070</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5926">oval:org.mitre.oval:def:5926</ref>
    </refs>
    <vuln_soft>
      <prod name="exchange_server" vendor="microsoft">
        <vers num="2000"/>
        <vers num="2003"/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition=":server"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0575" seq="2004-0575" published="2004-11-03" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=ntbugtraq&amp;m=109767342326300&amp;w=2">20041013 EEYE: Windows Shell ZIP File Decompression DUNZIP32.DLL Buffer Overflow Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011637">1011637</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-010.shtml" adv="1">P-010</ref>
      <ref source="MISC" url="http://www.eeye.com/html/research/advisories/AD20041012A.html">http://www.eeye.com/html/research/advisories/AD20041012A.html</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/649374">VU#649374</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-034">MS04-034</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17624">win-compressed-folders-bo(17624)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17659">win-ms04034-patch(17659)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1053">oval:org.mitre.oval:def:1053</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3913">oval:org.mitre.oval:def:3913</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4276">oval:org.mitre.oval:def:4276</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6397">oval:org.mitre.oval:def:6397</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="64-bit"/>
        <vers num="r2"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0576" seq="2004-0576" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108785242716726&amp;w=2">20040621 [Full-Disclosure] iDEFENSE Security Advisory 06.21.04 - GNU Radius SNMP Invalid OID Denial of Service Vulnerability</ref>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=110&amp;type=vulnerabilities" adv="1" patch="1">http://www.idefense.com/application/poi/display?id=110&amp;type=vulnerabilities</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16466">radius-snmp-oid-dos(16466)</ref>
    </refs>
    <vuln_soft>
      <prod name="radius" vendor="gnu">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0577" seq="2004-0577" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">WinGate 5.2.3 build 901 and 6.0 beta 2 build 942, and other versions such as 5.0.5, allows remote attackers to read arbitrary files from the root directory via a URL request to the wingate-internal directory.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108872788123695&amp;w=2">20040701 iDEFENSE Security Advisory 07.01.04: WinGate Information Disclosure</ref>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=113">http://www.idefense.com/application/poi/display?id=113</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16589">wingate-directory-traversal(16589)</ref>
    </refs>
    <vuln_soft>
      <prod name="wingate" vendor="qbik">
        <vers num="5.0.5"/>
        <vers num="5.2.3"/>
        <vers num="6.0_beta_2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0578" seq="2004-0578" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">WinGate 5.2.3 build 901 and 6.0 beta 2 build 942, and other versions such as 5.0.5, allows remote attackers to read arbitrary files via leading slash (//) characters in a URL request to the wingate-internal directory.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108872788123695&amp;w=2">20040701 iDEFENSE Security Advisory 07.01.04: WinGate Information Disclosure</ref>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=113">http://www.idefense.com/application/poi/display?id=113</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16589">wingate-directory-traversal(16589)</ref>
    </refs>
    <vuln_soft>
      <prod name="wingate" vendor="qbik">
        <vers num="5.0.5"/>
        <vers num="5.2.3"/>
        <vers num="6.0_beta_2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0579" seq="2004-0579" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in super before 3.23 allows local users to execute arbitrary code as root.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-522" adv="1" patch="1">DSA-522</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16458">super-format-string(16458)</ref>
    </refs>
    <vuln_soft>
      <prod name="super" vendor="william_deich">
        <vers num="3.12"/>
        <vers num="3.16"/>
        <vers num="3.17"/>
        <vers num="3.18"/>
        <vers num="3.19"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0580" seq="2004-0580" published="2004-08-06" modified="2018-08-13" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108662876129301&amp;w=2">20040607 Linksys BEFSR41 DHCP vulnerability server leaks network data</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/May/1010288.html">1010288</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10329" adv="1">10329</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16142">linksys-etherfast-bootp-dos(16142)</ref>
    </refs>
    <vuln_soft>
      <prod name="befcmu10" vendor="linksys">
        <vers num=""/>
      </prod>
      <prod name="befn2ps4" vendor="linksys">
        <vers num="1.42.7"/>
      </prod>
      <prod name="befsr11" vendor="linksys">
        <vers num="1.40.2"/>
        <vers num="1.41"/>
        <vers num="1.42.3"/>
        <vers num="1.42.7"/>
        <vers num="1.43"/>
        <vers num="1.43.3"/>
        <vers num="1.44"/>
      </prod>
      <prod name="befsr41" vendor="linksys">
        <vers num="1.35"/>
        <vers num="1.36"/>
        <vers num="1.37"/>
        <vers num="1.38.5"/>
        <vers num="1.39"/>
        <vers num="1.40.2"/>
        <vers num="1.41"/>
        <vers num="1.42.3"/>
        <vers num="1.42.7"/>
        <vers num="1.43"/>
        <vers num="1.43.3"/>
        <vers num="1.44"/>
        <vers num="1.45.7"/>
      </prod>
      <prod name="befsr41w" vendor="linksys">
        <vers num=""/>
      </prod>
      <prod name="befsr81" vendor="linksys">
        <vers num="2.42.7.1"/>
        <vers num="2.44"/>
      </prod>
      <prod name="befsru31" vendor="linksys">
        <vers num="1.40.2"/>
        <vers num="1.41"/>
        <vers num="1.42.3"/>
        <vers num="1.42.7"/>
        <vers num="1.43"/>
        <vers num="1.43.3"/>
        <vers num="1.44"/>
      </prod>
      <prod name="befsx41" vendor="linksys">
        <vers num="1.42.7"/>
        <vers num="1.43"/>
        <vers num="1.43.3"/>
        <vers num="1.43.4"/>
        <vers num="1.44"/>
        <vers num="1.44.3"/>
        <vers num="1.45.3"/>
      </prod>
      <prod name="befvp41" vendor="linksys">
        <vers num="1.39.64"/>
        <vers num="1.40.3f"/>
        <vers num="1.40.4"/>
        <vers num="1.42.7"/>
      </prod>
      <prod name="rv082" vendor="linksys">
        <vers num=""/>
      </prod>
      <prod name="wap55ag" vendor="linksys">
        <vers num="1.0.7"/>
      </prod>
      <prod name="wrt54g" vendor="linksys">
        <vers num="1.42.3"/>
        <vers num="2.00.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0581" seq="2004-0581" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ksymoops-gznm script in Mandrake Linux 9.1 through 10.0, and Corporate Server 2.1, allows local users to delete arbitrary files via a symlink attack on files in /tmp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:060">MDKSA-2004:060</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10516" adv="1" patch="1">10516</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16392">ksymoops-symlink(16392)</ref>
    </refs>
    <vuln_soft>
      <prod name="ksymoops" vendor="gnu">
        <vers num="2.4.5"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.1" edition=":ppc"/>
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0582" seq="2004-0582" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in Webmin 1.140 allows remote attackers to bypass access control rules and gain read access to configuration information for a module.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000848">CLA-2004:848</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108697184602191&amp;w=2">20040611 [SNS Advisory No.74] Webmin Access Control Rule Bypass Vulnerability</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-526">DSA-526</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200406-12.xml">GLSA-200406-12</ref>
      <ref source="MISC" url="http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/74_e.html">http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/74_e.html</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:074">MDKSA-2004:074</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10474" adv="1" patch="1">10474</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10522" adv="1" patch="1">10522</ref>
      <ref source="CONFIRM" url="http://www.webmin.com/changes-1.150.html">http://www.webmin.com/changes-1.150.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16333">webmin-bypass-security(16333)</ref>
    </refs>
    <vuln_soft>
      <prod name="webmin" vendor="webmin">
        <vers num="1.1.40"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0583" seq="2004-0583" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The account lockout functionality in (1) Webmin 1.140 and (2) Usermin 1.070 does not parse certain character strings, which allows remote attackers to conduct a brute force attack to guess user IDs and passwords.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108737059313829&amp;w=2">20040611 [SNS Advisory No.75] Webmin/Usermin Account Lockout Bypass Vulnerability</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-526">DSA-526</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200406-12.xml">GLSA-200406-12</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200406-15.xml">GLSA-200406-15</ref>
      <ref source="MISC" url="http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/75_e.html">http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/75_e.html</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:074">MDKSA-2004:074</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10474" adv="1" patch="1">10474</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10523" adv="1" patch="1">10523</ref>
      <ref source="CONFIRM" url="http://www.webmin.com/changes-1.150.html">http://www.webmin.com/changes-1.150.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16334">webmin-username-password-dos(16334)</ref>
    </refs>
    <vuln_soft>
      <prod name="usermin" vendor="usermin">
        <vers num="1.070"/>
      </prod>
      <prod name="webmin" vendor="webmin">
        <vers num="1.1.40"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0584" seq="2004-0584" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Horde IMP 3.2.3 and earlier, before a "security fix," does not properly validate input, which allows remote attackers to execute arbitrary script as other users via script or HTML in an e-mail message, possibly triggering a cross-site scripting (XSS) vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200406-11.xml" adv="1" patch="1">GLSA-200406-11</ref>
      <ref source="MISC" url="http://www.horde.org/imp/3.2/" patch="1">http://www.horde.org/imp/3.2/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10501" patch="1">10501</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16357">imp-content-type-xss(16357)</ref>
    </refs>
    <vuln_soft>
      <prod name="imp" vendor="horde">
        <vers num="2.0"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
        <vers num="2.3"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.1.2"/>
        <vers num="3.2"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2"/>
        <vers num="3.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0585" seq="2004-0585" published="2004-08-06" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-0589.  Reason: This candidate is a duplicate of CVE-2004-0589.  Notes: All CVE users should reference CVE-2004-0589 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0586" seq="2004-0586" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">acpRunner ActiveX 1.2.5.0 allows remote attackers to execute arbitrary code via the (1) DownLoadURL, (2) SaveFilePath, and (3) Download ActiveX methods.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108745652205176&amp;w=2">20040616 IBM acpRunner Activex Dangerous Methods Vulnerability</ref>
      <ref source="CONFIRM" url="http://www-306.ibm.com/pc/support/site.wss/document.do?lndocid=MIGR-54588">http://www-306.ibm.com/pc/support/site.wss/document.do?lndocid=MIGR-54588</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16429">ibm-acprunner-execute-code(16429)</ref>
    </refs>
    <vuln_soft>
      <prod name="acprunner" vendor="ibm">
        <vers num="1.2.5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0587" seq="2004-0587" published="2004-08-06" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc">20040804-01-U</ref>
      <ref source="FEDORA" url="http://lwn.net/Articles/91155/">FEDORA-2004-186</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010057">1010057</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066">MDKSA-2004:066</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_10_kernel.html">SuSE-SA:2004:010</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-413.html">RHSA-2004:413</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-418.html">RHSA-2004:418</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10279" adv="1" patch="1">10279</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16062">suse-hbaapinode-dos(16062)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9398">oval:org.mitre.oval:def:9398</ref>
    </refs>
    <vuln_soft>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0588" seq="2004-0588" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the web mail module for Usermin 1.070 allows remote attackers to insert arbitrary HTML and script via e-mail messages.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product update:
Usermin, Usermin, 1.080</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108781564518287&amp;w=2">20040611 [SNS Advisory No.73] Usermin Cross-site Scripting Vulnerability</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200406-15.xml" adv="1" patch="1">GLSA-200406-15</ref>
      <ref source="MISC" url="http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/73_e.html">http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/73_e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10521" patch="1">10521</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16494">usermin-email-xss(16494)</ref>
    </refs>
    <vuln_soft>
      <prod name="usermin" vendor="usermin">
        <vers num="1.070"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0589" seq="2004-0589" published="2004-08-06" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Cisco IOS 11.1(x) through 11.3(x) and 12.0(x) through 12.2(x), when configured for BGP routing, allows remote attackers to cause a denial of service (device reload) via malformed BGP (1) OPEN or (2) UPDATE messages.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml">20040616 Cisco IOS Malformed BGP Packet Causes Reload</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/784540" adv="1" patch="1">VU#784540</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16427">cisco-ios-bgp-packet-dos(16427)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4948">oval:org.mitre.oval:def:4948</ref>
    </refs>
    <vuln_soft>
      <prod name="ios" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0590" seq="2004-0590" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">FreeS/WAN 1.x and 2.x, and other related products including superfreeswan 1.x, openswan 1.x before 1.0.6, openswan 2.x before 2.1.4, and strongSwan before 2.1.3, allows remote attackers to authenticate using spoofed PKCS#7 certificates in which a self-signed certificate identifies an alternate Certificate Authority (CA) and spoofed issuer and subject.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-20.xml" adv="1" patch="1">GLSA-200406-20</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:070" adv="1" patch="1">MDKSA-2004:070</ref>
      <ref source="CONFIRM" url="http://www.openswan.org/support/vuln/can-2004-0590/" adv="1" patch="1">http://www.openswan.org/support/vuln/can-2004-0590/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16515">ipsec-verifyx509cert-auth-bypass(16515)</ref>
    </refs>
    <vuln_soft>
      <prod name="frees_wan" vendor="frees_wan">
        <vers num="1"/>
        <vers num="2"/>
      </prod>
      <prod name="super_frees_wan" vendor="frees_wan">
        <vers num="1"/>
      </prod>
      <prod name="openswan" vendor="openswan">
        <vers num="1"/>
        <vers num="2"/>
      </prod>
      <prod name="strongswan" vendor="strongswan">
        <vers num="2.1.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0591" seq="2004-0591" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the print_header_uc function for SqWebMail 4.0.4 and earlier, and possibly 3.x, allows remote attackers to inject arbitrary web script or HRML via (1) e-mail headers or (2) a message with a "message/delivery-status" MIME Content-Type.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product release:
Inter7, SqWebMail, 4.0.5</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108786212220140&amp;w=2">20040621 XSS vulnerability in Sqwebmail 4.0.4</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-533" adv="1" patch="1">DSA-533</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-02.xml" adv="1" patch="1">GLSA-200408-02</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10588" patch="1">10588</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16467">sqwebmail-print-header-xss(16467)</ref>
    </refs>
    <vuln_soft>
      <prod name="sqwebmail" vendor="inter7">
        <vers num="4.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0592" seq="2004-0592" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The tcp_find_option function of the netfilter subsystem for IPv6 in the SUSE Linux 2.6.5 kernel with USAGI patches, when using iptables and TCP options rules, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a casting operation to the char type, a similar flaw to CVE-2004-0626.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023408.html">20040703 Re: SUSE Security Announcement: kernel (SUSE-SA:2004:020)</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_20_kernel.html" adv="1" patch="1">SUSE-SA:2004:020</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/43137">linux-kernel-tcpfindoption-dos(43137)</ref>
    </refs>
    <vuln_soft>
      <prod name="suse_linux" vendor="suse">
        <vers num="2.6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0593" seq="2004-0593" published="2004-09-28" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Sygate Enforcer 3.5MR1 and earlier passes broadcast traffic before authentication, which could allow remote attackers to bypass filtering rules.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109215731626998&amp;w=2">20040810 Corsaire Security Advisory - Sygate Enforcer unauthenticated broadcast issue</ref>
      <ref source="MISC" url="http://www.corsaire.com/advisories/c031120-003.txt" adv="1" patch="1">http://www.corsaire.com/advisories/c031120-003.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10908" adv="1">10908</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16948">sygate-enforcer-filter-bypass(16948)</ref>
    </refs>
    <vuln_soft>
      <prod name="enforcer" vendor="sygate_technologies">
        <vers num="3.5mr1" prev="1"/>
      </prod>
      <prod name="secure_enterprise" vendor="sygate_technologies">
        <vers num="3.0"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0594" seq="2004-0594" published="2004-07-27" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000847">CLA-2004:847</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023908.html">20040714 Advisory 11/2004: PHP memory_limit remote vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108981780109154&amp;w=2">20040713 Advisory 11/2004: PHP memory_limit remote vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108982983426031&amp;w=2">20040714 TSSA-2004-013 - php</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109051444105182&amp;w=2">20040722 [OpenPKG-SA-2004.034] OpenPKG Security Advisory (php)</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109181600614477&amp;w=2">SSRT4777</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-531">DSA-531</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-669">DSA-669</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml">GLSA-200407-13</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068">MDKSA-2004:068</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_21_php4.html">SUSE-SA:2004:021</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-392.html">RHSA-2004:392</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-395.html">RHSA-2004:395</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-405.html">RHSA-2004:405</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-816.html">RHSA-2005:816</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10725">10725</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0039/">2004-0039</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16693">php-memorylimit-code-execution(16693)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10896">oval:org.mitre.oval:def:10896</ref>
    </refs>
    <vuln_soft>
      <prod name="integrated_management" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="php" vendor="php">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.0.7"/>
        <vers num="3.0.8"/>
        <vers num="3.0.9"/>
        <vers num="3.0.10"/>
        <vers num="3.0.11"/>
        <vers num="3.0.12"/>
        <vers num="3.0.13"/>
        <vers num="3.0.14"/>
        <vers num="3.0.15"/>
        <vers num="3.0.16"/>
        <vers num="3.0.17"/>
        <vers num="3.0.18"/>
        <vers num="4.0"/>
        <vers num="4.0.1" edition="patch1"/>
        <vers num="4.0.1" edition="patch2"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3" edition="patch1"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7" edition="rc1"/>
        <vers num="4.0.7" edition="rc2"/>
        <vers num="4.0.7" edition="rc3"/>
        <vers num="4.1.0"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.2" edition=":dev"/>
        <vers num="4.2.0"/>
        <vers num="4.2.1"/>
        <vers num="4.2.2"/>
        <vers num="4.2.3"/>
        <vers num="4.3.0"/>
        <vers num="4.3.1"/>
        <vers num="4.3.2"/>
        <vers num="4.3.3"/>
        <vers num="4.3.5"/>
        <vers num="4.3.6"/>
        <vers num="4.3.7"/>
        <vers num="5.0" edition="rc1"/>
        <vers num="5.0" edition="rc2"/>
        <vers num="5.0" edition="rc3"/>
      </prod>
      <prod name="converged_communications_server" vendor="avaya">
        <vers num="2.0"/>
      </prod>
      <prod name="s8300" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8500" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8700" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
        <vers num="core_2.0"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0595" seq="2004-0595" published="2004-07-27" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000847">CLA-2004:847</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023909.html">20040714 Advisory 12/2004: PHP strip_tags() bypass vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108981780109154&amp;w=2">20040713 Advisory 11/2004: PHP memory_limit remote vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108982983426031&amp;w=2">20040714 TSSA-2004-013 - php</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109051444105182&amp;w=2">20040722 [OpenPKG-SA-2004.034] OpenPKG Security Advisory (php)</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109181600614477&amp;w=2">SSRT4777</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-531" adv="1" patch="1">DSA-531</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-669">DSA-669</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml">GLSA-200407-13</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068">MDKSA-2004:068</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_21_php4.html">SUSE-SA:2004:021</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-392.html">RHSA-2004:392</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-395.html">RHSA-2004:395</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-405.html">RHSA-2004:405</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-816.html">RHSA-2005:816</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10724" adv="1" patch="1">10724</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16692">php-strip-tag-bypass(16692)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10619">oval:org.mitre.oval:def:10619</ref>
    </refs>
    <vuln_soft>
      <prod name="integrated_management" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="php" vendor="php">
        <vers num="4.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7"/>
        <vers num="4.1.0"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.2.0"/>
        <vers num="4.2.1"/>
        <vers num="4.2.2"/>
        <vers num="4.2.3"/>
        <vers num="4.3.0"/>
        <vers num="4.3.1"/>
        <vers num="4.3.2"/>
        <vers num="4.3.3"/>
        <vers num="4.3.5"/>
        <vers num="4.3.6"/>
        <vers num="4.3.7"/>
        <vers num="5.0" edition="rc1"/>
        <vers num="5.0" edition="rc2"/>
        <vers num="5.0" edition="rc3"/>
      </prod>
      <prod name="converged_communications_server" vendor="avaya">
        <vers num="2.0"/>
      </prod>
      <prod name="s8300" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8500" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8700" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
        <vers num="core_2.0"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0596" seq="2004-0596" published="2004-08-06" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Equalizer Load-balancer for serial network interfaces (eql.c) in Linux kernel 2.6.x up to 2.6.7 allows local users to cause a denial of service via a non-existent device name that triggers a null dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://linux.bkbits.net:8080/linux-2.6/cset@40d4aa72hPLWy-jMLr0eJAXMxHcNZg">http://linux.bkbits.net:8080/linux-2.6/cset@40d4aa72hPLWy-jMLr0eJAXMxHcNZg</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10730" adv="1" patch="1">10730</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16694">linux-eql-dos(16694)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0597" seq="2004-0597" published="2004-11-23" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt">SCOSA-2005.49</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000856">CLA-2004:856</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109163866717909&amp;w=2">20040804 [OpenPKG-SA-2004.035] OpenPKG Security Advisory (png)</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109181639602978&amp;w=2">SSRT4778</ref>
      <ref source="SCO" url="http://marc.info/?l=bugtraq&amp;m=109761239318458&amp;w=2">SCOSA-2004.16</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110796779903455&amp;w=2">20050209 MSN Messenger PNG Image Buffer Overflow Download Shellcoded Exploit</ref>
      <ref source="MISC" url="http://scary.beasts.org/security/CESA-2004-001.txt" adv="1">http://scary.beasts.org/security/CESA-2004-001.txt</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-200663-1">200663</ref>
      <ref source="CONFIRM" url="http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-114816-02-1">http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-114816-02-1</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679" patch="1">http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679</ref>
      <ref source="MISC" url="http://www.coresecurity.com/common/showdoc.php?idx=421&amp;idxseccion=10">http://www.coresecurity.com/common/showdoc.php?idx=421&amp;idxseccion=10</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-536" adv="1" patch="1">DSA-536</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-03.xml" adv="1" patch="1">GLSA-200408-03</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-22.xml" adv="1" patch="1">GLSA-200408-22</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/388984" adv="1">VU#388984</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/817368" adv="1">VU#817368</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:079">MDKSA-2004:079</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:212">MDKSA-2006:212</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:213">MDKSA-2006:213</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html">http://www.mozilla.org/projects/security/known-vulnerabilities.html</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_23_libpng.html" adv="1" patch="1">SUSE-SA:2004:023</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-402.html">RHSA-2004:402</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-421.html" adv="1">RHSA-2004:421</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-429.html" adv="1">RHSA-2004:429</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10857" adv="1" patch="1">10857</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/15495">15495</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0040/" adv="1" patch="1">2004-0040</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-217A.html" adv="1">TA04-217A</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA05-039A.html" adv="1">TA05-039A</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1943">FLSA:1943</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-009">MS05-009</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16894">libpng-pnghandle-bo(16894)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11284">oval:org.mitre.oval:def:11284</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2274">oval:org.mitre.oval:def:2274</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2378">oval:org.mitre.oval:def:2378</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4492">oval:org.mitre.oval:def:4492</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A594">oval:org.mitre.oval:def:594</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7709">oval:org.mitre.oval:def:7709</ref>
    </refs>
    <vuln_soft>
      <prod name="libpng" vendor="greg_roelofs">
        <vers num="1.2.5" prev="1"/>
      </prod>
      <prod name="msn_messenger" vendor="microsoft">
        <vers num="6.1"/>
        <vers num="6.2"/>
      </prod>
      <prod name="windows_media_player" vendor="microsoft">
        <vers num="9"/>
      </prod>
      <prod name="windows_messenger" vendor="microsoft">
        <vers num="5.0"/>
      </prod>
      <prod name="windows_98se" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_me" vendor="microsoft">
        <vers num="" edition=":second_edition"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0598" seq="2004-0598" published="2004-11-23" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The png_handle_iCCP function in libpng 1.2.5 and earlier allows remote attackers to cause a denial of service (application crash) via a certain PNG image that triggers a null dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000856">CLA-2004:856</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109163866717909&amp;w=2">20040804 [OpenPKG-SA-2004.035] OpenPKG Security Advisory (png)</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109181639602978&amp;w=2">SSRT4778</ref>
      <ref source="SCO" url="http://marc.info/?l=bugtraq&amp;m=109761239318458&amp;w=2">SCOSA-2004.16</ref>
      <ref source="MISC" url="http://scary.beasts.org/security/CESA-2004-001.txt" adv="1">http://scary.beasts.org/security/CESA-2004-001.txt</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-200663-1">200663</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-536" adv="1" patch="1">DSA-536</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-03.xml" adv="1" patch="1">GLSA-200408-03</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-22.xml" adv="1" patch="1">GLSA-200408-22</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/236656" adv="1">VU#236656</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:079">MDKSA-2004:079</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:212">MDKSA-2006:212</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:213">MDKSA-2006:213</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html">http://www.mozilla.org/projects/security/known-vulnerabilities.html</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_23_libpng.html" adv="1" patch="1">SUSE-SA:2004:023</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-402.html" adv="1">RHSA-2004:402</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-429.html" adv="1">RHSA-2004:429</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10857" adv="1" patch="1">10857</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0040/" adv="1">2004-0040</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-217A.html" adv="1">TA04-217A</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1943" patch="1">FLSA:1943</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16895">libpng-pnghandleiccp-dos(16895)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10203">oval:org.mitre.oval:def:10203</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2572">oval:org.mitre.oval:def:2572</ref>
    </refs>
    <vuln_soft>
      <prod name="libpng" vendor="greg_roelofs">
        <vers num="1.2.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0599" seq="2004-0599" published="2004-11-23" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple integer overflows in the (1) png_read_png in pngread.c or (2) png_handle_sPLT functions in pngrutil.c or (3) progressive display image reading capability in libpng 1.2.5 and earlier allow remote attackers to cause a denial of service (application crash) via a malformed PNG image.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt">SCOSA-2005.49</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000856">CLA-2004:856</ref>
      <ref source="APPLE" url="http://lists.apple.com/mhonarc/security-announce/msg00056.html">APPLE-SA-2004-09-09</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109163866717909&amp;w=2">20040804 [OpenPKG-SA-2004.035] OpenPKG Security Advisory (png)</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109181639602978&amp;w=2">SSRT4778</ref>
      <ref source="SCO" url="http://marc.info/?l=bugtraq&amp;m=109761239318458&amp;w=2">SCOSA-2004.16</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="MISC" url="http://scary.beasts.org/security/CESA-2004-001.txt" adv="1">http://scary.beasts.org/security/CESA-2004-001.txt</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-200663-1">200663</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-536" adv="1" patch="1">DSA-536</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-570" adv="1" patch="1">DSA-570</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-571" adv="1" patch="1">DSA-571</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-03.xml" adv="1" patch="1">GLSA-200408-03</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-22.xml" adv="1" patch="1">GLSA-200408-22</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/160448" adv="1">VU#160448</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/286464" adv="1">VU#286464</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/477512" adv="1">VU#477512</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:079">MDKSA-2004:079</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:212">MDKSA-2006:212</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:213">MDKSA-2006:213</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html">http://www.mozilla.org/projects/security/known-vulnerabilities.html</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_23_libpng.html" adv="1" patch="1">SUSE-SA:2004:023</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-402.html" adv="1">RHSA-2004:402</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-421.html" adv="1">RHSA-2004:421</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-429.html" adv="1">RHSA-2004:429</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10857" adv="1" patch="1">10857</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/15495">15495</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0040/" adv="1">2004-0040</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-217A.html" adv="1">TA04-217A</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1943" patch="1">FLSA:1943</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16896">lilbpng-integer-bo(16896)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10938">oval:org.mitre.oval:def:10938</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1479">oval:org.mitre.oval:def:1479</ref>
    </refs>
    <vuln_soft>
      <prod name="libpng" vendor="greg_roelofs">
        <vers num="1.2.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0600" seq="2004-0600" published="2004-07-27" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote attackers to execute arbitrary code via an invalid base-64 character during HTTP basic authentication.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000851">CLA-2004:851</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000854">CLA-2004:854</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109051340810458&amp;w=2">20040722 Security Release - Samba 3.0.5 and 2.2.10</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109051533021376&amp;w=2">20040722 [OpenPKG-SA-2004.033] OpenPKG Security Advisory (samba)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109052647928375&amp;w=2">20040722 Samba 3.x swat preauthentication buffer overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109052891507263&amp;w=2">20040722 TSSA-2004-014 - samba</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109053195818351&amp;w=2">20040722 SWAT PreAuthorization PoC</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-21.xml">GLSA-200407-21</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:071">MDKSA-2004:071</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_22_samba.html">SUSE-SA:2004:022</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-259.html" adv="1" patch="1">RHSA-2004:259</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0039/">2004-0039</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16785">samba-swat-base64-bo(16785)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11445">oval:org.mitre.oval:def:11445</ref>
    </refs>
    <vuln_soft>
      <prod name="samba" vendor="samba">
        <vers num="3.0.2"/>
        <vers num="3.0.2a"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0601" seq="2004-0601" published="2004-12-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">distcc before 2.16, when running on 64-bit platforms, does not interpret IP-based access control rules correctly, which could allow remote attackers to bypass intended restrictions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://distcc.samba.org/ftp/distcc/distcc-2.17.NEWS" adv="1">http://distcc.samba.org/ftp/distcc/distcc-2.17.NEWS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11319" adv="1" patch="1">11319</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17581">distcc-ip-gain-privileges(17581)</ref>
    </refs>
    <vuln_soft>
      <prod name="distcc" vendor="distcc">
        <vers num="2.7"/>
        <vers num="2.9"/>
        <vers num="2.10"/>
        <vers num="2.11"/>
        <vers num="2.12"/>
        <vers num="2.13"/>
        <vers num="2.14"/>
        <vers num="2.15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0602" seq="2004-0602" published="2004-12-06" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The binary compatibility mode for FreeBSD 4.x and 5.x does not properly handle certain Linux system calls, which could allow local users to access kernel memory to gain privileges or cause a system panic.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:13.linux.asc" adv="1" patch="1">FreeBSD-SA-04:13</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10643" adv="1">10643</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16558">freebsd-binary-information-disclosure(16558)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="4.0"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0603" seq="2004-0603" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">gzexe in gzip 1.3.3 and earlier will execute an argument when the creation of a temp file fails instead of exiting the program, which could allow remote attackers or local users to execute arbitrary commands, a different vulnerability than CVE-1999-1332.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=54890" adv="1">http://bugs.gentoo.org/show_bug.cgi?id=54890</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-18.xml" adv="1" patch="1">GLSA-200406-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10603" adv="1" patch="1">10603</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16506">gzip-gzexe-tmpfile(16506)</ref>
    </refs>
    <vuln_soft>
      <prod name="gzip" vendor="gnu">
        <vers num="1.3.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0604" seq="2004-0604" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The HTTP client and server in giFT-FastTrack 0.8.6 and earlier allows remote attackers to cause a denial of service (crash), possibly via an empty search query, which triggers a NULL dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://developer.berlios.de/bugs/?func=detailbug&amp;bug_id=1573&amp;group_id=809">http://developer.berlios.de/bugs/?func=detailbug&amp;bug_id=1573&amp;group_id=809</ref>
      <ref source="CONFIRM" url="http://gift-fasttrack.berlios.de/">http://gift-fasttrack.berlios.de/</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200406-19.xml" adv="1">GLSA-200406-19</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10604" adv="1" patch="1">10604</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16508">gift-fasttrack-daemon-dos(16508)</ref>
    </refs>
    <vuln_soft>
      <prod name="gift-fasttrack" vendor="gift-fasttrack">
        <vers num="0.8.0"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.3"/>
        <vers num="0.8.4"/>
        <vers num="0.8.5"/>
        <vers num="0.8.6"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0605" seq="2004-0605" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Non-registered IRC users using (1) ircd-hybrid 7.0.1 and earlier, (2) ircd-ratbox 1.5.1 and earlier, or (3) ircd-ratbox 2.0rc6 and earlier do not have a rate-limit imposed, which could allow remote attackers to cause a denial of service by repeatedly making requests, which are slowly dequeued.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108766803817406&amp;w=2">20040618 ircd-hybrid-7 / ircd-ratbox low-bandwidth DoS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10572" adv="1" patch="1">10572</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16457">ircd-parseclientqueued-dos(16457)</ref>
    </refs>
    <vuln_soft>
      <prod name="ircd-hybrid" vendor="ircd-hybrid">
        <vers num="7.0.1" prev="1"/>
      </prod>
      <prod name="ircd-ratbox" vendor="ircd-ratbox">
        <vers num="1.5.1" prev="1"/>
        <vers num="2.0_rc6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0606" seq="2004-0606" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Infoblox DNS One running firmware 2.4.0-8 and earlier allows remote attackers to execute arbitrary scripts as other users via the (1) CLIENTID or (2) HOSTNAME option of a DHCP request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108769996925349&amp;w=2">20040619 Script injection in DNSONE appliance</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10573" adv="1">10573</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16456">dnsone-dhcp-report-xss(16456)</ref>
    </refs>
    <vuln_soft>
      <prod name="dns_one_appliance" vendor="infoblox">
        <vers num="2.4.0.8"/>
        <vers num="2.4.0.8a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0607" seq="2004-0607" published="2004-12-06" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.10/SCOSA-2005.10.txt">SCOSA-2005.10</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108726102304507&amp;w=2">20040614 authentication bug in KAME's racoon</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108731967126033&amp;w=2">20040615 Re: authentication bug in KAME's racoon</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200406-17.xml" adv="1" patch="1">GLSA-200406-17</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010495">1010495</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=245982">http://sourceforge.net/project/shownotes.php?release_id=245982</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-308.html">RHSA-2004:308</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10546" adv="1">10546</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16414">racoon-eaycheckx509cert-auth-bypass(16414)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9163">oval:org.mitre.oval:def:9163</ref>
    </refs>
    <vuln_soft>
      <prod name="ipsec-tools" vendor="ipsec-tools">
        <vers num="0.3"/>
        <vers num="0.3.1"/>
        <vers num="0.3.2"/>
        <vers num="0.3_rc1"/>
        <vers num="0.3_rc2"/>
        <vers num="0.3_rc3"/>
        <vers num="0.3_rc4"/>
        <vers num="0.3_rc5"/>
      </prod>
      <prod name="racoon" vendor="kame">
        <vers num="2003-07-11"/>
        <vers num="2004-04-05"/>
        <vers num="2004-04-07b"/>
        <vers num="2004-05-03"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0608" seq="2004-0608" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Unreal Engine, as used in DeusEx 1.112fm and earlier, Devastation 390 and earlier, Mobile Forces 20000 and earlier, Nerf Arena Blast 1.2 and earlier, Postal 2 1337 and earlier, Rune 107 and earlier, Tactical Ops 3.4.0 and earlier, Unreal 1 226f and earlier, Unreal II XMP 7710 and earlier, Unreal Tournament 451b and earlier, Unreal Tournament 2003 2225 and earlier, Unreal Tournament 2004 before 3236, Wheel of Time 333b and earlier, and X-com Enforcer, allows remote attackers to execute arbitrary code via a UDP packet containing a secure query with a long value, which overwrites memory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/unsecure-adv.txt" adv="1">http://aluigi.altervista.org/adv/unsecure-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108787105023304&amp;w=2">20040618 Code execution in the Unreal Engine through \secure\ packet</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-14.xml" adv="1" patch="1">GLSA-200407-14</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10570" adv="1">10570</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16451">unreal-secure-query-command-execute(16451)</ref>
    </refs>
    <vuln_soft>
      <prod name="devastation" vendor="arush">
        <vers num="390.0"/>
      </prod>
      <prod name="tnn_outdoors_pro_hunter" vendor="dreamforge">
        <vers num=""/>
      </prod>
      <prod name="unreal_engine" vendor="epic_games">
        <vers num="226f"/>
        <vers num="433"/>
        <vers num="436"/>
      </prod>
      <prod name="unreal_tournament" vendor="epic_games">
        <vers num="451b"/>
      </prod>
      <prod name="unreal_tournament_2003" vendor="epic_games">
        <vers num="2199_linux"/>
        <vers num="2199_macos"/>
        <vers num="2199_win32"/>
        <vers num="2225_macos"/>
        <vers num="2225_win32"/>
      </prod>
      <prod name="unreal_tournament_2004" vendor="epic_games">
        <vers num="macos"/>
        <vers num="win32"/>
      </prod>
      <prod name="tacticalops" vendor="infogrames">
        <vers num="3.4"/>
      </prod>
      <prod name="x-com_enforcer" vendor="infogrames">
        <vers num=""/>
      </prod>
      <prod name="deusex" vendor="ion_storm">
        <vers num="1.112_fm"/>
      </prod>
      <prod name="nerf_arena_blast" vendor="nerf_arena_blast">
        <vers num="1.2"/>
      </prod>
      <prod name="mobile_forces" vendor="rage_software">
        <vers num="20000.0"/>
      </prod>
      <prod name="wheel_of_time" vendor="robert_jordan">
        <vers num="333.0b"/>
      </prod>
      <prod name="postal_2" vendor="running_with_scissors">
        <vers num="1337"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0609" seq="2004-0609" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">rssh 2.0 through 2.1.x expands command line arguments before entering a chroot jail, which allows remote authenticated users to determine the existence of files in a directory outside the jail.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108787373022844&amp;w=2">20040619 Security flaw in rssh</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10574" adv="1" patch="1">10574</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16470">rssh-jail-obtain-info(16470)</ref>
    </refs>
    <vuln_soft>
      <prod name="rssh" vendor="rssh">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0610" seq="2004-0610" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Web administration interface in Microsoft MN-500 Wireless Router allows remote attackers to cause a denial of service (connection refusal) via a large number of open HTTP connections.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108796481501258&amp;w=2">20040621 Microsoft MN-500 Wireless Router Web-Based Administration DoS</ref>
      <ref source="MISC" url="http://www.kurczaba.com/securityadvisories/0406213.htm" adv="1">http://www.kurczaba.com/securityadvisories/0406213.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10585" adv="1">10585</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16448">mn500-web-admin-dos(16448)</ref>
    </refs>
    <vuln_soft>
      <prod name="mn-500_wireless_base_station" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0611" seq="2004-0611" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Web-Based Administration in Netgear FVS318 VPN Router allows remote attackers to cause a denial of service (no new connections) via a large number of open HTTP connections.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108787199201059&amp;w=2">20040621 NETGEAR FVS318 Web-Based Administration DoS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10585" adv="1">10585</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16462">netgear-fvs318-dos(16462)</ref>
    </refs>
    <vuln_soft>
      <prod name="fvs318" vendor="netgear">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0612" seq="2004-0612" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Mobile Code filter in ZoneAlarm Pro 5.0.590.015 does not filter mobile code within an SSL encrypted session, which could allow remote attackers to bypass the mobile code filtering.  NOTE: it has been disputed by the vendor that this behavior is required by the SSL specification.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0420.html" adv="1">20040625 Zone Labs response to "ZoneAlarm Pro 'Mobile Code' Bypass Vulnerability"</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108786444608208&amp;w=2">20040621 ZoneAlarm Pro 'Mobile Code' Bypass Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10584">10584</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16471">zonealarm-mobile-code-bypass(16471)</ref>
    </refs>
    <vuln_soft>
      <prod name="zonealarm" vendor="zonelabs">
        <vers num="5.0.590.015" edition=":pro"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0613" seq="2004-0613" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">osTicket allows remote attackers to view sensitive uploaded files and possibly execute arbitrary code via an HTTP request that uploads a PHP file to the ticket attachments directory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108786779500957&amp;w=2">20040621 Multiple osTicket exploits!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10586" adv="1" patch="1">10586</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16477">osticket-php-file-upload(16477)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16478">osticket-view-attachments(16478)</ref>
    </refs>
    <vuln_soft>
      <prod name="osticket_sts" vendor="osticket">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0614" seq="2004-0614" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">osTicket trusts a hidden form field in the submit form to limit the upload size of a document, which could allow remote attackers to upload a file of any size.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108786779500957&amp;w=2">20040621 Multiple osTicket exploits!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16477">osticket-php-file-upload(16477)</ref>
    </refs>
    <vuln_soft>
      <prod name="osticket_sts" vendor="osticket">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0615" seq="2004-0615" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in D-Link DI-614+ SOHO router running firmware 2.30, and DI-704 SOHO router running firmware 2.60B2, and DI-624, allows remote attackers to inject arbitrary script or HTML via the DHCP HOSTNAME option in a DHCP request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-07/0014.html">20040701 DLINK 624, script injection vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108786257609932&amp;w=2">20040621 DLINK 614+, script injection vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108797273127182&amp;w=2">20040621 DLINK 704, script injection vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010562">1010562</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10587">10587</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16468">dlink614-dhcp-xss(16468)</ref>
    </refs>
    <vuln_soft>
      <prod name="di-614+" vendor="d-link">
        <vers num="2.30"/>
      </prod>
      <prod name="di-624" vendor="d-link">
        <vers num="1.28" prev="1"/>
      </prod>
      <prod name="di-704p" vendor="d-link">
        <vers num="2.60b2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0616" seq="2004-0616" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The BT Voyager 2000 Wireless ADSL Router has a default public SNMP community name, which allows remote attackers to obtain sensitive information such as the password, which is stored in plaintext.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0710.html" adv="1" patch="1">20040622 Wireless Modem (BT Voyager 2000 Wireless ADSL Router cleartext password)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108794963119034&amp;w=2">20040622 Wireless Modem (BT Voyager 2000 Wireless ADSL Router cleartext password)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10589" adv="1">10589</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16472">bt-voyager-password-plaintext(16472)</ref>
    </refs>
    <vuln_soft>
      <prod name="voyager_2000_wireless_adsl_router" vendor="bt">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0617" seq="2004-0617" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in ArbitroWeb 0.6 allows remote attackers to inject arbitrary script or HTML via the rawURL parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108794392303244&amp;w=2">20040622 ArbitroWeb v0.6 Javascript injection vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10592">10592</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16481">arbitroweb-rawurl-xss(16481)</ref>
    </refs>
    <vuln_soft>
      <prod name="arbitroweb" vendor="arbitroweb">
        <vers num="0.5"/>
        <vers num="0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0618" seq="2004-0618" published="2004-12-06" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">FreeBSD 5.1 for the Alpha processor allows local users to cause a denial of service (crash) via an execve system call with an unaligned memory address as an argument.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108816603102865&amp;w=2">20040623 Security Advisory : FreeBSD local DoS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10596" adv="1" patch="1">10596</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16499">freebsd-execve-dos(16499)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="4.10" edition="release"/>
        <vers num="5.1" edition="alpha"/>
        <vers num="5.1" edition="release"/>
        <vers num="5.1" edition="release_p5"/>
        <vers num="5.1" edition="releng"/>
        <vers num="5.2.1" edition="release"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0619" seq="2004-0619" published="2004-12-06" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the ubsec_keysetup function for Linux Broadcom 5820 cryptonet driver allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a negative add_dsa_buf_bytes variable, which leads to a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108802653409053&amp;w=2">20040623 Linux Broadcom 5820 Cryptonet Driver Integer Overflow</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-047.shtml">P-047</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-549.html" adv="1" patch="1">RHSA-2004:549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-283.html">RHSA-2005:283</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10599" adv="1">10599</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16459">bcm5820-adddsabufbytes-integer-bo(16459)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9773">oval:org.mitre.oval:def:9773</ref>
    </refs>
    <vuln_soft>
      <prod name="kernel" vendor="redhat">
        <vers num="2.4.20-8" edition=":athlon"/>
        <vers num="2.4.20-8" edition=":athlon_smp"/>
        <vers num="2.4.20-8" edition=":i386"/>
        <vers num="2.4.20-8" edition=":i386_src"/>
        <vers num="2.4.20-8" edition=":i586"/>
        <vers num="2.4.20-8" edition=":i586_smp"/>
        <vers num="2.4.20-8" edition=":i686"/>
        <vers num="2.4.20-8" edition=":i686_smp"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.0" edition=":i686"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0620" seq="2004-0620" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in (1) newreply.php or (2) newthread.php in vBulletin 3.0.1 allows remote attackers to inject arbitrary HTML or script as other users via the Edit-panel.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108809720026642&amp;w=2">20040624 vBulletin HTML Injection Vuln</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10602" adv="1">10602</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16502">vbulletin-newreply-newthread-xss(16502)</ref>
    </refs>
    <vuln_soft>
      <prod name="vbulletin" vendor="jelsoft">
        <vers num="3.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0621" seq="2004-0621" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">admin.php in Newsletter ZWS allows remote attackers to gain administrative privileges via a list_user operation with the ulevel parameter set to 1 (administrator level), which lists all users and their passwords.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108811585025216&amp;w=2">20040624 ZWS Newsletter &amp; Mailing List Manager</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10605" adv="1">10605</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16507">zws-gain-admin-access(16507)</ref>
    </refs>
    <vuln_soft>
      <prod name="newsletter_zws" vendor="zaireweb_solutions">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0622" seq="2004-0622" published="2004-12-06" modified="2018-10-19" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Apple Mac OS X 10.3.4, 10.4, 10.5, and possibly other versions does not properly clear memory for login (aka Loginwindow.app), Keychain, or FileVault passwords, which could allow the root user or an attacker with physical access to obtain sensitive information by reading memory.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://citp.princeton.edu/pub/coldboot.pdf">http://citp.princeton.edu/pub/coldboot.pdf</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108819559925981&amp;w=2">20040625 Mac OS X stores login/Keychain/FileVault passwords on disk</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488930/100/100/threaded">20080228 Loginwindow.app and Mac OS X</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488948/100/100/threaded">20080229 Re: Loginwindow.app and Mac OS X</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16557">macos-memory-view-passwords(16557)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3.4"/>
        <vers num="10.4"/>
        <vers num="10.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0623" seq="2004-0623" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in misc.c in GNU GNATS 4.00 may allow remote attackers to execute arbitrary code via format string specifiers in a string that gets logged by syslog.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108820000823191&amp;w=2">20040625 format string vulnerability in Gnats</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10609" adv="1" patch="1">10609</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16517">gnats-format-string(16517)</ref>
    </refs>
    <vuln_soft>
      <prod name="gnats" vendor="gnu">
        <vers num="3.0_02"/>
        <vers num="3.2"/>
        <vers num="3.14b"/>
        <vers num="3.113"/>
        <vers num="3.113.1"/>
        <vers num="3.113.1.6"/>
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0624" seq="2004-0624" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in index.php for Artmedic links 5.0 (artmedic_links5) allows remote attackers to execute arbitrary PHP code by modifying the id parameter to reference a URL on a remote web server that contains the code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108820257812904&amp;w=2">20040625 artmedic_links5 PHP Script (include path) vuln</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16518">artmedic-url-file-disclosure(16518)</ref>
    </refs>
    <vuln_soft>
      <prod name="artmedic_links" vendor="artmedic_webdesign">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0625" seq="2004-0625" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Infinity WEB 1.0 allows remote attackers to bypass authentication and gain privileges via the login page.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0893.html" adv="1" patch="1">20040627 ZH2004-14SA (security advisory):Sql Injection in Infinity WEB</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108844087931959&amp;w=2">20040627 ZH2004-14SA (security advisory):Sql Injection in Infinity WEB</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10614" adv="1" patch="1">10614</ref>
      <ref source="MISC" url="http://www.zone-h.org/en/advisories/read/id=4892/" adv="1" patch="1">http://www.zone-h.org/en/advisories/read/id=4892/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16513">infinity-web-sql-injection(16513)</ref>
    </refs>
    <vuln_soft>
      <prod name="infinity_web" vendor="websoft">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0626" seq="2004-0626" published="2004-12-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The tcp_find_option function of the netfilter subsystem in Linux kernel 2.6, when using iptables and TCP options rules, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a casting operation to the char type.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000852" adv="1" patch="1">CLA-2004:852</ref>
      <ref source="FEDORA" url="http://lwn.net/Articles/91964/" adv="1" patch="1">FEDORA-2004-202</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108861141304495&amp;w=2">20040630 Remote DoS vulnerability in Linux kernel 2.6.x</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-12.xml" adv="1" patch="1">GLSA-200407-12</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_20_kernel.html">SUSE-SA:2004:020</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16554">linux-tcpfindoption-dos(16554)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux" vendor="conectiva">
        <vers num="10"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0627" seq="2004-0627" published="2004-12-06" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html" adv="1" patch="1">20040705 MySQL Authentication Bypass</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108904917528205&amp;w=2">20040705 MySQL Authentication Bypass</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/184030" adv="1" patch="1">VU#184030</ref>
    </refs>
    <vuln_soft>
      <prod name="mysql" vendor="mysql">
        <vers num="4.1"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0628" seq="2004-0628" published="2004-12-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long scramble string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html" adv="1" patch="1">20040705 MySQL Authentication Bypass</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108904917528205&amp;w=2">20040705 MySQL Authentication Bypass</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/645326" adv="1" patch="1">VU#645326</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16612">mysql-myrnd-bo(16612)</ref>
    </refs>
    <vuln_soft>
      <prod name="mysql" vendor="mysql">
        <vers num="4.1"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0629" seq="2004-0629" published="2004-09-28" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the ActiveX component (pdf.ocx) for Adobe Acrobat 5.0.5 and Acrobat Reader, and possibly other versions, allows remote attackers to execute arbitrary code via a URI for a PDF file with a null terminator (%00) followed by a long string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.adobe.com/support/techdocs/330527.html">http://www.adobe.com/support/techdocs/330527.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-14.xml" adv="1" patch="1">GLSA-200408-14</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=126&amp;type=vulnerabilities">20040813 Adobe Acrobat/Acrobat Reader ActiveX Control Buffer Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10947" adv="1" patch="1">10947</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16998">acrobat-reader-activex-bo(16998)</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat" vendor="adobe">
        <vers num="5.0"/>
        <vers num="5.0.5"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
      </prod>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="5.0"/>
        <vers num="5.0.5"/>
        <vers num="5.1"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0630" seq="2004-0630" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The uudecoding feature in Adobe Acrobat Reader 5.0.5 and 5.0.6 for Unix and Linux, and possibly other versions including those before 5.0.9, allows remote attackers to execute arbitrary code via shell metacharacters ("`" or backtick) in the filename of the PDF file that is provided to the uudecode command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-14.xml" adv="1">GLSA-200408-14</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/techdocs/322914.html">http://www.adobe.com/support/techdocs/322914.html</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=124&amp;type=vulnerabilities">20040812 Adobe Acrobat Reader (Unix) Shell Metacharacter Code Execution Vulnerability</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-432.html">RHSA-2004:432</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10931" adv="1" patch="1">10931</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16973">acrobat-reader-execute-code(16973)</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="5.0"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0631" seq="2004-0631" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the uudecoding feature for Adobe Acrobat Reader 5.0.5 and 5.0.6 for Unix and Linux, and possibly other versions including those before 5.0.9, allows remote attackers to execute arbitrary code via a long filename for the PDF file that is provided to the uudecode command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-14.xml" adv="1">GLSA-200408-14</ref>
      <ref source="CONFIRM" url="http://www.adobe.com/support/techdocs/322914.html">http://www.adobe.com/support/techdocs/322914.html</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=125&amp;type=vulnerabilities">20040812 Adobe Acrobat Reader (Unix) 5.0 Uudecode Filename Buffer Overflow Vulnerability</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-432.html">RHSA-2004:432</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10932" adv="1">10932</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16972">adobe-acrobat-uudecode-bo(16972)</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="5.0"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0632" seq="2004-0632" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Adobe Reader 6.0 does not properly handle null characters when splitting a filename path into components, which allows remote attackers to execute arbitrary code via a file with a long extension that is not normally handled by Reader, triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.adobe.com/support/techdocs/330527.html">http://www.adobe.com/support/techdocs/330527.html</ref>
      <ref source="MISC" url="http://www.adobe.com/support/techdocs/34222.htm">http://www.adobe.com/support/techdocs/34222.htm</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=116&amp;type=vulnerabilities">20040712 Adobe Reader 6.0 Filename Handler Buffer Overflow Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16667">adobe-acrobat-null-bo(16667)</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat" vendor="adobe">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
      </prod>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0633" seq="2004-0633" published="2004-12-06" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The iSNS dissector for Ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via an integer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000916">CLA-2005:916</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010655">1010655</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00015.html">http://www.ethereal.com/appnotes/enpa-sa-00015.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml" adv="1" patch="1">GLSA-200407-08</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/829422">VU#829422</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067" adv="1" patch="1">MDKSA-2004:067</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00013.html" adv="1" patch="1">FEDORA-2004-219</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00014.html" adv="1" patch="1">FEDORA-2004-220</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-378.html">RHSA-2004:378</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16630">ethereal-isns-dos(16630)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9931">oval:org.mitre.oval:def:9931</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.10.3"/>
        <vers num="0.10.4"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2"/>
        <vers num="10.0"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":as"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0634" seq="2004-0634" published="2004-12-06" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The SMB SID snooping capability in Ethereal 0.9.15 to 0.10.4 allows remote attackers to cause a denial of service (process crash) via a handle without a policy name, which causes a null dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000916">CLA-2005:916</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010655">1010655</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00015.html">http://www.ethereal.com/appnotes/enpa-sa-00015.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml" adv="1" patch="1">GLSA-200407-08</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/518782">VU#518782</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067" adv="1" patch="1">MDKSA-2004:067</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00013.html" adv="1" patch="1">FEDORA-2004-219</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00014.html" adv="1" patch="1">FEDORA-2004-220</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-378.html">RHSA-2004:378</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16631">ethereal-smb-sid-dos(16631)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10252">oval:org.mitre.oval:def:10252</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.9.15"/>
        <vers num="0.10.4"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2"/>
        <vers num="10.0"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":as"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0635" seq="2004-0635" published="2004-12-06" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The SNMP dissector in Ethereal 0.8.15 through 0.10.4 allows remote attackers to cause a denial of service (process crash) via a (1) malformed or (2) missing community string, which causes an out-of-bounds read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000916">CLA-2005:916</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010655">1010655</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-528">DSA-528</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00015.html">http://www.ethereal.com/appnotes/enpa-sa-00015.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml" adv="1" patch="1">GLSA-200407-08</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/835846">VU#835846</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067" adv="1" patch="1">MDKSA-2004:067</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00013.html" adv="1" patch="1">FEDORA-2004-219</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00014.html" adv="1" patch="1">FEDORA-2004-220</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-378.html">RHSA-2004:378</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16632">ethereal-snmp-community-dos(16632)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9721">oval:org.mitre.oval:def:9721</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.8.15"/>
        <vers num="0.8.16"/>
        <vers num="0.8.17"/>
        <vers num="0.8.18"/>
        <vers num="0.8.19"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.10"/>
        <vers num="0.9.11"/>
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.10.3"/>
        <vers num="0.10.4"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2"/>
        <vers num="10.0"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":as"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0636" seq="2004-0636" published="2004-11-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the goaway function in the aim:goaway URI handler for AOL Instant Messenger (AIM) 5.5, including 5.5.3595, allows remote attackers to execute arbitrary code via a long Away message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=121&amp;type=vulnerabilities" adv="1" patch="1">http://www.idefense.com/application/poi/display?id=121&amp;type=vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/735966">VU#735966</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16926">aim-away-bo(16926)</ref>
    </refs>
    <vuln_soft>
      <prod name="instant_messenger" vendor="aol">
        <vers num="5.5"/>
        <vers num="5.5.3415_beta"/>
        <vers num="5.5.3595"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0637" seq="2004-0637" published="2004-09-02" modified="2008-09-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Oracle Database Server 8.1.7.4 through 9.2.0.4 allows local users to execute commands with additional privileges via the ctxsys.driload package, which is publicly accessible.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=136&amp;type=vulnerabilities&amp;flashstatus=true" adv="1" patch="1">20040902 Oracle Database Server ctxsys.driload Access Validation Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/316206" adv="1" patch="1">VU#316206</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11099">11099</ref>
    </refs>
    <vuln_soft>
      <prod name="oracle8i" vendor="oracle">
        <vers num="enterprise_8.1.7_.4"/>
        <vers num="standard_8.1.7_.4"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="enterprise_9.2.0.4"/>
        <vers num="personal_9.2.0.4"/>
        <vers num="standard_9.0.1.3"/>
        <vers num="standard_9.2.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0638" seq="2004-0638" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="8.5" CVSS_base_score="8.5" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the KSDWRTB function in the dbms_system package (dbms_system.ksdwrt) for Oracle 9i Database Server Release 2 9.2.0.3 and 9.2.0.4, 9i Release 1 9.0.1.4 and 9.0.1.5, and 8i Release 1 8.1.7.4, allows remote authorized users to execute arbitrary code via a long second argument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0178.html" adv="1" patch="1">20040905 Buffer Overflow in DBMS_SYSTEM.KSDWRT() in Oracle8i - 9i</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=135&amp;type=vulnerabilities&amp;flashstatus=false" adv="1" patch="1">20040902 Oracle Database Server dbms_system.ksdwrt Buffer Overflow Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf" adv="1">http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf</ref>
      <ref source="MISC" url="http://www.red-database-security.com/advisory/advisory_20040903_3.htm" adv="1" patch="1">http://www.red-database-security.com/advisory/advisory_20040903_3.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11100" patch="1">11100</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17254">oracle-dbmssystem-bo(17254)</ref>
    </refs>
    <vuln_soft>
      <prod name="oracle8i" vendor="oracle">
        <vers num="enterprise_8.1.7.4"/>
        <vers num="standard_8.1.7.4"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="enterprise_9.0.1.4"/>
        <vers num="enterprise_9.0.1.5"/>
        <vers num="enterprise_9.2.0.3"/>
        <vers num="enterprise_9.2.0.4"/>
        <vers num="personal_9.0.1.4"/>
        <vers num="personal_9.0.1.5"/>
        <vers num="personal_9.2.0.3"/>
        <vers num="personal_9.2.0.4"/>
        <vers num="standard_9.0.1.4"/>
        <vers num="standard_9.0.1.5"/>
        <vers num="standard_9.2.0.3"/>
        <vers num="standard_9.2.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0639" seq="2004-0639" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Squirrelmail 1.2.10 and earlier allow remote attackers to inject arbitrary HTML or script via (1) the $mailer variable in read_body.php, (2) the $senderNames_part variable in mailbox_display.php, and possibly other vectors including (3) the $event_title variable or (4) the $event_text variable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=257973">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=257973</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000858">CLA-2004:858</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108611554415078&amp;w=2">20040530 RS-2004-1: SquirrelMail "Content-Type" XSS vulnerability</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-535" adv="1" patch="1">DSA-535</ref>
      <ref source="MISC" url="http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt" adv="1">http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10450" patch="1">10450</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16285">squirrelmail-from-header-xss(16285)</ref>
    </refs>
    <vuln_soft>
      <prod name="open_webmail" vendor="open_webmail">
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="3.0"/>
      </prod>
      <prod name="squirrelmail" vendor="squirrelmail">
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3_rc1"/>
        <vers num="1.5_dev"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0640" seq="2004-0640" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the SSL_set_verify function in telnetd.c for SSLtelnet daemon (SSLtelnetd) 0.13 allows remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-529" adv="1" patch="1">DSA-529</ref>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=114&amp;type=vulnerabilities">http://www.idefense.com/application/poi/display?id=114&amp;type=vulnerabilities</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16653">ssltelnetd-format-string(16653)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_netkit" vendor="netkit">
        <vers num="0.17"/>
        <vers num="0.17.17"/>
      </prod>
      <prod name="secure_telnet" vendor="ssltelnetd">
        <vers num="0.13.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0641" seq="2004-0641" published="2004-08-05" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4299" adv="1">ESB-2004.0504</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=120&amp;type=vulnerabilities&amp;flashstatus=true" adv="1">20040805 Thompson SpeedTouch Home ADSL Modem Predictable TCP ISN Generation</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10881" adv="1">10881</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16919">speedtouch-hijack-connection(16919)</ref>
    </refs>
    <vuln_soft>
      <prod name="speedtouch" vendor="thomson">
        <vers num="510_adsl_router"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0642" seq="2004-0642" published="2004-09-28" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key Distribution Center (KDC) library and (2) client library for MIT Kerberos 5 (krb5) 1.3.4 and earlier may allow remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000860">CLA-2004:860</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109508872524753&amp;w=2">20040913 [OpenPKG-SA-2004.039] OpenPKG Security Advisory (kerberos)</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-350.html">RHSA-2004:350</ref>
      <ref source="CONFIRM" url="http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt">http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-543">DSA-543</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml" adv="1">GLSA-200409-09</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/795632">VU#795632</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11078">11078</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0045/" adv="1" patch="1">2004-0045</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-247A.html">TA04-247A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17157">kerberos-kdc-double-free(17157)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10709">oval:org.mitre.oval:def:10709</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4936">oval:org.mitre.oval:def:4936</ref>
    </refs>
    <vuln_soft>
      <prod name="kerberos" vendor="mit">
        <vers num="5-1.3.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0643" seq="2004-0643" published="2004-09-28" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Double free vulnerability in the krb5_rd_cred function for MIT Kerberos 5 (krb5) 1.3.1 and earlier may allow local users to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000860">CLA-2004:860</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109508872524753&amp;w=2">20040913 [OpenPKG-SA-2004.039] OpenPKG Security Advisory (kerberos)</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-350.html">RHSA-2004:350</ref>
      <ref source="CONFIRM" url="http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt">http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-543">DSA-543</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml" adv="1">GLSA-200409-09</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/866472">VU#866472</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11078">11078</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0045/" adv="1" patch="1">2004-0045</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-247A.html">TA04-247A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17159">kerberos-krb5rdcred-double-free(17159)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10267">oval:org.mitre.oval:def:10267</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3322">oval:org.mitre.oval:def:3322</ref>
    </refs>
    <vuln_soft>
      <prod name="kerberos" vendor="mit">
        <vers num="5-1.3.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0644" seq="2004-0644" published="2004-09-28" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The asn1buf_skiptail function in the ASN.1 decoder library for MIT Kerberos 5 (krb5) 1.2.2 through 1.3.4 allows remote attackers to cause a denial of service (infinite loop) via a certain BER encoding.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000860">CLA-2004:860</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109508872524753&amp;w=2">20040913 [OpenPKG-SA-2004.039] OpenPKG Security Advisory (kerberos)</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-350.html">RHSA-2004:350</ref>
      <ref source="CONFIRM" url="http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-003-asn1.txt">http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-003-asn1.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-543">DSA-543</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml" adv="1" patch="1">GLSA-200409-09</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/550464">VU#550464</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11079">11079</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0045/" adv="1" patch="1">2004-0045</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-247A.html">TA04-247A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17160">kerberos-asn1-library-dos(17160)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10014">oval:org.mitre.oval:def:10014</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2139">oval:org.mitre.oval:def:2139</ref>
    </refs>
    <vuln_soft>
      <prod name="kerberos" vendor="mit">
        <vers num="5-1.2.2"/>
        <vers num="5-1.2.3"/>
        <vers num="5-1.2.4"/>
        <vers num="5-1.2.5"/>
        <vers num="5-1.2.6"/>
        <vers num="5-1.2.7"/>
        <vers num="5-1.2.8"/>
        <vers num="5-1.3" edition="alpha1"/>
        <vers num="5-1.3.1"/>
        <vers num="5-1.3.2"/>
        <vers num="5-1.3.3"/>
        <vers num="5-1.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0645" seq="2004-0645" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the wvHandleDateTimePicture function in wv library (wvWare) 0.7.4 through 0.7.6 and 1.0.0 allows remote attackers to execute arbitrary code via a document with a long DateTime field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cpan.cybercomm.nl/pub/gentoo-portage/app-text/wv/files/wv-1.0.0-fix_overflow.patch">http://cpan.cybercomm.nl/pub/gentoo-portage/app-text/wv/files/wv-1.0.0-fix_overflow.patch</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000863">CLA-2004:863</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-11.xml" adv="1" patch="1">GLSA-200407-11</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-579">DSA-579</ref>
      <ref source="CONFIRM" url="http://www.freebsd.org/ports/portaudit/7a5430df-d562-11d8-b479-02e0185c0b53.html">http://www.freebsd.org/ports/portaudit/7a5430df-d562-11d8-b479-02e0185c0b53.html</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=115&amp;type=vulnerabilities" adv="1" patch="1">20040709 wvWare Library Buffer Overflow Vulnerability</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:077">MDKSA-2004:077</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1906">FLSA:1906</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16660">wvware-wvhandledatetimepicture-bo(16660)</ref>
    </refs>
    <vuln_soft>
      <prod name="community_abiword" vendor="abisource">
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
      </prod>
      <prod name="wvware" vendor="wvware">
        <vers num="0.7.4"/>
        <vers num="0.7.5"/>
        <vers num="0.7.6"/>
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0646" seq="2004-0646" published="2004-12-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the WriteToLog function for JRun 3.0 through 4.0 web server connectors, such as (1) mod_jrun and (2) mod_jrun20 for Apache, with verbose logging enabled, allows remote attackers to execute arbitrary code via a long HTTP header Content-Type field or other fields.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/990200">VU#990200</ref>
      <ref source="CONFIRM" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" patch="1">http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html</ref>
      <ref source="CONFIRM" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html">http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/377194">20040929 iDEFENSE Security Advisory 09.29.04 - Macromedia JRun 4 mod_jrun Apache Module Buffer Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11245" adv="1" patch="1">11245</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17485">coldfusion-jrun-verbose-bo(17485)</ref>
    </refs>
    <vuln_soft>
      <prod name="coldfusion" vendor="macromedia">
        <vers num="6.0"/>
        <vers num="6.1"/>
      </prod>
      <prod name="jrun" vendor="macromedia">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0647" seq="2004-0647" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">shorewall 1.4.10c and earlier, and 2.0.x before 2.0.3a, allows local users to overwrite arbitrary files via a symlink attack on the chains-$$ temporary file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.shorewall.net/pipermail/shorewall-announce/2004-June/000385.html">[Shorewall-announce] 20040628 URGENT: Shorewall Security Vulnerability</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-07.xml" adv="1" patch="1">GLSA-200407-07</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:080">MDKSA-2004:080</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16651">shorewall-symlink(16651)</ref>
    </refs>
    <vuln_soft>
      <prod name="shorewall" vendor="shorewall">
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.3a"/>
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
        <vers num="1.4.6"/>
        <vers num="1.4.7"/>
        <vers num="1.4.8"/>
        <vers num="1.4.9"/>
        <vers num="1.4.10"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0648" seq="2004-0648" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Mozilla (Suite) before 1.7.1, Firefox before 0.9.2, and Thunderbird before 0.7.2 allow remote attackers to launch arbitrary programs via a URI referencing the shell: protocol.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023573.html">20040707 shell:windows command question</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108938712815719&amp;w=2">20040708 Mozilla Security Advisory 2004-07-08</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-175.shtml">O-175</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/927014" adv="1">VU#927014</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html">http://www.mozilla.org/projects/security/known-vulnerabilities.html</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/shell.html">http://www.mozilla.org/security/shell.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16655">mozilla-shell-program-execution(16655)</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.9.2" prev="1"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.7.1" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.7.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0649" seq="2004-0649" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in write_packet in control.c for l2tpd may allow remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108640917925735&amp;w=2">20040604 bss-based buffer overflow in l2tpd</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-17.xml" adv="1">GLSA-200407-17</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-530" adv="1" patch="1">DSA-530</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16326">l2tpd-writepacket-bo(16326)</ref>
    </refs>
    <vuln_soft>
      <prod name="l2tpd" vendor="l2tpd">
        <vers num="0.62"/>
        <vers num="0.63"/>
        <vers num="0.64"/>
        <vers num="0.65"/>
        <vers num="0.66"/>
        <vers num="0.67"/>
        <vers num="0.68"/>
        <vers num="0.69"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0650" seq="2004-0650" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">UploadServlet in Cisco Collaboration Server (CCS) running ServletExec before 3.0E allows remote attackers to upload and execute arbitrary files via a direct call to the UploadServlet URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040630-CCS.shtml">20040630 Cisco Collaboration Server Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/718896" adv="1" patch="1">VU#718896</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10639" adv="1" patch="1">10639</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16553">ccs-servletexec-gain-privileges(16553)</ref>
    </refs>
    <vuln_soft>
      <prod name="servletexec" vendor="newatlanta">
        <vers num="2.2"/>
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0651" seq="2004-0651" published="2004-08-06" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Sun Java Runtime Environment (JRE) 1.4.2 through 1.4.2_03 allows remote attackers to cause a denial of service (virtual machine hang).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=108559041910233&amp;w=2">HPSBUX01044</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57555">57555</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/118558" adv="1" patch="1">VU#118558</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/6773">SSRT4749</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10301" adv="1" patch="1">10301</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16085">sun-java-dos(16085)</ref>
    </refs>
    <vuln_soft>
      <prod name="jre" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_3"/>
      </prod>
      <prod name="sdk" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.4.2_03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0652" seq="2004-0652" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">BEA WebLogic Server and WebLogic Express 7.0 through 7.0 Service Pack 4, and 8.1 through 8.1 Service Pack 2, allows attackers to obtain the username and password for booting the server by directly accessing certain internal methods.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_55.00.jsp">http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_55.00.jsp</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009766">1009766</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/352110" adv="1" patch="1">VU#352110</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10133" adv="1" patch="1">10133</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15865">bea-gain-privileges(15865)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="7.0" edition=":express"/>
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0" edition="sp1:express"/>
        <vers num="7.0" edition="sp1:win32"/>
        <vers num="7.0" edition="sp2:express"/>
        <vers num="7.0" edition="sp2:win32"/>
        <vers num="7.0" edition="sp3:express"/>
        <vers num="7.0" edition="sp3:win32"/>
        <vers num="7.0" edition="sp4:express"/>
        <vers num="7.0" edition="sp4:win32"/>
        <vers num="7.0.0.1" edition=":express"/>
        <vers num="7.0.0.1" edition=":win32"/>
        <vers num="7.0.0.1" edition="sp1:express"/>
        <vers num="7.0.0.1" edition="sp1:win32"/>
        <vers num="7.0.0.1" edition="sp2:express"/>
        <vers num="7.0.0.1" edition="sp2:win32"/>
        <vers num="7.0.0.1" edition="sp3:express"/>
        <vers num="7.0.0.1" edition="sp4:express"/>
        <vers num="8.1" edition=":express"/>
        <vers num="8.1" edition=":win32"/>
        <vers num="8.1" edition="sp1:express"/>
        <vers num="8.1" edition="sp1:win32"/>
        <vers num="8.1" edition="sp2:express"/>
        <vers num="8.1" edition="sp2:win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0653" seq="2004-0653" published="2004-08-06" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Solaris 9, when configured as a Kerberos client with patch 112908-12 or 115168-03 and using pam_krb5 as an "auth" module with the debug feature enabled, records passwords in plaintext, which could allow local users to gain other user's passwords by reading log files.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57587">57587</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101519-1">101519</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-172.shtml" adv="1" patch="1">O-172</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/523710" adv="1" patch="1">VU#523710</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10606">10606</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16450">solaris-kerberos-password-plaintext(16450)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2065">oval:org.mitre.oval:def:2065</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A255">oval:org.mitre.oval:def:255</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="9.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0654" seq="2004-0654" published="2004-08-06" modified="2018-10-30" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the Basic Security Module (BSM), when configured to audit either the Administrative (ad) or the System-Wide Administration (as) audit class in Solaris 7, 8, and 9, allows local users to cause a denial of service (kernel panic).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57497">57497</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/901582" adv="1" patch="1">VU#901582</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10594">10594</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16483">solaris-bsm-audit-dos(16483)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2426">oval:org.mitre.oval:def:2426</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="7.0" edition=":x86"/>
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
        <vers num="9.0" edition="x86_update_2"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.7"/>
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0655" seq="2004-0655" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">eupdatedb in esearch 0.6.1 and earlier allows local users to create arbitrary files via a symlink attack on the esearchdb.py.tmp temporary file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-01.xml" adv="1">GLSA-200407-01</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10644" adv="1" patch="1">10644</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16584">esearch-eupdatedb-symlink(16584)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0656" seq="2004-0656" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The accept_client function in PureFTPd 1.0.18 and earlier allows remote attackers to cause a denial of service by exceeding the maximum number of connections.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-04.xml" adv="1" patch="1">GLSA-200407-04</ref>
      <ref source="CONFIRM" url="http://www.pureftpd.org/">http://www.pureftpd.org/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16611">pure-ftpd-acceptclient-dos(16611)</ref>
    </refs>
    <vuln_soft>
      <prod name="pureftpd" vendor="pureftpd">
        <vers num="0.96"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.11"/>
        <vers num="1.0.12"/>
        <vers num="1.0.13a"/>
        <vers num="1.0.14"/>
        <vers num="1.0.15"/>
        <vers num="1.0.16"/>
        <vers num="1.0.16a"/>
        <vers num="1.0.16b"/>
        <vers num="1.0.16c"/>
        <vers num="1.0.17a"/>
        <vers num="1.0.18"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0657" seq="2004-0657" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Integer overflow in the NTP daemon (NTPd) before 4.0 causes the NTP server to return the wrong date/time offset when a client requests a date/time that is more than 34 years away from the server's time.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=108922292425219&amp;w=2">SSRT4718</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/584606" adv="1" patch="1">VU#584606</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15406">ntp-integer-bo(15406)</ref>
    </refs>
    <vuln_soft>
      <prod name="ntp" vendor="ntp">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0658" seq="2004-0658" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the hpsb_alloc_packet function (incorrectly reported as alloc_hpsb_packet) in IEEE 1394 (Firewire) driver 2.4 and 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via the functions (1) raw1394_write, (2) state_connected, (3) handle_remote_request, or (4) hpsb_make_writebpacket.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108793792820740">20040622 linux kernel IEEE1394(Firewire) driver integer overflow</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16480">linux-1394-integer-bo(16480)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.6"/>
        <vers num="2.5.7"/>
        <vers num="2.5.8"/>
        <vers num="2.5.9"/>
        <vers num="2.5.10"/>
        <vers num="2.5.11"/>
        <vers num="2.5.12"/>
        <vers num="2.5.13"/>
        <vers num="2.5.14"/>
        <vers num="2.5.15"/>
        <vers num="2.5.16"/>
        <vers num="2.5.17"/>
        <vers num="2.5.18"/>
        <vers num="2.5.19"/>
        <vers num="2.5.20"/>
        <vers num="2.5.21"/>
        <vers num="2.5.22"/>
        <vers num="2.5.23"/>
        <vers num="2.5.24"/>
        <vers num="2.5.25"/>
        <vers num="2.5.26"/>
        <vers num="2.5.27"/>
        <vers num="2.5.28"/>
        <vers num="2.5.29"/>
        <vers num="2.5.30"/>
        <vers num="2.5.31"/>
        <vers num="2.5.32"/>
        <vers num="2.5.33"/>
        <vers num="2.5.34"/>
        <vers num="2.5.35"/>
        <vers num="2.5.36"/>
        <vers num="2.5.37"/>
        <vers num="2.5.38"/>
        <vers num="2.5.39"/>
        <vers num="2.5.40"/>
        <vers num="2.5.41"/>
        <vers num="2.5.42"/>
        <vers num="2.5.43"/>
        <vers num="2.5.44"/>
        <vers num="2.5.45"/>
        <vers num="2.5.46"/>
        <vers num="2.5.47"/>
        <vers num="2.5.48"/>
        <vers num="2.5.49"/>
        <vers num="2.5.50"/>
        <vers num="2.5.51"/>
        <vers num="2.5.52"/>
        <vers num="2.5.53"/>
        <vers num="2.5.54"/>
        <vers num="2.5.55"/>
        <vers num="2.5.56"/>
        <vers num="2.5.57"/>
        <vers num="2.5.58"/>
        <vers num="2.5.59"/>
        <vers num="2.5.60"/>
        <vers num="2.5.61"/>
        <vers num="2.5.62"/>
        <vers num="2.5.63"/>
        <vers num="2.5.64"/>
        <vers num="2.5.65"/>
        <vers num="2.5.66"/>
        <vers num="2.5.67"/>
        <vers num="2.5.68"/>
        <vers num="2.5.69"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0659" seq="2004-0659" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in TranslateFilename for common.c in MPlayer 1.0pre4 allows remote attackers to execute arbitrary code via a long file name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108844316930791&amp;w=2">20040627 MPlayer MeMPlayer.c</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-01.xml">GLSA-200408-01</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10615" adv="1">10615</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16532">mplayer-common-bo(16532)</ref>
    </refs>
    <vuln_soft>
      <prod name="mplayer" vendor="mplayer">
        <vers num="0.90"/>
        <vers num="0.90_pre"/>
        <vers num="0.90_rc"/>
        <vers num="0.90_rc4"/>
        <vers num="0.91"/>
        <vers num="0.92"/>
        <vers num="0.92.1"/>
        <vers num="0.92_cvs"/>
        <vers num="1.0_pre1"/>
        <vers num="1.0_pre2"/>
        <vers num="1.0_pre3"/>
        <vers num="1.0_pre3try2"/>
        <vers num="1.0_pre4"/>
        <vers num="head_cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0660" seq="2004-0660" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in (1) show_archives.php, (2) show_news.php, and possibly other php files in CuteNews 1.3.1 allows remote attackers to inject arbitrary script or HTML via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108844000409449&amp;w=2">20040628 Cross-Site Scripting CuteNews</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16525">cutenews-id-xss(16525)</ref>
    </refs>
    <vuln_soft>
      <prod name="cutenews" vendor="cutephp">
        <vers num="0.88"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0661" seq="2004-0661" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer signedness error in D-Link AirPlus DI-614+ running firmware 2.30 and earlier allows remote attackers to cause a denial of service (IP lease depletion) via a DHCP request with the LEASETIME option set to -1, which makes the DHCP lease valid for thirteen or more years.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108844250013785&amp;w=2">20040628 DLINK 614+ - SOHO routers, DHCP service DOS</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/367485">20040629 Re: DLINK 614+ - SOHO routers, system DOS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10621" adv="1">10621</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16531">dlink-dhcp-request-dos(16531)</ref>
    </refs>
    <vuln_soft>
      <prod name="di-604" vendor="d-link">
        <vers num=""/>
      </prod>
      <prod name="di-614+" vendor="d-link">
        <vers num="2.30"/>
      </prod>
      <prod name="di-624" vendor="d-link">
        <vers num="1.28"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0662" seq="2004-0662" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">PowerPortal 1.x allows remote attackers to gain sensitive information via invalid or missing parameters in HTTP requests to (1) resize.php or (2) modules.php, which reveals the path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108844362627811&amp;w=2">20040628 Multiple vulnerabilities PowerPortal</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10622" adv="1">10622</ref>
      <ref source="MISC" url="http://www.swp-zone.org/archivos/advisory-07.txt">http://www.swp-zone.org/archivos/advisory-07.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16529">powerportal-path-disclosure(16529)</ref>
    </refs>
    <vuln_soft>
      <prod name="powerportal" vendor="powerportal">
        <vers num="1.1b"/>
        <vers num="1.3"/>
        <vers num="1.3b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0663" seq="2004-0663" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in modules.php in PowerPortal 1.x allows remote attackers to inject arbitrary script or HTML via the (1) id parameter to the (a) private_messages module; (2) search parameter to the (b) links and (c) content modules; and (3) files parameter to the gallery module.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108844362627811&amp;w=2">20040628 Multiple vulnerabilities PowerPortal</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16528">powerportal-multiple-xss(16528)</ref>
    </refs>
    <vuln_soft>
      <prod name="powerportal" vendor="powerportal">
        <vers num="1.1b"/>
        <vers num="1.3"/>
        <vers num="1.3b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0664" seq="2004-0664" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in modules.php in PowerPortal 1.x allows remote attackers to list arbitrary directories via a .. (dot dot) in the files parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108844362627811&amp;w=2">20040628 Multiple vulnerabilities PowerPortal</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10622" adv="1">10622</ref>
      <ref source="MISC" url="http://www.swp-zone.org/archivos/advisory-07.txt">http://www.swp-zone.org/archivos/advisory-07.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16530">powerportal-dotdot-directory-traversal(16530)</ref>
    </refs>
    <vuln_soft>
      <prod name="powerportal" vendor="powerportal">
        <vers num="1.1b"/>
        <vers num="1.3"/>
        <vers num="1.3b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0665" seq="2004-0665" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">csFAQ.cgi in csFAQ allows remote attackers to gain sensitive information via an invalid database parameter, which reveals the path to the web server in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108844203121238&amp;w=2">20040628 Full path disclosure csFAQ</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10618" adv="1">10618</ref>
      <ref source="MISC" url="http://www.swp-zone.org/archivos/advisory-08.txt">http://www.swp-zone.org/archivos/advisory-08.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16526">csfaq-path-disclosure(16526)</ref>
    </refs>
    <vuln_soft>
      <prod name="csfaq" vendor="cgiscript.net">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0666" seq="2004-0666" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Off-by-one error in the POP3_readmsg function in popclient 3.0b6 allows remote attackers to cause a denial of service (application crash) via an e-mail message with a certain line length, which leads to a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/023147.html">20040629 DoS in popclient 3.0b6</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108852915403293&amp;w=2">20040629 DoS in popclient 3.0b6</ref>
      <ref source="MISC" url="http://www.grok.org.uk/advisories/popclient.html">http://www.grok.org.uk/advisories/popclient.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10625" adv="1">10625</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16538">popclient-pop3readmsg-offbyone-bo(16538)</ref>
    </refs>
    <vuln_soft>
      <prod name="popclient" vendor="popclient">
        <vers num="3.0_b6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0667" seq="2004-0667" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Rule Set Based Access Control (RSBAC) 1.2.2 through 1.2.3 allows access to sys_creat, sys_open, and sys_mknod inside jails, which could allow local users to gain elevated privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108861182906067&amp;w=2">20040630 rsbac 1.2.3 jail security problems</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108879977120430&amp;w=2">20040702 Announce: RSBAC v1.2.3 released</ref>
      <ref source="CONFIRM" url="http://www.rsbac.org/download/bugfixes/">http://www.rsbac.org/download/bugfixes/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10640" adv="1" patch="1">10640</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16552">rsbac-jail-gain-privileges(16552)</ref>
    </refs>
    <vuln_soft>
      <prod name="rsbac" vendor="rsbac">
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0668" seq="2004-0668" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Web Access in Lotus Domino 6.5.1 allows remote attackers to cause a denial of service (server crash) via a large e-mail message, as demonstrated using a large image attachment.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108871093704307&amp;w=2">20040630 DoS against Domino 6.5.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10641" adv="1">10641</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16596">lotus-domino-web-dos(16596)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0669" seq="2004-0669" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Lotus Domino 6.5.0 and 6.5.1, with IMAP enabled, allows remote authenticated users to change their quota by using the IMAP setquota command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108869022708571&amp;w=2">20040630 Unprevileged user can change quota on Domino</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10642" adv="1">10642</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16575">lotus-quota-change(16575)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_domino" vendor="ibm">
        <vers num="6.5.0"/>
        <vers num="6.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0670" seq="2004-0670" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Prestige 650HW-31 running Rompager 4.7 software allows remote attackers to cause a denial of service (device reboot) via a long password.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/023196.html">20040630 DSL router Prestige 650HW-31</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108862133005952&amp;w=2">20040630 DSL router Prestige 650HW-31</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10638" adv="1">10638</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16547">zyxel-long-password-dos(16547)</ref>
    </refs>
    <vuln_soft>
      <prod name="prestige" vendor="zyxel">
        <vers num="650hw_31"/>
        <vers num="650r_11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0671" seq="2004-0671" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Brightmail Spamfilter 6.0 and earlier beta releases allows remote attackers to read mail from other users by modifying the id parameter in a viewMsgDetails.do request.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108880205115802&amp;w=2">20040701 Brightmail leaks other user's spam</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108981452101353&amp;w=2">20040714 Ref: http://www.securityfocus.com/archive/1/367866, Jul 1 2004 1:19PM, Subj:  Brightmail</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10657" adv="1">10657</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16609">symantec-brightmail-view-mail(16609)</ref>
    </refs>
    <vuln_soft>
      <prod name="brightmail_antispam" vendor="symantec">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0672" seq="2004-0672" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the primary and management web interfaces in Netegrity IdentityMinder Web Edition 5.6 allows remote attackers to execute script as other users via (1) script that starts with %00 in the numOfExpressions parameter or (2) the mobjtype parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108881203114336&amp;w=2">20040701 [HW-MED] XSS in Netegrity IdentityMinder</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10645">10645</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16618">identityminder-xss(16618)</ref>
    </refs>
    <vuln_soft>
      <prod name="identityminder" vendor="netegrity">
        <vers num="web_5.6"/>
        <vers num="web_5.6_sp1"/>
        <vers num="web_5.6_sp2"/>
      </prod>
      <prod name="policy_server" vendor="netegrity">
        <vers num="5.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0673" seq="2004-0673" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in SCI Photo Chat Server 3.4.9 allows remote attackers to execute arbitrary web script as other users via an invalid request that is echoed in the resulting error message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108880460730833&amp;w=2">20040702 XSS in SCI Photo Chat Server 3.4.9</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10648">10648</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16602">sci-server-xss(16602)</ref>
    </refs>
    <vuln_soft>
      <prod name="sci_photo_chat" vendor="simm-comm">
        <vers num="3.4.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0674" seq="2004-0674" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Enterasys XSR-1800 series Security Routers, when running firmware 7.0.0.0 and using Policy-Based Routing, allow remote attackers to cause a denial of service (crash) via a packet with the IP record route option set.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108886995627906&amp;w=2">20040702 Enterasys XSR Security Routers DoS</ref>
      <ref source="CONFIRM" url="http://www.enterasys.com/support/security/incidents/2004/07/11036.html">http://www.enterasys.com/support/security/incidents/2004/07/11036.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10653" adv="1">10653</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16616">xsr-ip-record-dos(16616)</ref>
    </refs>
    <vuln_soft>
      <prod name="xsr-1805" vendor="enterasys">
        <vers num="7.0.0.0"/>
      </prod>
      <prod name="xsr-1850" vendor="enterasys">
        <vers num="7.0.0.0"/>
      </prod>
      <prod name="xsr-3000" vendor="enterasys">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0675" seq="2004-0675" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in (1) cart32.exe or (2) c32web.exe in Cart32 shopping cart allows remote attackers to execute arbitrary web script via the cart32 parameter to a GetLatestBuilds command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108887778628398&amp;w=2">20040703 Cart32 Input Validation Flaw in 'GetLatestBuilds?cart32=' Permits Remote Cross-Site Scripting Attacks</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10617">10617</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16535">cart32-getlatestbuilds-xss(16535)</ref>
    </refs>
    <vuln_soft>
      <prod name="cart32" vendor="mcmurtrey_whitaker_and_associates">
        <vers num="2.5a"/>
        <vers num="2.6"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.5"/>
        <vers num="3.5_build619"/>
        <vers num="3.5a"/>
        <vers num="3.5a_build710"/>
        <vers num="4.4"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0676" seq="2004-0676" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Fastream NETFile FTP/Web Server 6.7.2.1085 and earlier allows remote attackers to create or delete arbitrary files via .. (dot dot) and // (double slash) sequences in the filename parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108904874104880&amp;w=2">20040704 Fastream NETFile FTP/Web Server Input validation Errors</ref>
      <ref source="MISC" url="http://www.haxorcitos.com/Fastream_advisory.txt">http://www.haxorcitos.com/Fastream_advisory.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10658" adv="1" patch="1">10658</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16613">fastream-mkdir-file-upload(16613)</ref>
    </refs>
    <vuln_soft>
      <prod name="netfile_ftp_web_server" vendor="fastream">
        <vers num="6.5.1.980"/>
        <vers num="6.5.1.981"/>
        <vers num="6.7.2.1085"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0677" seq="2004-0677" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Fastream NETFile FTP Server 6.7.2.1085 and earlier allows remote attackers to cause a denial of service (temporary hang) via the cd command with an unusual argument, possibly due to multiple leading slashes and/or an access to the floppy drive ("A").</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108904874104880&amp;w=2">20040704 Fastream NETFile FTP/Web Server Input validation Errors</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16615">fastream-cd-dos(16615)</ref>
    </refs>
    <vuln_soft>
      <prod name="netfile_ftp_web_server" vendor="fastream">
        <vers num="6.7.2.1085" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0678" seq="2004-0678" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) in one2planet.infolet.InfoServlet in 12Planet Chat Server 2.9 allows remote attackers to execute arbitrary script as other users via the page parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108904648728706&amp;w=2">20040705 XSS in 12Planet Chat Server 2.9</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10659" adv="1">10659</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16605">12planet-chat-server-xss(16605)</ref>
    </refs>
    <vuln_soft>
      <prod name="chat_server" vendor="12planet">
        <vers num="2.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0679" seq="2004-0679" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The IP cloaking feature (cloak.c) in UnrealIRCd 3.2, and possibly other versions, uses a weak hashing scheme to hide IP addresses, which could allow remote attackers to use brute force methods to gain other user's IP addresses.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108904813003166&amp;w=2">20040705 unreal ircd ip cloaking subsystem vulnerability</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/560">560</ref>
      <ref source="MISC" url="http://www.bandecon.com/advisory/unreal.txt">http://www.bandecon.com/advisory/unreal.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10663" adv="1" patch="1">10663</ref>
      <ref source="CONFIRM" url="http://www.unrealircd.com/">http://www.unrealircd.com/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16610">unreal-ircd-information-disclosure(16610)</ref>
    </refs>
    <vuln_soft>
      <prod name="unrealircd" vendor="unreal">
        <vers num="3.1.1"/>
        <vers num="3.1.3"/>
        <vers num="3.2"/>
        <vers num="3.2_.0_beta_10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0680" seq="2004-0680" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Zoom X3 ADSL modem has a terminal running on port 254 that can be accessed using the default HTML management password, even if the password has been changed for the HTTP interface, which could allow remote attackers to gain unauthorized access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108915255520924&amp;w=2">20040706 backdoor menu on conexant chipset dsl router (Zoom X3)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10669" adv="1">10669</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16639">conexant-chipset-settings-restore(16639)</ref>
    </refs>
    <vuln_soft>
      <prod name="model_5560_x3_ethernet_adsl_modem" vendor="zoom">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0681" seq="2004-0681" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in (1) comersus_customerAuthenticateForm.asp, (2) comersus_backoffice_message.asp, (3) comersus_supportError.asp, or (4) comersus_message.asp in Comersus Cart 5.09 allow remote attackers to execute web script as other users via the message parameter.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product update:
Comersus Open Technologies, Comersus Cart, 5.098</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108922169327403&amp;w=2">20040707 Comersus Cart Cross-Site Scripting Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10674" patch="1">10674</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16646">comersus-cart-xss(16646)</ref>
    </refs>
    <vuln_soft>
      <prod name="comersus_cart" vendor="comersus_open_technologies">
        <vers num="5.09"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0682" seq="2004-0682" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">comersus_gatewayPayPal.asp in Comersus Cart 5.09, and possibly other versions before 5.098, allows remote attackers to change the prices of items by directly modifying them in the URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108922336529987&amp;w=2">20040707 Comersus Cart Improper Request Handling</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10674" adv="1">10674</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16645">comersus-cart-price-modification(16645)</ref>
    </refs>
    <vuln_soft>
      <prod name="comersus_cart" vendor="comersus_open_technologies">
        <vers num="5.0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0683" seq="2004-0683" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Symantec Norton AntiVirus 2002 and 2003 allows remote attackers to cause a denial of service (CPU consumption) via a compressed archive that contains a large number of directories.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108938579712894&amp;w=2">20040709 Norton AntiVirus Denial Of Service Vulnerability [Part: !!!]</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16658">nav-compressed-dos(16658)</ref>
    </refs>
    <vuln_soft>
      <prod name="norton_antivirus" vendor="symantec">
        <vers num="2002"/>
        <vers num="2003" edition=":pro"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0684" seq="2004-0684" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">WebSphere Edge Component Caching Proxy in WebSphere Edge Server 5.02, with the JunctionRewrite directive enabled, allows remote attackers to cause a denial of service via an HTTP GET request without any parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108938997528245&amp;w=2">20040708 CYBSEC - Security Advisory: Denial of Service in IBM WebSphere</ref>
      <ref source="MISC" url="http://www.cybsec.com/vuln/IBM-WebSphere-Edge-Server-DOS.pdf">http://www.cybsec.com/vuln/IBM-WebSphere-Edge-Server-DOS.pdf</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16607">ibm-edge-caching-dos(16607)</ref>
    </refs>
    <vuln_soft>
      <prod name="websphere_caching_proxy_server" vendor="ibm">
        <vers num="5.0.2"/>
      </prod>
      <prod name="websphere_edge_server_caching_proxy" vendor="ibm">
        <vers num="5.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0685" seq="2004-0685" published="2004-12-23" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127921">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127921</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml" adv="1" patch="1">GLSA-200408-24</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/981134" adv="1">VU#981134</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-504.html">RHSA-2004:504</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-505.html">RHSA-2004:505</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10892" adv="1" patch="1">10892</ref>
      <ref source="MISC" url="http://www.securityspace.com/smysecure/catid.html?id=14580">http://www.securityspace.com/smysecure/catid.html?id=14580</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0041/">2004-0041</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16931">linux-usb-gain-privileges(16931)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10665">oval:org.mitre.oval:def:10665</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
        <vers num="2.2.9"/>
        <vers num="2.2.10"/>
        <vers num="2.2.11"/>
        <vers num="2.2.12"/>
        <vers num="2.2.13"/>
        <vers num="2.2.14"/>
        <vers num="2.2.15" edition="pre16"/>
        <vers num="2.2.15_pre20"/>
        <vers num="2.2.16" edition="pre6"/>
        <vers num="2.2.17"/>
        <vers num="2.2.18"/>
        <vers num="2.2.19"/>
        <vers num="2.2.20"/>
        <vers num="2.2.21"/>
        <vers num="2.2.22"/>
        <vers num="2.2.23"/>
        <vers num="2.2.24"/>
        <vers num="2.2.25"/>
        <vers num="2.3.0"/>
        <vers num="2.3.99" edition="pre1"/>
        <vers num="2.3.99" edition="pre2"/>
        <vers num="2.3.99" edition="pre3"/>
        <vers num="2.3.99" edition="pre4"/>
        <vers num="2.3.99" edition="pre5"/>
        <vers num="2.3.99" edition="pre6"/>
        <vers num="2.3.99" edition="pre7"/>
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.6"/>
        <vers num="2.5.7"/>
        <vers num="2.5.8"/>
        <vers num="2.5.9"/>
        <vers num="2.5.10"/>
        <vers num="2.5.11"/>
        <vers num="2.5.12"/>
        <vers num="2.5.13"/>
        <vers num="2.5.14"/>
        <vers num="2.5.15"/>
        <vers num="2.5.16"/>
        <vers num="2.5.17"/>
        <vers num="2.5.18"/>
        <vers num="2.5.19"/>
        <vers num="2.5.20"/>
        <vers num="2.5.21"/>
        <vers num="2.5.22"/>
        <vers num="2.5.23"/>
        <vers num="2.5.24"/>
        <vers num="2.5.25"/>
        <vers num="2.5.26"/>
        <vers num="2.5.27"/>
        <vers num="2.5.28"/>
        <vers num="2.5.29"/>
        <vers num="2.5.30"/>
        <vers num="2.5.31"/>
        <vers num="2.5.32"/>
        <vers num="2.5.33"/>
        <vers num="2.5.34"/>
        <vers num="2.5.35"/>
        <vers num="2.5.36"/>
        <vers num="2.5.37"/>
        <vers num="2.5.38"/>
        <vers num="2.5.39"/>
        <vers num="2.5.40"/>
        <vers num="2.5.41"/>
        <vers num="2.5.42"/>
        <vers num="2.5.43"/>
        <vers num="2.5.44"/>
        <vers num="2.5.45"/>
        <vers num="2.5.46"/>
        <vers num="2.5.47"/>
        <vers num="2.5.48"/>
        <vers num="2.5.49"/>
        <vers num="2.5.50"/>
        <vers num="2.5.51"/>
        <vers num="2.5.52"/>
        <vers num="2.5.53"/>
        <vers num="2.5.54"/>
        <vers num="2.5.55"/>
        <vers num="2.5.56"/>
        <vers num="2.5.57"/>
        <vers num="2.5.58"/>
        <vers num="2.5.59"/>
        <vers num="2.5.60"/>
        <vers num="2.5.61"/>
        <vers num="2.5.62"/>
        <vers num="2.5.63"/>
        <vers num="2.5.64"/>
        <vers num="2.5.65"/>
        <vers num="2.5.66"/>
        <vers num="2.5.67"/>
        <vers num="2.5.68"/>
        <vers num="2.5.69"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0686" seq="2004-0686" published="2004-07-27" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000851">CLA-2004:851</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000854">CLA-2004:854</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109051340810458&amp;w=2">20040722 Security Release - Samba 3.0.5 and 2.2.10</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109051533021376&amp;w=2">20040722 [OpenPKG-SA-2004.033] OpenPKG Security Advisory (samba)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109052891507263&amp;w=2">20040722 TSSA-2004-014 - samba</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109094272328981&amp;w=2">SSRT4782</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109785827607823&amp;w=2">FLSA:2102</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1">101584</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1">57664</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-21.xml">GLSA-200407-21</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:071">MDKSA-2004:071</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_22_samba.html">SUSE-SA:2004:022</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-259.html" adv="1" patch="1">RHSA-2004:259</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0039/">2004-0039</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16786">samba-mangling-method-bo(16786)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10461">oval:org.mitre.oval:def:10461</ref>
    </refs>
    <vuln_soft>
      <prod name="samba" vendor="samba">
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.2a"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0687" seq="2004-0687" published="2004-10-20" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in (1) xpmParseColors in parse.c, (2) ParseAndPutPixels in create.c, and (3) ParsePixels in parse.c for libXpm before 6.8.1 allow remote attackers to execute arbitrary code via a malformed XPM image file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000924">CLA-2005:924</ref>
      <ref source="CONFIRM" url="http://ftp.x.org/pub/X11R6.8.0/patches/README.xorg-CAN-2004-0687-0688.patch">http://ftp.x.org/pub/X11R6.8.0/patches/README.xorg-CAN-2004-0687-0688.patch</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/May/msg00001.html">APPLE-SA-2005-05-03</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109530851323415&amp;w=2">20040915 CESA-2004-004: libXpm</ref>
      <ref source="MISC" url="http://scary.beasts.org/security/CESA-2004-003.txt">http://scary.beasts.org/security/CESA-2004-003.txt</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57653-1">57653</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-560">DSA-560</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-34.xml">GLSA-200409-34</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-07.xml">GLSA-200502-07</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/882750">VU#882750</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:098">MDKSA-2004:098</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_34_xfree86_libs_xshared.html">SUSE-SA:2004:034</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html">FLSA-2006:152803</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-537.html">RHSA-2004:537</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-004.html">RHSA-2005:004</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/434715/100/0/threaded">HPSBUX02119</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11196" adv="1" patch="1">11196</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA05-136A.html">TA05-136A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/1914">ADV-2006-1914</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17414">libxpm-multiple-stack-bo(17414)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9187">oval:org.mitre.oval:def:9187</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/27-1/">USN-27-1</ref>
    </refs>
    <vuln_soft>
      <prod name="x11r6" vendor="x.org">
        <vers num="6.7.0"/>
        <vers num="6.8"/>
      </prod>
      <prod name="x11r6" vendor="xfree86_project">
        <vers num="3.3.6"/>
        <vers num="4.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2.11"/>
        <vers num="4.0.3"/>
        <vers num="4.1.0"/>
        <vers num="4.1.11"/>
        <vers num="4.1.12"/>
        <vers num="4.2.0"/>
        <vers num="4.2.1" edition=":errata"/>
        <vers num="4.3.0"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4"/>
        <vers num="3.5"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0688" seq="2004-0688" published="2004-10-20" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm before 6.8.1 may allow remote attackers to execute arbitrary code via a malformed XPM image file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000924">CLA-2005:924</ref>
      <ref source="CONFIRM" url="http://ftp.x.org/pub/X11R6.8.0/patches/README.xorg-CAN-2004-0687-0688.patch">http://ftp.x.org/pub/X11R6.8.0/patches/README.xorg-CAN-2004-0687-0688.patch</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/May/msg00001.html">APPLE-SA-2005-05-03</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109530851323415&amp;w=2">20040915 CESA-2004-004: libXpm</ref>
      <ref source="MISC" url="http://scary.beasts.org/security/CESA-2004-003.txt">http://scary.beasts.org/security/CESA-2004-003.txt</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57653-1">57653</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-560">DSA-560</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-34.xml">GLSA-200409-34</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-07.xml">GLSA-200502-07</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/537878">VU#537878</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:098">MDKSA-2004:098</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_34_xfree86_libs_xshared.html">SUSE-SA:2004:034</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html">FLSA-2006:152803</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-537.html">RHSA-2004:537</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-004.html">RHSA-2005:004</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/434715/100/0/threaded">HPSBUX02119</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11196" adv="1" patch="1">11196</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA05-136A.html">TA05-136A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/1914">ADV-2006-1914</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17416">libxpm-xpmfile-integer-overflow(17416)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11796">oval:org.mitre.oval:def:11796</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/27-1/">USN-27-1</ref>
    </refs>
    <vuln_soft>
      <prod name="x11r6" vendor="x.org">
        <vers num="6.7.0"/>
        <vers num="6.8"/>
      </prod>
      <prod name="x11r6" vendor="xfree86_project">
        <vers num="3.3.6"/>
        <vers num="4.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2.11"/>
        <vers num="4.0.3"/>
        <vers num="4.1.0"/>
        <vers num="4.1.11"/>
        <vers num="4.1.12"/>
        <vers num="4.2.0"/>
        <vers num="4.2.1" edition=":errata"/>
        <vers num="4.3.0"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4"/>
        <vers num="3.5"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0689" seq="2004-0689" published="2004-09-28" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">KDE before 3.3.0 does not properly handle when certain symbolic links point to "stale" locations, which could allow local users to create or truncate arbitrary files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000864">CLA-2004:864</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109225538901170&amp;w=2">20040811 KDE Security Advisories: Temporary File and Konqueror Frame Injection Vulnerabilities</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-13.xml" adv="1" patch="1">200408-13</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-539" adv="1" patch="1">DSA-539</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20040811-1.txt" adv="1" patch="1">http://www.kde.org/info/security/advisory-20040811-1.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16963">kde-application-symlink(16963)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9334">oval:org.mitre.oval:def:9334</ref>
    </refs>
    <vuln_soft>
      <prod name="kde" vendor="kde">
        <vers num="3.3.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0690" seq="2004-0690" published="2004-09-28" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The DCOPServer in KDE 3.2.3 and earlier allows local users to gain unauthorized access via a symlink attack on DCOP files in the /tmp directory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261386" adv="1" patch="1">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261386</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000864">CLA-2004:864</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109225538901170&amp;w=2">20040811 KDE Security Advisories: Temporary File and Konqueror Frame Injection Vulnerabilities</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-13.xml">200408-13</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/330638">VU#330638</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20040811-2.txt" adv="1" patch="1">http://www.kde.org/info/security/advisory-20040811-2.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:086">MDKSA-2004:086</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10924">10924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16962">kde-dcopserver-symlink(16962)</ref>
    </refs>
    <vuln_soft>
      <prod name="kde" vendor="kde">
        <vers num="3.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0691" seq="2004-0691" published="2004-09-28" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the BMP image format parser for the QT library (qt3) before 3.3.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109295309008309&amp;w=2">20040818 CESA-2004-004: qt</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-20.xml" adv="1" patch="1">GLSA-200408-20</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201610-1">201610</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-542">DSA-542</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:085">MDKSA-2004:085</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_27_qt3.html">SUSE-SA:2004:027</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-414.html" adv="1" patch="1">RHSA-2004:414</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17040">qt-bmp-bo(17040)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9485">oval:org.mitre.oval:def:9485</ref>
    </refs>
    <vuln_soft>
      <prod name="qt" vendor="trolltech">
        <vers num="3.3.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0692" seq="2004-0692" published="2004-09-28" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The XPM parser in the QT library (qt3) before 3.3.3 allows remote attackers to cause a denial of service (application crash) via a malformed image file that triggers a null dereference, a different vulnerability than CVE-2004-0693.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=110979666528890&amp;w=2">FLSA:2314</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-20.xml" adv="1" patch="1">GLSA-200408-20</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201610-1">201610</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-542">DSA-542</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:085">MDKSA-2004:085</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_27_qt3.html">SUSE-SA:2004:027</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-414.html">RHSA-2004:414</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17041">qt-xpm-dos(17041)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10327">oval:org.mitre.oval:def:10327</ref>
    </refs>
    <vuln_soft>
      <prod name="qt" vendor="trolltech">
        <vers num="3.3.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0693" seq="2004-0693" published="2004-09-28" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The GIF parser in the QT library (qt3) before 3.3.3 allows remote attackers to cause a denial of service (application crash) via a malformed image file that triggers a null dereference, a different vulnerability than CVE-2004-0692.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-20.xml" adv="1" patch="1">GLSA-200408-20</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201610-1">201610</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-542">DSA-542</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:085">MDKSA-2004:085</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_27_qt3.html">SUSE-SA:2004:027</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-414.html">RHSA-2004:414</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17042">qt-gif-dos(17042)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10883">oval:org.mitre.oval:def:10883</ref>
    </refs>
    <vuln_soft>
      <prod name="qt" vendor="trolltech">
        <vers num="3.3.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0694" seq="2004-0694" published="2011-02-03" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in LHA 1.14 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to "command line processing," a different vulnerability than CVE-2004-0771.  NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-323.html">RHSA-2004:323</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-440.html">RHSA-2004:440</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9981">oval:org.mitre.oval:def:9981</ref>
    </refs>
    <vuln_soft>
      <prod name="lha" vendor="tsugio_okamoto">
        <vers num="1.14" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0695" seq="2004-0695" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the FTP service for 4D WebSTAR 5.3.2 and earlier allows remote attackers to execute arbitrary code via a long FTP command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt">ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt</ref>
      <ref source="ATSTAKE" url="http://www.atstake.com/research/advisories/2004/a071304-1.txt" adv="1">A071304-1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16686">4dwebstar-long-ftp-bo(16686)</ref>
    </refs>
    <vuln_soft>
      <prod name="webstar" vendor="4d">
        <vers num="4.0"/>
        <vers num="5.2"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
        <vers num="5.3"/>
        <vers num="5.3.1"/>
        <vers num="5.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0696" seq="2004-0696" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The ShellExample.cgi script in 4D WebSTAR 5.3.2 and earlier allows remote attackers to list arbitrary directories via a URL with the desired path and a "*" (asterisk) character.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt">ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt</ref>
      <ref source="ATSTAKE" url="http://www.atstake.com/research/advisories/2004/a071304-1.txt" adv="1">A071304-1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10721">10721</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16687">4dwebstar-view-directory-listing(16687)</ref>
    </refs>
    <vuln_soft>
      <prod name="webstar" vendor="4d">
        <vers num="4.0"/>
        <vers num="5.2"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
        <vers num="5.3"/>
        <vers num="5.3.1"/>
        <vers num="5.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0697" seq="2004-0697" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in 4D WebSTAR 5.3.2 and earlier allows remote attackers to read the php.ini configuration file and possibly obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt">ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt</ref>
      <ref source="ATSTAKE" url="http://www.atstake.com/research/advisories/2004/a071304-1.txt" adv="1">A071304-1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16688">4dwebstar-view-phpini-files(16688)</ref>
    </refs>
    <vuln_soft>
      <prod name="webstar" vendor="4d">
        <vers num="4.0"/>
        <vers num="5.2"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
        <vers num="5.3"/>
        <vers num="5.3.1"/>
        <vers num="5.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0698" seq="2004-0698" published="2004-07-27" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">4D WebSTAR 5.3.2 and earlier allows local users to read and modify arbitrary files via a symlink attack.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt">ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt</ref>
      <ref source="ATSTAKE" url="http://www.atstake.com/research/advisories/2004/a071304-1.txt" adv="1">A071304-1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16689">4dwebstar-symlink(16689)</ref>
    </refs>
    <vuln_soft>
      <prod name="webstar" vendor="4d">
        <vers num="4.0"/>
        <vers num="5.2"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.2.3"/>
        <vers num="5.2.4"/>
        <vers num="5.3"/>
        <vers num="5.3.1"/>
        <vers num="5.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0699" seq="2004-0699" published="2004-09-28" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in ASN.1 decoding library in Check Point VPN-1 products, when Aggressive Mode IKE is implemented, allows remote attackers to execute arbitrary code by initiating an IKE negotiation and then sending an IKE packet with malformed ASN.1 data.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Jul/1010799.html">1010799</ref>
      <ref source="CONFIRM" url="http://www.checkpoint.com/techsupport/alerts/asn1.html" adv="1" patch="1">http://www.checkpoint.com/techsupport/alerts/asn1.html</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-190.shtml">O-190</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/435358">VU#435358</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10820">10820</ref>
      <ref source="ISS" url="http://xforce.iss.net/xforce/alerts/id/178" adv="1" patch="1">20040728 Check Point VPN-1 ASN.1 Decoding Remote Compromise</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16824">vpn1-asn1-decoding-bo(16824)</ref>
    </refs>
    <vuln_soft>
      <prod name="firewall-1" vendor="checkpoint">
        <vers num="4.1" edition="sp6"/>
      </prod>
      <prod name="vpn-1" vendor="checkpoint">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0700" seq="2004-0700" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000857">CLA-2004:857</ref>
      <ref source="MLIST" url="http://marc.info/?l=apache-modssl&amp;m=109001100906749&amp;w=2">[apache-modssl] 20040716  [ANNOUNCE] mod_ssl 2.8.19 for Apache 1.3.31</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109005001205991&amp;w=2">20040716 [OpenPKG-SA-2004.032] OpenPKG Security Advisory (apache)</ref>
      <ref source="MISC" url="http://packetstormsecurity.org/0407-advisories/modsslFormat.txt">http://packetstormsecurity.org/0407-advisories/modsslFormat.txt</ref>
      <ref source="MISC" url="http://virulent.siyahsapka.org/">http://virulent.siyahsapka.org/</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-532">DSA-532</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/303448" adv="1">VU#303448</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:075">MDKSA-2004:075</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-405.html">RHSA-2004:405</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-408.html">RHSA-2004:408</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10736">10736</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-177-1">USN-177-1</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1888">FLSA:1888</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16705">apache-modssl-format-string(16705)</ref>
    </refs>
    <vuln_soft>
      <prod name="mod_ssl" vendor="mod_ssl">
        <vers num="2.3.11"/>
        <vers num="2.4.0"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.6.0"/>
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6"/>
        <vers num="2.7.0"/>
        <vers num="2.7.1"/>
        <vers num="2.8.0"/>
        <vers num="2.8.1"/>
        <vers num="2.8.1.2"/>
        <vers num="2.8.2"/>
        <vers num="2.8.3"/>
        <vers num="2.8.4"/>
        <vers num="2.8.5"/>
        <vers num="2.8.5.1"/>
        <vers num="2.8.5.2"/>
        <vers num="2.8.6"/>
        <vers num="2.8.7"/>
        <vers num="2.8.8"/>
        <vers num="2.8.9"/>
        <vers num="2.8.10"/>
        <vers num="2.8.12"/>
        <vers num="2.8.14"/>
        <vers num="2.8.15"/>
        <vers num="2.8.16"/>
        <vers num="2.8.17"/>
        <vers num="2.8.18"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0701" seq="2004-0701" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Sun Ray Server Software (SRSS) 1.3 and 2.0 for Solaris 2.6, 7 and 8 does not properly detect a smartcard removal when the card is quickly removed, reinserted, and removed again, which could cause a user session to stay logged in and allow local users to gain unauthorized access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F53922">53922</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/100780">VU#100780</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/7457" adv="1" patch="1">7457</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/11905">sun-ray-session-access(11905)</ref>
    </refs>
    <vuln_soft>
      <prod name="ray_server_software" vendor="sun">
        <vers num="1.3"/>
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0702" seq="2004-0702" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">DBI in Bugzilla 2.17.1 through 2.17.7 displays the database password in an error message when the SQL server is not running, which could allow remote attackers to gain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108965446813639&amp;w=2">20040710 [BUGZILLA] Multiple vulnerabilities in Bugzilla 2.16.5 and 2.17.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10698" adv="1" patch="1">10698</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16673">bugzilla-database-password-disclosure(16673)</ref>
    </refs>
    <vuln_soft>
      <prod name="bugzilla" vendor="mozilla">
        <vers num="2.4"/>
        <vers num="2.6"/>
        <vers num="2.8"/>
        <vers num="2.10"/>
        <vers num="2.12"/>
        <vers num="2.14"/>
        <vers num="2.14.1"/>
        <vers num="2.14.2"/>
        <vers num="2.14.3"/>
        <vers num="2.14.4"/>
        <vers num="2.14.5"/>
        <vers num="2.16"/>
        <vers num="2.16.1"/>
        <vers num="2.16.2"/>
        <vers num="2.16.3"/>
        <vers num="2.16.4"/>
        <vers num="2.16.5"/>
        <vers num="2.17"/>
        <vers num="2.17.1"/>
        <vers num="2.17.3"/>
        <vers num="2.17.4"/>
        <vers num="2.17.5"/>
        <vers num="2.17.6"/>
        <vers num="2.17.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0703" seq="2004-0703" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the administrative controls in Bugzilla 2.17.1 through 2.17.7 allows users with "grant membership" privileges to grant memberships to groups that the user does not control.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108965446813639&amp;w=2">20040710 [BUGZILLA] Multiple vulnerabilities in Bugzilla 2.16.5 and 2.17.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10698" adv="1" patch="1">10698</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16672">bugzilla-editusers-gain-privileges(16672)</ref>
    </refs>
    <vuln_soft>
      <prod name="bugzilla" vendor="mozilla">
        <vers num="2.4"/>
        <vers num="2.6"/>
        <vers num="2.8"/>
        <vers num="2.10"/>
        <vers num="2.12"/>
        <vers num="2.14"/>
        <vers num="2.14.1"/>
        <vers num="2.14.2"/>
        <vers num="2.14.3"/>
        <vers num="2.14.4"/>
        <vers num="2.14.5"/>
        <vers num="2.16"/>
        <vers num="2.16.1"/>
        <vers num="2.16.2"/>
        <vers num="2.16.3"/>
        <vers num="2.16.4"/>
        <vers num="2.16.5"/>
        <vers num="2.17"/>
        <vers num="2.17.1"/>
        <vers num="2.17.3"/>
        <vers num="2.17.4"/>
        <vers num="2.17.5"/>
        <vers num="2.17.6"/>
        <vers num="2.17.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0704" seq="2004-0704" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in (1) duplicates.cgi and (2) buglist.cgi in Bugzilla 2.16.x before 2.16.6, 2.18 before 2.18rc1, when configured to hide products, allows remote attackers to view hidden products.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108965446813639&amp;w=2">20040710 [BUGZILLA] Multiple vulnerabilities in Bugzilla 2.16.5 and 2.17.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10698" adv="1" patch="1">10698</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16671">bugzilla-product-name-disclosure(16671)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0705" seq="2004-0705" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in (1) editcomponents.cgi, (2) editgroups.cgi, (3) editmilestones.cgi, (4) editproducts.cgi, (5) editusers.cgi, and (6) editversions.cgi in Bugzilla 2.16.x before 2.16.6, and 2.18 before 2.18rc1, allow remote attackers to execute arbitrary JavaScript as other users via a URL parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=235265">http://bugzilla.mozilla.org/show_bug.cgi?id=235265</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108965446813639&amp;w=2">20040710 [BUGZILLA] Multiple vulnerabilities in Bugzilla 2.16.5 and 2.17.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10698" adv="1" patch="1">10698</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16670">bugzilla-edit-xss(16670)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0706" seq="2004-0706" published="2004-07-27" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Bugzilla 2.17.5 through 2.17.7 embeds the password in an image URL, which could allow local users to view the password in the web server log files.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=235510">http://bugzilla.mozilla.org/show_bug.cgi?id=235510</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108965446813639&amp;w=2">20040710 [BUGZILLA] Multiple vulnerabilities in Bugzilla 2.16.5 and 2.17.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10698" adv="1" patch="1">10698</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16669">bugzilla-chart-view-password(16669)</ref>
    </refs>
    <vuln_soft>
      <prod name="bugzilla" vendor="mozilla">
        <vers num="2.4"/>
        <vers num="2.6"/>
        <vers num="2.8"/>
        <vers num="2.10"/>
        <vers num="2.12"/>
        <vers num="2.14"/>
        <vers num="2.14.1"/>
        <vers num="2.14.2"/>
        <vers num="2.14.3"/>
        <vers num="2.14.4"/>
        <vers num="2.14.5"/>
        <vers num="2.16"/>
        <vers num="2.16.1"/>
        <vers num="2.16.2"/>
        <vers num="2.16.3"/>
        <vers num="2.16.4"/>
        <vers num="2.16.5"/>
        <vers num="2.17"/>
        <vers num="2.17.1"/>
        <vers num="2.17.3"/>
        <vers num="2.17.4"/>
        <vers num="2.17.5"/>
        <vers num="2.17.6"/>
        <vers num="2.17.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0707" seq="2004-0707" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in editusers.cgi in Bugzilla 2.16.x before 2.16.6, and 2.18 before 2.18rc1, allows remote attackers with privileges to grant membership to any group to execute arbitrary SQL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=244272">http://bugzilla.mozilla.org/show_bug.cgi?id=244272</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108965446813639&amp;w=2">20040710 [BUGZILLA] Multiple vulnerabilities in Bugzilla 2.16.5 and 2.17.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10698" adv="1" patch="1">10698</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16668">bugzilla-editusers-sql-injection(16668)</ref>
    </refs>
    <vuln_soft>
      <prod name="bugzilla" vendor="mozilla">
        <vers num="2.4"/>
        <vers num="2.6"/>
        <vers num="2.8"/>
        <vers num="2.10"/>
        <vers num="2.12"/>
        <vers num="2.14"/>
        <vers num="2.14.1"/>
        <vers num="2.14.2"/>
        <vers num="2.14.3"/>
        <vers num="2.14.4"/>
        <vers num="2.14.5"/>
        <vers num="2.16"/>
        <vers num="2.16.1"/>
        <vers num="2.16.2"/>
        <vers num="2.16.3"/>
        <vers num="2.16.4"/>
        <vers num="2.16.5"/>
        <vers num="2.17"/>
        <vers num="2.17.1"/>
        <vers num="2.17.3"/>
        <vers num="2.17.4"/>
        <vers num="2.17.5"/>
        <vers num="2.17.6"/>
        <vers num="2.17.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0708" seq="2004-0708" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">MoinMoin 1.2.1 and earlier allows remote attackers to gain privileges by creating a user with the same name as an existing group that has higher privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=948103&amp;group_id=8482&amp;atid=108482">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=948103&amp;group_id=8482&amp;atid=108482</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-09.xml" adv="1" patch="1">GLSA-200407-09</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10568" adv="1" patch="1">10568</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16465">moinmoin-gain-admin-access(16465)</ref>
    </refs>
    <vuln_soft>
      <prod name="moinmoin" vendor="moinmoin">
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0709" seq="2004-0709" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">HP OpenView Select Access 5.0 through 6.0 does not correctly decode UTF-8 encoded unicode characters in a URL, which could allow remote attackers to bypass access restrictions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/205766" adv="1" patch="1">VU#205766</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/6774">SSRT4719</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10414" adv="1" patch="1">10414</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16247">openview-select-gain-access(16247)</ref>
    </refs>
    <vuln_soft>
      <prod name="openview_select_access" vendor="hp">
        <vers num="5.0" edition="patch_4"/>
        <vers num="5.1" edition="patch_1"/>
        <vers num="5.2"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0710" seq="2004-0710" published="2004-07-27" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">IP Security VPN Services Module (VPNSM) in Cisco Catalyst 6500 Series Switch and the Cisco 7600 Series Internet Routers running IOS before 12.2(17b)SXA, before 12.2(17d)SXB, or before 12.2(14)SY03 could allow remote attackers to cause a denial of service (device crash and reload) via a malformed Internet Key Exchange (IKE) packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040408-vpnsm.shtml" adv="1" patch="1">20040408 Cisco IPSec VPN Services Module Malformed IKE Packet Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/904310" adv="1">VU#904310</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10083" adv="1">10083</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15797">cisco-vpnsm-ike-dos(15797)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5696">oval:org.mitre.oval:def:5696</ref>
    </refs>
    <vuln_soft>
      <prod name="ios" vendor="cisco">
        <vers num="12.2(14)sy"/>
        <vers num="12.2(14)za"/>
        <vers num="12.2(14)za2"/>
        <vers num="12.2(17a)sxa"/>
        <vers num="12.2sxa"/>
        <vers num="12.2sxb"/>
        <vers num="12.2sy"/>
        <vers num="12.2za"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0711" seq="2004-0711" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The URL pattern matching feature in BEA WebLogic Server 6.x matches illegal patterns ending in "*" as wildcards as if they were the legal "/*" pattern, which could cause WebLogic 7.x to allow remote attackers to bypass intended access restrictions because the illegal patterns are properly rejected.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_56.00.jsp">http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_56.00.jsp</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/184558" adv="1">VU#184558</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10184" adv="1" patch="1">10184</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15927">weblogic-urlpattern-obtain-information(15927)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="7.0" edition=":express"/>
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0" edition="sp1:express"/>
        <vers num="7.0" edition="sp1:win32"/>
        <vers num="7.0" edition="sp2:express"/>
        <vers num="7.0" edition="sp2:win32"/>
        <vers num="7.0" edition="sp3:express"/>
        <vers num="7.0" edition="sp3:win32"/>
        <vers num="7.0" edition="sp4:express"/>
        <vers num="7.0" edition="sp4:win32"/>
        <vers num="8.1" edition=":express"/>
        <vers num="8.1" edition=":win32"/>
        <vers num="8.1" edition="sp1:express"/>
        <vers num="8.1" edition="sp1:win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0712" seq="2004-0712" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The configuration tools (1) config.sh in Unix or (2) config.cmd in Windows for BEA WebLogic Server 8.1 through SP2 create a log file that contains the administrative username and password in cleartext, which could allow local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_58.00.jsp">http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_58.00.jsp</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/574222" adv="1" patch="1">VU#574222</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10188" adv="1" patch="1">10188</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15926">weblogic-admin-password-plaintext(15926)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="8.1" edition=":express"/>
        <vers num="8.1" edition=":win32"/>
        <vers num="8.1" edition="sp1:express"/>
        <vers num="8.1" edition="sp1:win32"/>
        <vers num="8.1" edition="sp2:express"/>
        <vers num="8.1" edition="sp2:win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0713" seq="2004-0713" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">The remove method in a stateful Enterprise JavaBean (EJB) in BEA WebLogic Server and WebLogic Express version 8.1 through SP2, 7.0 through SP4, and 6.1 through SP6, does not properly check EJB permissions before unexporting a bean, which allows remote authenticated users to remove EJB objects from remote views before the security exception is thrown.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_57.00.jsp">http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_57.00.jsp</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/658878" adv="1">VU#658878</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10185" adv="1" patch="1">10185</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15928">weblogic-ejb-object-deletion(15928)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="6.1" edition=":express"/>
        <vers num="6.1" edition=":win32"/>
        <vers num="6.1" edition="sp1:express"/>
        <vers num="6.1" edition="sp1:win32"/>
        <vers num="6.1" edition="sp2:express"/>
        <vers num="6.1" edition="sp2:win32"/>
        <vers num="6.1" edition="sp3:express"/>
        <vers num="6.1" edition="sp3:win32"/>
        <vers num="6.1" edition="sp4:express"/>
        <vers num="6.1" edition="sp4:win32"/>
        <vers num="6.1" edition="sp5:express"/>
        <vers num="6.1" edition="sp5:win32"/>
        <vers num="6.1" edition="sp6:win32"/>
        <vers num="7.0" edition=":express"/>
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0" edition="sp1:express"/>
        <vers num="7.0" edition="sp1:win32"/>
        <vers num="7.0" edition="sp2:express"/>
        <vers num="7.0" edition="sp2:win32"/>
        <vers num="7.0" edition="sp3:express"/>
        <vers num="7.0" edition="sp3:win32"/>
        <vers num="7.0" edition="sp4:express"/>
        <vers num="7.0" edition="sp4:win32"/>
        <vers num="8.1" edition=":express"/>
        <vers num="8.1" edition=":win32"/>
        <vers num="8.1" edition="sp1:express"/>
        <vers num="8.1" edition="sp1:win32"/>
        <vers num="8.1" edition="sp2:express"/>
        <vers num="8.1" edition="sp2:win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0714" seq="2004-0714" published="2004-07-27" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml" adv="1" patch="1">20040420 Vulnerabilities in SNMP Message Processing</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/162451" adv="1" patch="1">VU#162451</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10186" adv="1" patch="1">10186</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-111B.html" adv="1">TA04-111B</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15921">cisco-ios-snmp-udp-dos(15921)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5845">oval:org.mitre.oval:def:5845</ref>
    </refs>
    <vuln_soft>
      <prod name="optical_networking_systems_software" vendor="cisco">
        <vers num="3.0"/>
        <vers num="3.1.0"/>
        <vers num="3.2.0"/>
        <vers num="3.3.0"/>
        <vers num="3.4.0"/>
        <vers num="4.0(1)"/>
        <vers num="4.0(2)"/>
        <vers num="4.0.0"/>
        <vers num="4.1(0)"/>
        <vers num="4.1(1)"/>
        <vers num="4.1(2)"/>
        <vers num="4.1(3)"/>
        <vers num="4.1.0"/>
      </prod>
      <prod name="ios" vendor="cisco">
        <vers num="12.0(23)s4"/>
        <vers num="12.0(23)s5"/>
        <vers num="12.0(24)s4"/>
        <vers num="12.0(24)s5"/>
        <vers num="12.0(26)s1"/>
        <vers num="12.0(27)s"/>
        <vers num="12.0(27)sv"/>
        <vers num="12.0(27)sv1"/>
        <vers num="12.0s"/>
        <vers num="12.0sv"/>
        <vers num="12.1(20)e"/>
        <vers num="12.1(20)e1"/>
        <vers num="12.1(20)e2"/>
        <vers num="12.1(20)ea1"/>
        <vers num="12.1(20)ec"/>
        <vers num="12.1(20)ec1"/>
        <vers num="12.1(20)eo"/>
        <vers num="12.1(20)ew"/>
        <vers num="12.1(20)ew1"/>
        <vers num="12.1e"/>
        <vers num="12.1ea"/>
        <vers num="12.1eb"/>
        <vers num="12.1ec"/>
        <vers num="12.1eo"/>
        <vers num="12.1eu"/>
        <vers num="12.1ew"/>
        <vers num="12.2"/>
        <vers num="12.2(12g)"/>
        <vers num="12.2(12h)"/>
        <vers num="12.2(20)s"/>
        <vers num="12.2(20)s1"/>
        <vers num="12.2(21)"/>
        <vers num="12.2(21a)"/>
        <vers num="12.2(23)"/>
        <vers num="12.2s"/>
        <vers num="12.2sw"/>
        <vers num="12.2zq"/>
        <vers num="12.3"/>
        <vers num="12.3(2)t3"/>
        <vers num="12.3(2)xc1"/>
        <vers num="12.3(2)xc2"/>
        <vers num="12.3(4)t"/>
        <vers num="12.3(4)t1"/>
        <vers num="12.3(4)t2"/>
        <vers num="12.3(4)t3"/>
        <vers num="12.3(4)xd"/>
        <vers num="12.3(4)xd1"/>
        <vers num="12.3(5)"/>
        <vers num="12.3(5a)"/>
        <vers num="12.3(5a)b"/>
        <vers num="12.3(5b)"/>
        <vers num="12.3(6)"/>
        <vers num="12.3b"/>
        <vers num="12.3t"/>
        <vers num="12.3xc"/>
        <vers num="12.3xd"/>
        <vers num="12.3xe"/>
        <vers num="12.3xf"/>
        <vers num="12.3xg"/>
        <vers num="12.3xh"/>
        <vers num="12.3xk"/>
        <vers num="12.3xq"/>
      </prod>
      <prod name="ons_15454e_optical_transport_platform" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0715" seq="2004-0715" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The WebLogic Authentication provider for BEA WebLogic Server and WebLogic Express 8.1 through SP2 and 7.0 through SP4 does not properly clear member relationships when a group is deleted, which can cause a new group with the same name to have the members of the old group, which allows group members to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_52.01.jsp">http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_52.01.jsp</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009763">1009763</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/470470" adv="1">VU#470470</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10130" adv="1" patch="1">10130</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15861">weblogic-authentication-gain-privileges(15861)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="7.0" edition=":express"/>
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0" edition="sp1:express"/>
        <vers num="7.0" edition="sp1:win32"/>
        <vers num="7.0" edition="sp2:express"/>
        <vers num="7.0" edition="sp2:win32"/>
        <vers num="7.0" edition="sp3:express"/>
        <vers num="7.0" edition="sp3:win32"/>
        <vers num="7.0" edition="sp4:express"/>
        <vers num="7.0" edition="sp4:win32"/>
        <vers num="8.1" edition=":express"/>
        <vers num="8.1" edition=":win32"/>
        <vers num="8.1" edition="sp1:express"/>
        <vers num="8.1" edition="sp1:win32"/>
        <vers num="8.1" edition="sp2:express"/>
        <vers num="8.1" edition="sp2:win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0716" seq="2004-0716" published="2004-08-06" modified="2008-10-24" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the DCE daemon (DCED) for the DCE endpoint mapper (epmap) on HP-UX 11 allows remote attackers to execute arbitrary code via a request with a small fragment length and a large amount of data.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.entegrity.com/private/patches/dce/ssrt4741.asp" patch="1">http://support.entegrity.com/private/patches/dce/ssrt4741.asp</ref>
      <ref source="ATSTAKE" url="http://www.atstake.com/research/advisories/2004/a072204-1.txt">A072204-1</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0717" seq="2004-0717" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Opera 7.51 for Windows and 7.50 for Linux does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/1598">http-frame-spoof(1598)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="7.50"/>
        <vers num="7.51"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0718" seq="2004-0718" published="2004-07-27" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The (1) Mozilla 1.6, (2) Firebird 0.7, (3) Firefox 0.8, and (4) Netscape 7.1 web browsers do not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt">SCOSA-2005.49</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=246448">http://bugzilla.mozilla.org/show_bug.cgi?id=246448</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-777">DSA-777</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-810">DSA-810</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:082">MDKSA-2004:082</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html">SUSE-SA:2004:036</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-421.html">RHSA-2004:421</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/15495">15495</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/1598">http-frame-spoof(1598)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4756">oval:org.mitre.oval:def:4756</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9997">oval:org.mitre.oval:def:9997</ref>
    </refs>
    <vuln_soft>
      <prod name="firebird" vendor="firebirdsql">
        <vers num="0.7"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.6"/>
      </prod>
      <prod name="navigator" vendor="netscape">
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0719" seq="2004-0719" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Internet Explorer for Mac 5.2.3, Internet Explorer 6 on Windows XP, and possibly other versions, does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/1598">http-frame-spoof(1598)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.0.1" edition="sp1"/>
        <vers num="5.0.1" edition="sp2"/>
        <vers num="5.0.1" edition="sp3"/>
        <vers num="5.0.1" edition="sp4"/>
        <vers num="5.5" edition="sp1"/>
        <vers num="5.5" edition="sp2"/>
        <vers num="6.0" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0720" seq="2004-0720" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Safari 1.2.2 does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/1598">http-frame-spoof(1598)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0721" seq="2004-0721" published="2004-07-27" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Konqueror 3.1.3, 3.2.2, and possibly other versions does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000864">CLA-2004:864</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109225538901170&amp;w=2">20040811 KDE Security Advisories: Temporary File and Konqueror Frame Injection Vulnerabilities</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-13.xml">200408-13</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20040811-3.txt">http://www.kde.org/info/security/advisory-20040811-3.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/1598">http-frame-spoof(1598)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11371">oval:org.mitre.oval:def:11371</ref>
    </refs>
    <vuln_soft>
      <prod name="konqueror" vendor="kde">
        <vers num="3.1.3"/>
        <vers num="3.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0722" seq="2004-0722" published="2004-08-18" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the SOAPParameter object constructor in (1) Netscape version 7.0 and 7.1 and (2) Mozilla 1.6, and possibly earlier versions, allows remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt">SCOSA-2005.49</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=236618">http://bugzilla.mozilla.org/show_bug.cgi?id=236618</ref>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=117&amp;type=vulnerabilities">http://www.idefense.com/application/poi/display?id=117&amp;type=vulnerabilities</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html">SUSE-SA:2004:036</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-421.html">RHSA-2004:421</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/15495">15495</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16862">mozilla-netscape-soapparameter-bo(16862)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4629">oval:org.mitre.oval:def:4629</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9378">oval:org.mitre.oval:def:9378</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.6"/>
      </prod>
      <prod name="navigator" vendor="netscape">
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0723" seq="2004-0723" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Microsoft Java virtual machine (VM) 5.0.0.3810 allows remote attackers to bypass sandbox restrictions to read or write certain data between applets from different domains via the "GET/Key" and "PUT/Key/Value" commands, aka "cross-site Java."</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108948405808522&amp;w=2">20040710 Covert Channels allow Cross-Site-Java in Microsoft VM</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10688" adv="1">10688</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16666">msjvm-sandbox-bypass(16666)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_virtual_machine" vendor="microsoft">
        <vers num="5.0.0.3810"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0724" seq="2004-0724" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Half-Life engine before July 7 2004 allows remote attackers to cause a denial of service (server or client crash) via an empty fragmented packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108966465302107&amp;w=2">20040712 Remote crash of Half-Life servers and clients (versions before the 07 July 2004)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10700">10700</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16674">halflife-packet-dos(16674)</ref>
    </refs>
    <vuln_soft>
      <prod name="half-life" vendor="valve_software">
        <vers num="1.1.0.4" edition=":linux"/>
        <vers num="1.1.0.4" edition=":windows"/>
        <vers num="1.1.0.8"/>
        <vers num="1.1.0.9"/>
        <vers num="1.1.1.0"/>
      </prod>
      <prod name="half-life_dedicated_server" vendor="valve_software">
        <vers num="3.1"/>
        <vers num="3.1.0.4" edition=":linux"/>
        <vers num="3.1.0.5" edition=":linux"/>
        <vers num="3.1.0.6" edition=":linux"/>
        <vers num="3.1.0.7" edition=":linux"/>
        <vers num="3.1.0.8" edition=":linux"/>
        <vers num="3.1.0.9" edition=":linux"/>
        <vers num="3.1.1.0" edition=":linux"/>
        <vers num="3.1.1.1c1" edition=":linux"/>
        <vers num="3.1.1.1d" edition=":linux"/>
        <vers num="3.1.1.1e" edition=":linux"/>
        <vers num="3.1.1.1e" edition=":win32"/>
        <vers num="3.1.3"/>
        <vers num="4.1.0.4" edition=":win32"/>
        <vers num="4.1.0.6" edition=":win32"/>
        <vers num="4.1.0.7" edition=":win32"/>
        <vers num="4.1.0.8" edition=":win32"/>
        <vers num="4.1.0.9" edition=":win32"/>
        <vers num="4.1.1.0" edition=":win32"/>
        <vers num="4.1.1.1c1" edition=":win32"/>
        <vers num="4.1.1.1d_beta" edition=":win32"/>
        <vers num="4.1.1.1e" edition=":linux"/>
        <vers num="4.1.1.1e" edition=":win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0725" seq="2004-0725" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in help.php in Moodle 1.3.2 and 1.4 dev allows remote attackers to inject arbitrary web script or HTML via the file parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/moodle/moodle/help.php">http://cvs.sourceforge.net/viewcvs.py/moodle/moodle/help.php</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108973588000027&amp;w=2">20040713 Moodle XSS Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10718" adv="1" patch="1">10718</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16684">moodle-help-file-xss(16684)</ref>
    </refs>
    <vuln_soft>
      <prod name="moodle" vendor="moodle">
        <vers num="1.1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0726" seq="2004-0726" published="2004-07-27" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Windows Media Player control in Microsoft Windows 2000 allows remote attackers to execute arbitrary script in the local computer zone via an ASX filename that contains javascript, which is executed in the local context in a preview panel.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108965512912175&amp;w=2">20040711 Media Preview Script Execution Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10693" adv="1">10693</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16704">win2k-media-code-execution(16704)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0727" seq="2004-0727" published="2004-07-27" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 6.0.2800.1106 on Microsoft Windows XP SP2, and other versions including 5.01 and 5.5, allows remote web servers to bypass zone restrictions and execute arbitrary code in the local computer zone by redirecting a function to another function with the same name, as demonstrated by SimilarMethodNameRedir, aka the "Similar Method Name Redirection Cross Domain Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://freehost07.websamba.com/greyhats/similarmethodnameredir.htm">http://freehost07.websamba.com/greyhats/similarmethodnameredir.htm</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108966512815373&amp;w=2">20040711 MSIE Similar Method Name Redirection Cross Site/Zone Scripting</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/207264">VU#207264</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-293A.html">TA04-293A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038">MS04-038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16681">ie-function-redirect-xss(16681)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4702">oval:org.mitre.oval:def:4702</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6829">oval:org.mitre.oval:def:6829</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7084">oval:org.mitre.oval:def:7084</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7448">oval:org.mitre.oval:def:7448</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7496">oval:org.mitre.oval:def:7496</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7906">oval:org.mitre.oval:def:7906</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0.2800.1106"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0728" seq="2004-0728" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Remote Control Client service in Microsoft's Systems Management Server (SMS) 2.50.2726.0 allows remote attackers to cause a denial of service (crash) via a data packet to TCP port 2702 that causes the server to read or write to an invalid memory address.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108983763710315&amp;w=2">20040714 [HV-MED] DoS in Microsoft SMS Client</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16696">sms-remote-service-dos(16696)</ref>
    </refs>
    <vuln_soft>
      <prod name="systems_management_server" vendor="microsoft">
        <vers num="1.2" edition="sp1"/>
        <vers num="1.2" edition="sp2"/>
        <vers num="1.2" edition="sp3"/>
        <vers num="1.2" edition="sp4"/>
        <vers num="2.0" edition="sp1"/>
        <vers num="2.50.2726"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0729" seq="2004-0729" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">PhpBB 2.0.8 allows remote attackers to gain sensitive information via an invalid (1) category_rows parameter to index.php, (2) faq parameter to faq.php, or (3) ranksrow parameter to profile.php, which reveal the full path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108999024506020&amp;w=2">20040716 [waraxe-2004-SA#034 - XSS and path full path disclosure in PhpBB 2.0.8]</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=34">http://www.waraxe.us/index.php?modname=sa&amp;id=34</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16716">phpbb-indexphp-path-disclosure(16716)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16720">phpbb-lang-faq-path-disclosure(16720)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16723">phpbb-usercpviewprofile-path-disclosure(16723)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb_group">
        <vers num="2.0.8"/>
        <vers num="2.0.8a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0730" seq="2004-0730" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in PhpBB 2.0.8 allow remote attackers to inject arbitrary web script or HTML via (1) the cat_title parameter in index.php, (2) the faq[0][0] parameter in lang_faq.php as accessible from faq.php, or (3) the faq[0][0] parameter in lang_bbcode.php as accessible from faq.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108999024506020&amp;w=2">20040716 [waraxe-2004-SA#034 - XSS and path full path disclosure in PhpBB 2.0.8]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10738">10738</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=34">http://www.waraxe.us/index.php?modname=sa&amp;id=34</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16724">phpbb-indexphp-xss(16724)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16725">phpbb-lang-faq-xss(16725)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16726">phpbb-lang-bbcode-xss(16726)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb_group">
        <vers num="2.0.8"/>
        <vers num="2.0.8a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0731" seq="2004-0731" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in the Search module for Php-Nuke allows remote attackers to inject arbitrary script as other users via the input field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109002107329823&amp;w=2">20040716 [waraxe-2004-SA#035 - Multiple security holes in PhpNuke - part 2]</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=35" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=35</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16721">phpnuke-search-module-xss(16721)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="8.0_final"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0732" seq="2004-0732" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the Search module for Php-Nuke allows remote attackers to execute arbitrary SQL statements via the instory parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109002107329823&amp;w=2">20040716 [waraxe-2004-SA#035 - Multiple security holes in PhpNuke - part 2]</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=35" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=35</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16728">phpnuke-search-module-sql-injection(16728)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="8.0_final"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0733" seq="2004-0733" published="2004-07-27" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in OllyDbg 1.10 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers that are directly provided to the OutputDebugString function call.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0711.html">20040717 [FMADV] Format String Bug in OllyDbg 1.10</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109007978822810&amp;w=2">20040717 [FMADV] Format String Bug in OllyDbg 1.10</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10742" adv="1">10742</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16711">ollydbg-outputdebugstring-format-string(16711)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/3757">3757</ref>
    </refs>
    <vuln_soft>
      <prod name="ollydbg" vendor="ollydbg">
        <vers num="1.0.6"/>
        <vers num="1.0.8b"/>
        <vers num="1.0.9"/>
        <vers num="1.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0734" seq="2004-0734" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Web_Store.cgi allows remote attackers to execute arbitrary commands via shell metacharacters in the page parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109008402715874&amp;w=2">20040717 Web_Store.cgi allows Command Execution</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10744" adv="1">10744</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16710">extropia-webstore-command-execution(16710)</ref>
    </refs>
    <vuln_soft>
      <prod name="extropia_webstore" vendor="extropia">
        <vers num="1.0"/>
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0735" seq="2004-0735" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Medal of Honor (1) Allied Assault 1.11v9 and earlier, (2) Breakthrough 2.40b and earlier, and (3) Spearhead 2.15 and earlier, when playing on a Local Area Network (LAN), allows remote attackers to execute arbitrary code via vectors such as (1) the getinfo query, (2) the connect packet, and other unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109008314631518&amp;w=2">20040717 Medal of Honor remote buffer-overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10743" adv="1" patch="1">10743</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16715">medalofhonor-packet-bo(16715)</ref>
    </refs>
    <vuln_soft>
      <prod name="medal_of_honor_allied_assault" vendor="electronic_arts">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.11_v9"/>
        <vers num="breakthrough_2.40_b"/>
        <vers num="spearhead_2.15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0736" seq="2004-0736" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The search module in Php-Nuke allows remote attackers to gain sensitive information via the (1) "**" or (2) "+" search patterns, which reveals the path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109026609504767&amp;w=2">20040718 [waraxe-2004-SA#036 - Multiple security holes in PhpNuke - part 3]</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16736">phpnuke-asterisk-plus-path-disclosure(16736)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="8.0_final"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0737" seq="2004-0737" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting vulnerabilities in index.php in the Search module for Php-Nuke allows remote attackers to inject arbitrary web script or HTML via the (1) sid, (2) max, (3) sel1, (4) sel2, (5) sel3, (6) sel4, (7) sel5, (8) match, (9) mod1, (10) mod2, or (11) mod3 parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109026609504767&amp;w=2">20040718 [waraxe-2004-SA#036 - Multiple security holes in PhpNuke - part 3]</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16721">phpnuke-search-module-xss(16721)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="8.0_final"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0738" seq="2004-0738" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in the Search module in Php-Nuke allow remote attackers to execute arbitrary SQL via the (1) min or (2) categ parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109026609504767&amp;w=2">20040718 [waraxe-2004-SA#036 - Multiple security holes in PhpNuke - part 3]</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16737">phpnuke-search-min-sql-injection(16737)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="8.0_final"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0739" seq="2004-0739" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Whisper FTP Surfer 1.0.7 allows remote FTP servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/024087.html">20040719 Buffer overflow in Whisper FTP Surfer 1.0.7</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109035224715409&amp;w=2">20040719 Buffer overflow in Whisper FTP Surfer 1.0.7</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16742">whisper-long-file-name-bo(16742)</ref>
    </refs>
    <vuln_soft>
      <prod name="whisper_ftp_surfer" vendor="snapfiles">
        <vers num="1.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0740" seq="2004-0740" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The HTTP server in Lexmark T522 and possibly other models allows remote attackers to cause a denial of service (server crash, reload, or hang) via an HTTP header with a long Host field, possibly triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109035701329111&amp;w=2">20040720 Denial of Service vulnerability in several Lexmark HTTP servers</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16752">lexmark-long-host-bo(16752)</ref>
    </refs>
    <vuln_soft>
      <prod name="t522_network_printer" vendor="lexmark">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0741" seq="2004-0741" published="2004-07-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">LionMax Software WWW File Share Pro 2.60 allows remote attackers to cause a denial of service (crash or hang) via a long URL, possibly triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109035774701051&amp;w=2">20040720 dos_in_file_share_2.6</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16754">wwwfilesharepro-http-get-dos(16754)</ref>
    </refs>
    <vuln_soft>
      <prod name="www_file_share_pro" vendor="lionmax_software">
        <vers num="2.6"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
        <vers num="2.42"/>
        <vers num="2.46"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0742" seq="2004-0742" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Sun Java System Portal Server 6.2 (formerly Sun ONE) allows remote authenticated users to obtain Calendar Server privileges and modify Calendar data by changing the display options to a non-default view.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57586" adv="1" patch="1">57586</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/881254">VU#881254</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10788">10788</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16776">sunjavaportal-calendar-gain-access(16776)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_system_calendar_server" vendor="sun">
        <vers num="6.2" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0743" seq="2004-0743" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Safari in Mac OS X before 10.3.5, after sending form data using the POST method, may re-send the data to a GET method URL if that URL is redirected after the POST data and the user uses the forward or backward buttons, which may cause an information leak.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/mhonarc/security-announce/msg00056.html">APPLE-SA-2004-09-09</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/128414">VU#128414</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16944">safari-web-info-disclosure(16944)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0744" seq="2004-0744" published="2004-11-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The TCP/IP Networking component in Mac OS X before 10.3.5 allows remote attackers to cause a denial of service (memory and resource consumption) via a "Rose Attack" that involves sending a subset of small IP fragments that do not form a complete, larger packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://digital.net/~gandalf/Rose_Frag_Attack_Explained.txt">http://digital.net/~gandalf/Rose_Frag_Attack_Explained.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108075899619193&amp;w=2">20040331 IPv4 fragmentation  --> The Rose Attack</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108308604119618&amp;w=2">20040427 Source Code To Test IPv4 fragmentation --> The Rose Attack</ref>
      <ref source="APPLE" url="http://www.auscert.org.au/render.html?it=4291">APPLE-SA-2004-09-09</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16946">macos-tcp-ip-dos(16946)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0745" seq="2004-0745" published="2004-09-28" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">LHA 1.14 and earlier allows attackers to execute arbitrary commands via a directory with shell metacharacters in its name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-13.xml" adv="1">GLSA-200409-13</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-323.html">RHSA-2004:323</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-440.html" adv="1" patch="1">RHSA-2004:440</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1833">FLSA:1833</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17198">lha-metacharacter-command-execution(17198)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11088">oval:org.mitre.oval:def:11088</ref>
    </refs>
    <vuln_soft>
      <prod name="lha" vendor="tsugio_okamoto">
        <vers num="1.14" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0746" seq="2004-0746" published="2004-10-20" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Konqueror in KDE 3.2.3 and earlier allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk and .firm.in, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000864">CLA-2004:864</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109327681304401&amp;w=2">20040823 KDE Security Advisory: Konqueror Cross-Domain Cookie Injection</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20040823-1.txt">http://www.kde.org/info/security/advisory-20040823-1.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:086">MDKSA-2004:086</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10991" adv="1" patch="1">10991</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17063">kde-konqueror-cookie-set(17063)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11281">oval:org.mitre.oval:def:11281</ref>
    </refs>
    <vuln_soft>
      <prod name="konqueror" vendor="kde">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.5"/>
        <vers num="3.0.5b"/>
        <vers num="3.1"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.5"/>
        <vers num="3.2.1"/>
        <vers num="3.2.3"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="kde" vendor="kde">
        <vers num="3.1.3"/>
        <vers num="3.2"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0747" seq="2004-0747" published="2004-10-20" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Apache 2.0.50 and earlier allows local users to gain apache privileges via a .htaccess file that causes the overflow during expansion of environment variables.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011303">1011303</ref>
      <ref source="MISC" url="http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147">http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml">GLSA-200409-21</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/481998">VU#481998</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096">MDKSA-2004:096</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_32_apache2.html">SUSE-SA:2004:032</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-463.html" adv="1" patch="1">RHSA-2004:463</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0047/">2004-0047</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1233">ADV-2009-1233</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17384">apache-env-configuration-bo(17384)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11561">oval:org.mitre.oval:def:11561</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0"/>
        <vers num="2.0.28"/>
        <vers num="2.0.32"/>
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.0.40"/>
        <vers num="2.0.41"/>
        <vers num="2.0.42"/>
        <vers num="2.0.43"/>
        <vers num="2.0.44"/>
        <vers num="2.0.45"/>
        <vers num="2.0.46"/>
        <vers num="2.0.47"/>
        <vers num="2.0.48"/>
        <vers num="2.0.49"/>
        <vers num="2.0.50"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0748" seq="2004-0748" published="2004-10-20" modified="2018-05-02" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (CPU consumption) by aborting an SSL connection in a way that causes an Apache child process to enter an infinite loop.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml">GLSA-200409-21</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096">MDKSA-2004:096</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_30_apache2.html">SUSE-SA:2004:030</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-349.html" adv="1" patch="1">RHSA-2004:349</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0047/">2004-0047</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=130750">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=130750</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17200">apache-modssl-dos(17200)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11126">oval:org.mitre.oval:def:11126</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0"/>
        <vers num="2.0.28"/>
        <vers num="2.0.32"/>
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.0.40"/>
        <vers num="2.0.41"/>
        <vers num="2.0.42"/>
        <vers num="2.0.43"/>
        <vers num="2.0.44"/>
        <vers num="2.0.45"/>
        <vers num="2.0.46"/>
        <vers num="2.0.47"/>
        <vers num="2.0.48"/>
        <vers num="2.0.49"/>
        <vers num="2.0.50"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0749" seq="2004-0749" published="2004-12-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The mod_authz_svn module in Subversion 1.0.7 and earlier does not properly restrict access to all metadata on unreadable paths, which could allow remote attackers to gain sensitive information via (1) svn log -v, (2) svn propget, or (3) svn blame, and other commands that follow renames.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FEDORA" url="http://fedoranews.org/updates/FEDORA-2004-318.shtml">FEDORA-2004-318</ref>
      <ref source="CONFIRM" url="http://subversion.tigris.org/security/CAN-2004-0749-advisory.txt" adv="1" patch="1">http://subversion.tigris.org/security/CAN-2004-0749-advisory.txt</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-35.xml" adv="1" patch="1">GLSA-200409-35</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11243" adv="1" patch="1">11243</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17472">subversion-information-disclosure(17472)</ref>
    </refs>
    <vuln_soft>
      <prod name="subversion" vendor="subversion">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.1.0_rc1"/>
        <vers num="1.1.0_rc2"/>
        <vers num="1.1.0_rc3"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="0.5"/>
        <vers num="0.7"/>
        <vers num="1.1a"/>
        <vers num="1.2"/>
        <vers num="1.4" edition="rc1"/>
        <vers num="1.4" edition="rc2"/>
        <vers num="1.4" edition="rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0750" seq="2004-0750" published="2004-10-20" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in redhat-config-nfs before 1.0.13, when shares are exported to multiple hosts, can produce incorrect permissions and prevent the all_squash option from being applied.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-434.html" adv="1" patch="1">RHSA-2004:434</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/419762/100/0/threaded">FLSA:152787</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11240">11240</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17478">red-hat-permission-gain-privileges(17478)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10696">oval:org.mitre.oval:def:10696</ref>
    </refs>
    <vuln_soft>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0751" seq="2004-0751" published="2004-10-20" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The char_buffer_read function in the mod_ssl module for Apache 2.x, when using reverse proxying to an SSL server, allows remote attackers to cause a denial of service (segmentation fault).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-09/0096.html">20040911 Remote buffer overflow in Apache mod_ssl when reverse proxying SSL</ref>
      <ref source="CONFIRM" url="http://issues.apache.org/bugzilla/show_bug.cgi?id=30134">http://issues.apache.org/bugzilla/show_bug.cgi?id=30134</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml">GLSA-200409-21</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096">MDKSA-2004:096</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_30_apache2.html">SUSE-SA:2004:030</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-463.html" adv="1" patch="1">RHSA-2004:463</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0047/">2004-0047</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17273">apache-modssl-speculative-dos(17273)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11864">oval:org.mitre.oval:def:11864</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0"/>
        <vers num="2.0.28"/>
        <vers num="2.0.32"/>
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.0.40"/>
        <vers num="2.0.41"/>
        <vers num="2.0.42"/>
        <vers num="2.0.43"/>
        <vers num="2.0.44"/>
        <vers num="2.0.45"/>
        <vers num="2.0.46"/>
        <vers num="2.0.47"/>
        <vers num="2.0.48"/>
        <vers num="2.0.49"/>
        <vers num="2.0.50"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0752" seq="2004-0752" published="2004-10-20" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">OpenOffice (OOo) 1.1.2 creates predictable directory names with insecure permissions during startup, which may allow local users to read or list files of other users.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109483308421566&amp;w=2">20040910 OpenOffice World-Readable Temporary Files Disclose Files to Local Users</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011205" adv="1" patch="1">1011205</ref>
      <ref source="CONFIRM" url="http://www.openoffice.org/issues/show_bug.cgi?id=33357" adv="1" patch="1">http://www.openoffice.org/issues/show_bug.cgi?id=33357</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-446.html" adv="1" patch="1">RHSA-2004:446</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11151">11151</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17312">openofficeorg-tmpfile-insecure-permissions(17312)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10294">oval:org.mitre.oval:def:10294</ref>
    </refs>
    <vuln_soft>
      <prod name="openoffice" vendor="openoffice">
        <vers num="1.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0753" seq="2004-0753" published="2004-10-20" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The BMP image processor for (1) gdk-pixbuf before 0.22 and (2) gtk2 before 2.2.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted BMP file.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000875">CLA-2004:875</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-546">DSA-546</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/825374">VU#825374</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095">MDKSA-2004:095</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:214">MDKSA-2005:214</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-447.html" adv="1" patch="1">RHSA-2004:447</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-466.html" adv="1" patch="1">RHSA-2004:466</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/419771/100/0/threaded">FLSA-2005:155510</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11195">11195</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2005">FLSA:2005</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17383">gtk-bmp-dos(17383)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10585">oval:org.mitre.oval:def:10585</ref>
    </refs>
    <vuln_soft>
      <prod name="gdkpixbuf" vendor="gnome">
        <vers num="0.17"/>
        <vers num="0.18"/>
        <vers num="0.20"/>
        <vers num="0.22"/>
      </prod>
      <prod name="gtk+" vendor="gtk">
        <vers num="2.0.2"/>
        <vers num="2.0.6"/>
        <vers num="2.2.1"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0754" seq="2004-0754" published="2004-10-20" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the size variable in Groupware server messages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gaim.sourceforge.net/security/?id=2" adv="1">http://gaim.sourceforge.net/security/?id=2</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011083">1011083</ref>
      <ref source="FEDORA" url="http://www.fedoranews.org/updates/FEDORA-2004-278.shtml" adv="1" patch="1">FEDORA-2004-278</ref>
      <ref source="FEDORA" url="http://www.fedoranews.org/updates/FEDORA-2004-279.shtml" adv="1" patch="1">FEDORA-2004-279</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-27.xml" adv="1">GLSA-200408-27</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-400.html">RHSA-2004:400</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11056">11056</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17140">gaim-groupware-integer-overflow(17140)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10220">oval:org.mitre.oval:def:10220</ref>
    </refs>
    <vuln_soft>
      <prod name="gaim" vendor="rob_flynn">
        <vers num="0.10"/>
        <vers num="0.10.3"/>
        <vers num="0.50"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.55"/>
        <vers num="0.56"/>
        <vers num="0.57"/>
        <vers num="0.58"/>
        <vers num="0.59"/>
        <vers num="0.59.1"/>
        <vers num="0.60"/>
        <vers num="0.61"/>
        <vers num="0.62"/>
        <vers num="0.63"/>
        <vers num="0.64"/>
        <vers num="0.65"/>
        <vers num="0.66"/>
        <vers num="0.67"/>
        <vers num="0.68"/>
        <vers num="0.69"/>
        <vers num="0.70"/>
        <vers num="0.71"/>
        <vers num="0.72"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.75"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0755" seq="2004-0755" published="2004-10-20" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The FileStore capability in CGI::Session for Ruby before 1.8.1, and possibly PStore, creates files with insecure permissions, which can allow local users to steal session information and hijack sessions.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-537" adv="1" patch="1">DSA-537</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-08.xml" adv="1" patch="1">GLSA-200409-08</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:128">MDKSA-2004:128</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16996">ruby-filestore-pstore-insecure-permission(16996)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11128">oval:org.mitre.oval:def:11128</ref>
    </refs>
    <vuln_soft>
      <prod name="ruby" vendor="yukihiro_matsumoto">
        <vers num="1.6"/>
        <vers num="1.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0756" seq="2004-0756" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0757" seq="2004-0757" published="2004-08-18" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the SendUidl in the POP3 capability for Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, may allow remote POP3 mail servers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt">SCOSA-2005.49</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=229374" adv="1" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=229374</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/561022">VU#561022</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html">SUSE-SA:2004:036</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-421.html">RHSA-2004:421</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/15495">15495</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16869">mozilla-senduidl-pop3-bo(16869)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11042">oval:org.mitre.oval:def:11042</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3250">oval:org.mitre.oval:def:3250</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.9" prev="1"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.7" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0758" seq="2004-0758" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Mozilla 1.5 through 1.7 allows a CA certificate to be imported even when their DN is the same as that of the built-in CA root certificate, which allows remote attackers to cause a denial of service to SSL pages because the malicious certificate is treated as invalid.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt">SCOSA-2005.49</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=249004" adv="1" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=249004</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-22.xml">GLSA-200408-22</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/784278">VU#784278</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html">http://www.mozilla.org/projects/security/known-vulnerabilities.html</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html">SUSE-SA:2004:036</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-421.html">RHSA-2004:421</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/15495">15495</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127186">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127186</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16706">mozilla-certificate-dos(16706)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10304">oval:org.mitre.oval:def:10304</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3134">oval:org.mitre.oval:def:3134</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0759" seq="2004-0759" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla before 1.7 allows remote web servers to read arbitrary files via Javascript that sets the value of an &lt;input type="file"> tag.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt">SCOSA-2005.49</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=241924" adv="1" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=241924</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html">SUSE-SA:2004:036</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-421.html">RHSA-2004:421</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/15495">15495</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16870">mozilla-warning-file-upload(16870)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11153">oval:org.mitre.oval:def:11153</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0760" seq="2004-0760" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla allows remote attackers to cause Mozilla to open a URI as a different MIME type than expected via a null character (%00) in an FTP URI.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt">SCOSA-2005.49</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=250906" adv="1" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=250906</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html">SUSE-SA:2004:036</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-421.html">RHSA-2004:421</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/15495">15495</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16691">mozilla-modify-mime-type(16691)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11090">oval:org.mitre.oval:def:11090</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1227">oval:org.mitre.oval:def:1227</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0761" seq="2004-0761" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote attackers to use certain redirect sequences to spoof the security lock icon that makes a web page appear to be encrypted.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt">SCOSA-2005.49</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=240053" adv="1" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=240053</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html">SUSE-SA:2004:036</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-421.html">RHSA-2004:421</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/15495">15495</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16871">mozilla-redirect-ssl-spoof(16871)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3603">oval:org.mitre.oval:def:3603</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9240">oval:org.mitre.oval:def:9240</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.9" prev="1"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.7" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0762" seq="2004-0762" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote web sites to install arbitrary extensions by using interactive events to manipulate the XPInstall Security dialog box.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt">SCOSA-2005.49</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0264.html">20040407 Race conditions in security dialogs</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=162020" adv="1" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=162020</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html">SUSE-SA:2004:036</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-421.html">RHSA-2004:421</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/15495">15495</ref>
      <ref source="MISC" url="http://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/">http://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16623">mozilla-dialog-code-execution(16623)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10032">oval:org.mitre.oval:def:10032</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4403">oval:org.mitre.oval:def:4403</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.9" prev="1"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.7" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0763" seq="2004-0763" published="2004-08-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox 0.9.1 and 0.9.2 allows remote web sites to spoof certificates of trusted web sites via redirects and Javascript that uses the "onunload" method.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt">SCOSA-2005.49</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=253121" adv="1" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=253121</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/024372.html">20040725 Mozilla Firefox Certificate Spoofing</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109087067730938&amp;w=2">20040726 Mozilla Firefox Certificate Spoofing</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="MISC" url="http://www.cipher.org.uk/index.php?p=advisories/Certificate_Spoofing_Mozilla_FireFox_25-07-2004.advisory">http://www.cipher.org.uk/index.php?p=advisories/Certificate_Spoofing_Mozilla_FireFox_25-07-2004.advisory</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-22.xml">GLSA-200408-22</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html">http://www.mozilla.org/projects/security/known-vulnerabilities.html</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html">SUSE-SA:2004:036</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-421.html">RHSA-2004:421</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/15495">15495</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16796">mozilla-ssl-certificate-spoofing(16796)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3989">oval:org.mitre.oval:def:3989</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9436">oval:org.mitre.oval:def:9436</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0764" seq="2004-0764" published="2004-08-18" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote web sites to hijack the user interface via the "chrome" flag and XML User Interface Language (XUL) files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt">SCOSA-2005.49</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=244965" adv="1" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=244965</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/262350">VU#262350</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html">SUSE-SA:2004:036</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-421.html">RHSA-2004:421</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10832">10832</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/15495">15495</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16837">mozilla-user-interface-spoofing(16837)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2418">oval:org.mitre.oval:def:2418</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9419">oval:org.mitre.oval:def:9419</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.9" prev="1"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.7" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0765" seq="2004-0765" published="2004-08-18" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The cert_TestHostName function in Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, only checks the hostname portion of a certificate when the hostname portion of the URI is not a fully qualified domain name (FQDN), which allows remote attackers to spoof trusted certificates.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=234058" adv="1" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=234058</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html" adv="1">SUSE-SA:2004:036</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-421.html" adv="1" patch="1">RHSA-2004:421</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16868">mozilla-certtesthostname-certificate-spoof(16868)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11162">oval:org.mitre.oval:def:11162</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.9" prev="1"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.7" prev="1"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0766" seq="2004-0766" published="2004-08-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">NGSEC StackDefender 2.0 allows attackers to cause a denial of service (system crash) via an invalid address for the BaseAddress parameter to the hooks for the (1) ZwAllocateVirtualMemory or (2) ZwProtectVirtualMemory functions.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=119&amp;type=vulnerabilities&amp;flashstatus=false" adv="1">http://www.idefense.com/application/poi/display?id=119&amp;type=vulnerabilities&amp;flashstatus=false</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16892">stackdefender-baseaddress-dos(16892)</ref>
    </refs>
    <vuln_soft>
      <prod name="stackdefender" vendor="ngsec">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0767" seq="2004-0767" published="2004-08-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">NGSEC StackDefender 1.10 allows attackers to cause a denial of service (system crash) via an invalid address for the ObjectAttribues parameter to the hooks for the (1) ZwCreateFile or (2) ZwOpenFile functions.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.idefense.com/application/poi/display?id=118&amp;type=vulnerabilities&amp;flashstatus=false" adv="1">http://www.idefense.com/application/poi/display?id=118&amp;type=vulnerabilities&amp;flashstatus=false</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16879">stackdefender-objectattributes-dos(16879)</ref>
    </refs>
    <vuln_soft>
      <prod name="stackdefender" vendor="ngsec">
        <vers num="1.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0768" seq="2004-0768" published="2004-10-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">libpng 1.2.5 and earlier does not properly calculate certain buffer offsets, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200812-15.xml">GLSA-200812-15</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-536" adv="1" patch="1">DSA-536</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1943">FLSA:1943</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16914">libpng-offset-bo(16914)</ref>
    </refs>
    <vuln_soft>
      <prod name="libpng3" vendor="greg_roelofs">
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0769" seq="2004-0769" published="2004-08-18" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in LHA allows remote attackers to execute arbitrary code via long pathnames in LHarc format 2 headers for a .LHZ archive, as originally demonstrated using the "x" option but also exploitable through "l" and "v", and fixed in header.c, a different issue than CVE-2004-0771.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=51285" adv="1" patch="1">http://bugs.gentoo.org/show_bug.cgi?id=51285</ref>
      <ref source="MISC" url="http://lw.ftw.zamosc.pl/lha-exploit.txt">http://lw.ftw.zamosc.pl/lha-exploit.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108745217504379&amp;w=2">20040616 Re: [SECURITY] [DSA 515-1] New lha packages fix several vulnerabilities; Re:</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-13.xml">GLSA-200409-13</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-323.html">RHSA-2004:323</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-440.html">RHSA-2004:440</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1833">FLSA:1833</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16917">lha-long-pathname-bo(16917)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11047">oval:org.mitre.oval:def:11047</ref>
    </refs>
    <vuln_soft>
      <prod name="bugzilla" vendor="mozilla">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0770" seq="2004-0770" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">romload.c in DGen Emulator 1.23 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files during decompression of (1) gzip or (2) bzip ROM files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=263282&amp;archive=yes">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=263282&amp;archive=yes</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10855" adv="1">10855</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16884">dgen-rom-decompression-symlink(16884)</ref>
    </refs>
    <vuln_soft>
      <prod name="emulator" vendor="dgen">
        <vers num="1.15"/>
        <vers num="1.16"/>
        <vers num="1.17"/>
        <vers num="1.18"/>
        <vers num="1.20"/>
        <vers num="1.20_a"/>
        <vers num="1.21"/>
        <vers num="1.22"/>
        <vers num="1.23"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0771" seq="2004-0771" published="2004-11-23" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the extract_one function from lhext.c in LHA may allow attackers to execute arbitrary code via a long w (working directory) command line option, a different issue than CVE-2004-0769. NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.gentoo.org/show_bug.cgi?id=51285">http://bugs.gentoo.org/show_bug.cgi?id=51285</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108668791510153">20040606 Re: [SECURITY] [DSA 515-1] New lha packages fix several</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-13.xml">GLSA-200409-13</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-323.html">RHSA-2004:323</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-440.html">RHSA-2004:440</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/363418">20040515 lha buffer overflow(s) again</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10354" adv="1" patch="1">10354</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=1833">FLSA:1833</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16196">lha-extractone-bo(16196)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9595">oval:org.mitre.oval:def:9595</ref>
    </refs>
    <vuln_soft>
      <prod name="lha" vendor="tsugio_okamoto">
        <vers num="1.14"/>
        <vers num="1.15"/>
        <vers num="1.17"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0772" seq="2004-0772" published="2004-10-20" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Double free vulnerabilities in error handling code in krb524d for MIT Kerberos 5 (krb5) 1.2.8 and earlier may allow remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000860">CLA-2004:860</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109508872524753&amp;w=2">20040913 [OpenPKG-SA-2004.039] OpenPKG Security Advisory (kerberos)</ref>
      <ref source="CONFIRM" url="http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt" adv="1" patch="1">http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-543">DSA-543</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml">GLSA-200409-09</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/350792">VU#350792</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:088">MDKSA-2004:088</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11078">11078</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0045/">2004-0045</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-247A.html" adv="1" patch="1">TA04-247A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17158">kerberos-krb524d-double-free(17158)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4661">oval:org.mitre.oval:def:4661</ref>
    </refs>
    <vuln_soft>
      <prod name="kerberos" vendor="mit">
        <vers num="1.0"/>
        <vers num="1.0.8mit"/>
        <vers num="1.2.2.beta1"/>
        <vers num="5-1.2"/>
        <vers num="5-1.2.1"/>
        <vers num="5-1.2.2"/>
        <vers num="5-1.2.3"/>
        <vers num="5-1.2.4"/>
        <vers num="5-1.2.5"/>
        <vers num="5-1.2.6"/>
        <vers num="5-1.2.7"/>
        <vers num="5-1.2.8"/>
        <vers num="5-1.3" edition="alpha1"/>
        <vers num="5-1.3.1"/>
        <vers num="5-1.3.2"/>
        <vers num="5-1.3.3"/>
        <vers num="5-1.3.4"/>
        <vers num="5_1.0.6"/>
        <vers num="5_1.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0774" seq="2004-0774" published="2004-11-03" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">RealNetworks Helix Universal Server 9.0.2 for Linux and 9.0.3 for Windows allows remote attackers to cause a denial of service (CPU and memory exhaustion) via a POST request with a Content-Length header set to -1.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=151&amp;type=vulnerabilities" adv="1">20041007 RealNetworks Helix Server Content-Length Denial of Service Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17648">helix-post-dos(17648)</ref>
    </refs>
    <vuln_soft>
      <prod name="helix_universal_mobile_server_and_gateway" vendor="realnetworks">
        <vers num="10.3.1.716" prev="1"/>
      </prod>
      <prod name="helix_universal_server" vendor="realnetworks">
        <vers num="9.0.2"/>
        <vers num="9.0.4.958" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0775" seq="2004-0775" published="2004-10-20" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in WIDCOMM Bluetooth Connectivity Software, as used in products such as BTStackServer 1.3.2.7 and 1.4.2.10, Windows XP and Windows 98 with MSI Bluetooth Dongles, and HP IPAQ 5450 running WinCE 3.0, allows remote attackers to execute arbitrary code via certain service requests.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0029.html">20040811 ptl-2004-03: WIDCOMM Bluetooth Connectivity Software Buffer Overflows</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109223783402624&amp;w=2">20040811 ptl-2004-03: WIDCOMM Bluetooth Connectivity Software Buffer Overflows</ref>
      <ref source="MISC" url="http://www.internetnews.com/security/article.php/3394181">http://www.internetnews.com/security/article.php/3394181</ref>
      <ref source="MISC" url="http://www.pentest.co.uk/documents/ptl-2004-03.html" adv="1" patch="1">http://www.pentest.co.uk/documents/ptl-2004-03.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/418633/100/0/threaded">20051204 have you ever been BluePIMped?</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16953">bluetooth-btw-service-bo(16953)</ref>
    </refs>
    <vuln_soft>
      <prod name="bluetooth_communication_software" vendor="widcomm">
        <vers num="1.4.1.03"/>
      </prod>
      <prod name="btstackserver" vendor="widcomm">
        <vers num="1.3.2.7"/>
        <vers num="1.4.2.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0777" seq="2004-0777" published="2004-10-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the auth_debug function in Courier-IMAP 1.6.0 through 2.2.1 and 3.x through 3.0.3, when login debugging (DEBUG_LOGIN) is enabled, allows remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-19.xml">GLSA-200408-19</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10976">10976</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0043/">2004-0043</ref>
      <ref source="IDEFENSE" url="http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=131">20040818 Courier-IMAP Remote Format String Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17034">courierimap-authdebug-format-string(17034)</ref>
    </refs>
    <vuln_soft>
      <prod name="courier-imap" vendor="inter7">
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="2.0.0"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0778" seq="2004-0778" published="2004-10-20" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">CVS 1.11.x before 1.11.17, and 1.12.x before 1.12.9, allows remote attackers to determine the existence of arbitrary files and directories via the -X command for an alternate history file, which causes different error messages to be returned.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=130&amp;type=vulnerabilities" adv="1">20040816 CVS Undocumented Flag Information Disclosure Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/579225" adv="1" patch="1">VU#579225</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:108">MDKSA-2004:108</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10955" adv="1" patch="1">10955</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17001">cvs-history-info-disclosure(17001)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10688">oval:org.mitre.oval:def:10688</ref>
    </refs>
    <vuln_soft>
      <prod name="cvs" vendor="cvs">
        <vers num="1.10.6"/>
        <vers num="1.10.7"/>
        <vers num="1.10.8"/>
        <vers num="1.11"/>
        <vers num="1.11.1"/>
        <vers num="1.11.1_p1"/>
        <vers num="1.11.2"/>
        <vers num="1.11.3"/>
        <vers num="1.11.4"/>
        <vers num="1.11.5"/>
        <vers num="1.11.6"/>
        <vers num="1.11.10"/>
        <vers num="1.11.11"/>
        <vers num="1.11.14"/>
        <vers num="1.11.15"/>
        <vers num="1.11.16"/>
        <vers num="1.12.1"/>
        <vers num="1.12.2"/>
        <vers num="1.12.5"/>
        <vers num="1.12.7"/>
        <vers num="1.12.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0779" seq="2004-0779" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The (1) Mozilla 1.6, (2) Firebird 0.7 and (3) Firefox 0.8 web browsers do not properly verify that cached passwords for SSL encrypted sites are only sent via SSL encrypted sessions to the site, which allows a remote attacker to cause a cached password to be sent in cleartext to a spoofed site.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=226278">http://bugzilla.mozilla.org/show_bug.cgi?id=226278</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:082">MDKSA-2004:082</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17018">mozilla-plaintext-password(17018)</ref>
    </refs>
    <vuln_soft>
      <prod name="firebird" vendor="firebirdsql">
        <vers num="0.7"/>
      </prod>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.8"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0780" seq="2004-0780" published="2004-12-31" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in uustat in Sun Solaris 8 and 9 allows local users to execute arbitrary code via a long -S command line argument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1015455">1015455</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101933-1" adv="1" patch="1">101933</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2006-056.htm">http://support.avaya.com/elmodocs2/security/ASA-2006-056.htm</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/intelligence/vulnerabilities/display.php?id=366" adv="1">20060110 Sun Solaris uustat Buffer Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/16193" patch="1">16193</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/0113">ADV-2006-0113</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/24045">solaris-uustat-bo(24045)</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0781" seq="2004-0781" published="2004-10-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in list.cgi in the Icecast internal web server (icecast-server) 1.3.12 and earlier allows remote attackers to inject arbitrary web script via the UserAgent parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-541" adv="1" patch="1">DSA-541</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11021" adv="1" patch="1">11021</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17086">icecast-list-useragent-xss(17086)</ref>
    </refs>
    <vuln_soft>
      <prod name="icecast" vendor="icecast">
        <vers num="1.3.0"/>
        <vers num="1.3.5"/>
        <vers num="1.3.5.1"/>
        <vers num="1.3.7"/>
        <vers num="1.3.7.1"/>
        <vers num="1.3.8"/>
        <vers num="1.3.9"/>
        <vers num="1.3.9.1"/>
        <vers num="1.3.9.2"/>
        <vers num="1.3.10"/>
        <vers num="1.3.10.1"/>
        <vers num="1.3.11"/>
        <vers num="1.3.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0782" seq="2004-0782" published="2004-10-20" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow.  NOTE: this identifier is ONLY for gtk+.  It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000875">CLA-2004:875</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109528994916275&amp;w=2">20040915 CESA-2004-005: gtk+ XPM decoder</ref>
      <ref source="MISC" url="http://scary.beasts.org/security/CESA-2004-005.txt">http://scary.beasts.org/security/CESA-2004-005.txt</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1">101776</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-546">DSA-546</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/729894">VU#729894</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095">MDKSA-2004:095</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:214">MDKSA-2005:214</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-447.html" adv="1" patch="1">RHSA-2004:447</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-466.html" adv="1" patch="1">RHSA-2004:466</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/419771/100/0/threaded">FLSA-2005:155510</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11195">11195</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2005">FLSA:2005</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17386">gtk-xpm-pixbufcreatefromxpm-bo(17386)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11539">oval:org.mitre.oval:def:11539</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1617">oval:org.mitre.oval:def:1617</ref>
    </refs>
    <vuln_soft>
      <prod name="gdkpixbuf" vendor="gnome">
        <vers num="0.17"/>
        <vers num="0.18"/>
        <vers num="0.20"/>
        <vers num="0.22"/>
      </prod>
      <prod name="gtk+" vendor="gtk">
        <vers num="2.0.2"/>
        <vers num="2.0.6"/>
        <vers num="2.2.1"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0783" seq="2004-0783" published="2004-10-20" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, may allow remote attackers to execute arbitrary code via a certain color string.  NOTE: this identifier is ONLY for gtk+.  It was incorrectly referenced in an advisory for a different issue (CVE-2004-0688).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000875">CLA-2004:875</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109528994916275&amp;w=2">20040915 CESA-2004-005: gtk+ XPM decoder</ref>
      <ref source="MISC" url="http://scary.beasts.org/security/CESA-2004-005.txt">http://scary.beasts.org/security/CESA-2004-005.txt</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101776-1">101776</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/369358">VU#369358</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095">MDKSA-2004:095</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096">MDKSA-2004:096</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:214">MDKSA-2005:214</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-447.html" adv="1" patch="1">RHSA-2004:447</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-466.html" adv="1" patch="1">RHSA-2004:466</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/419771/100/0/threaded">FLSA-2005:155510</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11195">11195</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2005">FLSA:2005</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17385">gtk-xpm-xpmextractcolor-bo(17385)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1786">oval:org.mitre.oval:def:1786</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9348">oval:org.mitre.oval:def:9348</ref>
    </refs>
    <vuln_soft>
      <prod name="gdkpixbuf" vendor="gnome">
        <vers num="0.17"/>
        <vers num="0.18"/>
        <vers num="0.20"/>
        <vers num="0.22"/>
      </prod>
      <prod name="gtk+" vendor="gtk">
        <vers num="2.0.2"/>
        <vers num="2.0.6"/>
        <vers num="2.2.1"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0784" seq="2004-0784" published="2004-10-20" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The smiley theme functionality in Gaim before 0.82 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename of the tar file that is dragged to the smiley selector.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gaim.sourceforge.net/security/?id=1" adv="1" patch="1">http://gaim.sourceforge.net/security/?id=1</ref>
      <ref source="FEDORA" url="http://www.fedoranews.org/updates/FEDORA-2004-278.shtml" adv="1" patch="1">FEDORA-2004-278</ref>
      <ref source="FEDORA" url="http://www.fedoranews.org/updates/FEDORA-2004-279.shtml" adv="1" patch="1">FEDORA-2004-279</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-27.xml" adv="1">GLSA-200408-27</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-400.html">RHSA-2004:400</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17144">gaim-smiley-command-execution(17144)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10008">oval:org.mitre.oval:def:10008</ref>
    </refs>
    <vuln_soft>
      <prod name="gaim" vendor="rob_flynn">
        <vers num="0.10"/>
        <vers num="0.10.3"/>
        <vers num="0.50"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.55"/>
        <vers num="0.56"/>
        <vers num="0.57"/>
        <vers num="0.58"/>
        <vers num="0.59"/>
        <vers num="0.59.1"/>
        <vers num="0.60"/>
        <vers num="0.61"/>
        <vers num="0.62"/>
        <vers num="0.63"/>
        <vers num="0.64"/>
        <vers num="0.65"/>
        <vers num="0.66"/>
        <vers num="0.67"/>
        <vers num="0.68"/>
        <vers num="0.69"/>
        <vers num="0.70"/>
        <vers num="0.71"/>
        <vers num="0.72"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.75"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0785" seq="2004-0785" published="2004-10-20" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Gaim before 0.82 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Rich Text Format (RTF) messages, (2) a long hostname for the local system as obtained from DNS, or (3) a long URL that is not properly handled by the URL decoder.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gaim.sourceforge.net/security/?id=3" adv="1" patch="1">http://gaim.sourceforge.net/security/?id=3</ref>
      <ref source="CONFIRM" url="http://gaim.sourceforge.net/security/?id=4">http://gaim.sourceforge.net/security/?id=4</ref>
      <ref source="CONFIRM" url="http://gaim.sourceforge.net/security/?id=5">http://gaim.sourceforge.net/security/?id=5</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011083">1011083</ref>
      <ref source="FEDORA" url="http://www.fedoranews.org/updates/FEDORA-2004-278.shtml" adv="1" patch="1">FEDORA-2004-278</ref>
      <ref source="FEDORA" url="http://www.fedoranews.org/updates/FEDORA-2004-279.shtml" adv="1" patch="1">FEDORA-2004-279</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-27.xml" adv="1">GLSA-200408-27</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-400.html">RHSA-2004:400</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11056">11056</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17141">gaim-rtf-bo(17141)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17142">gaim-hostname-bo(17142)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17143">gaim-url-bo(17143)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10907">oval:org.mitre.oval:def:10907</ref>
    </refs>
    <vuln_soft>
      <prod name="gaim" vendor="rob_flynn">
        <vers num="0.10"/>
        <vers num="0.10.3"/>
        <vers num="0.50"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.55"/>
        <vers num="0.56"/>
        <vers num="0.57"/>
        <vers num="0.58"/>
        <vers num="0.59"/>
        <vers num="0.59.1"/>
        <vers num="0.60"/>
        <vers num="0.61"/>
        <vers num="0.62"/>
        <vers num="0.63"/>
        <vers num="0.64"/>
        <vers num="0.65"/>
        <vers num="0.66"/>
        <vers num="0.67"/>
        <vers num="0.68"/>
        <vers num="0.69"/>
        <vers num="0.70"/>
        <vers num="0.71"/>
        <vers num="0.72"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.75"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0786" seq="2004-0786" published="2004-10-20" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml">GLSA-200409-21</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096">MDKSA-2004:096</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_32_apache2.html">SUSE-SA:2004:032</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-463.html" adv="1" patch="1">RHSA-2004:463</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0047/">2004-0047</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17382">apache-ipv6-aprutil-dos(17382)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11380">oval:org.mitre.oval:def:11380</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0"/>
        <vers num="2.0.28"/>
        <vers num="2.0.32"/>
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.0.40"/>
        <vers num="2.0.41"/>
        <vers num="2.0.42"/>
        <vers num="2.0.43"/>
        <vers num="2.0.44"/>
        <vers num="2.0.45"/>
        <vers num="2.0.46"/>
        <vers num="2.0.47"/>
        <vers num="2.0.48"/>
        <vers num="2.0.49"/>
        <vers num="2.0.50"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0787" seq="2004-0787" published="2004-10-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the web frontend in OpenCA 0.9.1-8 and earlier, and 0.9.2 RC6 and earlier, allows remote attackers to inject arbitrary web script or HTML via the form input fields.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109448767123954&amp;w=2">20040906 OpenCA Security Advisory: Cross Site Scripting vulnerability</ref>
      <ref source="CONFIRM" url="http://www.openca.org/news/CAN-2004-0787.txt" adv="1" patch="1">http://www.openca.org/news/CAN-2004-0787.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11113" adv="1" patch="1">11113</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17274">openca-frontend-xss(17274)</ref>
    </refs>
    <vuln_soft>
      <prod name="openca" vendor="openca">
        <vers num="0.8.0"/>
        <vers num="0.8.1"/>
        <vers num="0.8.6"/>
        <vers num="0.9.0"/>
        <vers num="0.9.0.1"/>
        <vers num="0.9.0.2"/>
        <vers num="0.9.1"/>
        <vers num="0.9.1.2"/>
        <vers num="0.9.1.3"/>
        <vers num="0.9.1.4"/>
        <vers num="0.9.1.5"/>
        <vers num="0.9.1.6"/>
        <vers num="0.9.1.7"/>
        <vers num="0.9.1.8"/>
        <vers num="0.9.2_rc6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0788" seq="2004-0788" published="2004-10-20" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the ICO image decoder for (1) gdk-pixbuf before 0.22 and (2) gtk2 before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted ICO file.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000875">CLA-2004:875</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-546">DSA-546</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/577654">VU#577654</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:095">MDKSA-2004:095</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:214">MDKSA-2005:214</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-447.html" adv="1" patch="1">RHSA-2004:447</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-466.html" adv="1" patch="1">RHSA-2004:466</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/419771/100/0/threaded">FLSA-2005:155510</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11195">11195</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2005">FLSA:2005</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17387">gtk-ico-integer-bo(17387)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10506">oval:org.mitre.oval:def:10506</ref>
    </refs>
    <vuln_soft>
      <prod name="gdkpixbuf" vendor="gnome">
        <vers num="0.17"/>
        <vers num="0.18"/>
        <vers num="0.20"/>
        <vers num="0.22"/>
      </prod>
      <prod name="gtk+" vendor="gtk">
        <vers num="2.0.2"/>
        <vers num="2.0.6"/>
        <vers num="2.2.1"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0789" seq="2004-0789" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men &amp; Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012157" patch="1">1012157</ref>
      <ref source="MISC" url="http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" adv="1">http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en</ref>
      <ref source="MISC" url="http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" adv="1">http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf</ref>
      <ref source="CONFIRM" url="http://www.posadis.org/advisories/pos_adv_006.txt" adv="1" patch="1">http://www.posadis.org/advisories/pos_adv_006.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11642" patch="1">11642</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17997">dns-localhost-dos(17997)</ref>
    </refs>
    <vuln_soft>
      <prod name="delegate" vendor="delegate">
        <vers num="7.7.0"/>
        <vers num="7.7.1"/>
        <vers num="7.8.0"/>
        <vers num="7.8.1"/>
        <vers num="7.8.2"/>
        <vers num="7.9.11"/>
        <vers num="8.3.3"/>
        <vers num="8.3.4"/>
        <vers num="8.4.0"/>
        <vers num="8.5.0"/>
        <vers num="8.9"/>
        <vers num="8.9.1"/>
        <vers num="8.9.2"/>
        <vers num="8.9.3"/>
        <vers num="8.9.4"/>
        <vers num="8.9.5"/>
      </prod>
      <prod name="dnrd" vendor="dnrd">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="2.5"/>
        <vers num="2.6"/>
        <vers num="2.7"/>
        <vers num="2.8"/>
        <vers num="2.9"/>
        <vers num="2.10"/>
      </prod>
      <prod name="mydns" vendor="don_moore">
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="0.10.0"/>
      </prod>
      <prod name="maradns" vendor="maradns">
        <vers num="0.5.28"/>
        <vers num="0.5.29"/>
        <vers num="0.5.30"/>
        <vers num="0.5.31"/>
        <vers num="0.8.05"/>
      </prod>
      <prod name="pliant_dns_server" vendor="pliant">
        <vers num=""/>
      </prod>
      <prod name="posadis" vendor="posadis">
        <vers num="0.50.4"/>
        <vers num="0.50.5"/>
        <vers num="0.50.6"/>
        <vers num="0.50.7"/>
        <vers num="0.50.8"/>
        <vers num="0.50.9"/>
        <vers num="0.60.0"/>
        <vers num="0.60.1"/>
        <vers num="m5pre1"/>
        <vers num="m5pre2"/>
      </prod>
      <prod name="wingate" vendor="qbik">
        <vers num="3.0"/>
        <vers num="4.0.1"/>
        <vers num="4.1_beta_a"/>
        <vers num="6.0"/>
        <vers num="6.0.1_build_993"/>
        <vers num="6.0.1_build_995"/>
      </prod>
      <prod name="raidendnsd" vendor="team_johnlong">
        <vers num=""/>
      </prod>
      <prod name="2100_network_camera" vendor="axis">
        <vers num="2.0"/>
        <vers num="2.01"/>
        <vers num="2.02"/>
        <vers num="2.03"/>
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2110_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2120_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2400_video_server" vendor="axis">
        <vers num="3.11"/>
        <vers num="3.12"/>
      </prod>
      <prod name="2401_video_server" vendor="axis">
        <vers num="3.12"/>
      </prod>
      <prod name="2420_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2460_network_dvr" vendor="axis">
        <vers num="3.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0790" seq="2004-0790" published="2005-04-12" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack."  NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability.  While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt">SCOSA-2006.4</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=112861397904255&amp;w=2">SSRT4743</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/19">19</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/57">57</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1">101658</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1" adv="1">57746</ref>
      <ref source="MISC" url="http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html">http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/418882/100/0/threaded">HPSBUX01164</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/449179/100/0/threaded">SSRT061264</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/13124">13124</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en" adv="1">http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/3983">ADV-2006-3983</ref>
      <ref source="MISC" url="http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt">http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019">MS05-019</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064">MS06-064</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1177">oval:org.mitre.oval:def:1177</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A176">oval:org.mitre.oval:def:176</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1910">oval:org.mitre.oval:def:1910</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A211">oval:org.mitre.oval:def:211</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3458">oval:org.mitre.oval:def:3458</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A412">oval:org.mitre.oval:def:412</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4804">oval:org.mitre.oval:def:4804</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A514">oval:org.mitre.oval:def:514</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A53">oval:org.mitre.oval:def:53</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A622">oval:org.mitre.oval:def:622</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4::fr"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_98" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
      <prod name="windows_98se" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_me" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:tablet_pc"/>
        <vers num="" edition="sp2:tablet_pc"/>
      </prod>
      <prod name="solaris" vendor="sun">
        <vers num="9.0" edition=":sparc"/>
        <vers num="10.0" edition=":sparc"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.7"/>
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0791" seq="2004-0791" published="2005-04-12" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack."  NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability.  While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt">SCOSA-2006.4</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=112861397904255&amp;w=2">SSRT4743</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/19">19</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/57">57</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1">101658</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1" adv="1">57746</ref>
      <ref source="MISC" url="http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html">http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-016.html">RHSA-2005:016</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-017.html">RHSA-2005:017</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-043.html">RHSA-2005:043</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/418882/100/0/threaded">HPSBUX01164</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/428028/100/0/threaded">FLSA:157459-1</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/428058/100/0/threaded">FLSA:157459-2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/13124">13124</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en" adv="1">http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en</ref>
      <ref source="MISC" url="http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt">http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10228">oval:org.mitre.oval:def:10228</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1112">oval:org.mitre.oval:def:1112</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A184">oval:org.mitre.oval:def:184</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A464">oval:org.mitre.oval:def:464</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A596">oval:org.mitre.oval:def:596</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A688">oval:org.mitre.oval:def:688</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A726">oval:org.mitre.oval:def:726</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="9.0" edition=":sparc"/>
        <vers num="10.0" edition=":sparc"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.7"/>
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0792" seq="2004-0792" published="2004-10-20" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the sanitize_path function in util.c for rsync 2.6.2 and earlier, when chroot is disabled, allows attackers to read or write certain files.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109268147522290&amp;w=2">20040816 TSSA-2004-020-ES - rsync</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109277141223839&amp;w=2">20040817 LNSA-#2004-0017: rsync (Aug, 17 2004)</ref>
      <ref source="CONFIRM" url="http://samba.org/rsync/#security_aug04">http://samba.org/rsync/#security_aug04</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-538" adv="1" patch="1">DSA-538</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-17.xml" adv="1" patch="1">GLSA-200408-17</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:083">MDKSA-2004:083</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_26_rsync.html">SUSE-SA:2004:026</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0042/">2004-0042</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10561">oval:org.mitre.oval:def:10561</ref>
    </refs>
    <vuln_soft>
      <prod name="rsync" vendor="andrew_tridgell">
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.3.2_1.2" edition=":alpha"/>
        <vers num="2.3.2_1.2" edition=":arm"/>
        <vers num="2.3.2_1.2" edition=":intel"/>
        <vers num="2.3.2_1.2" edition=":m68k"/>
        <vers num="2.3.2_1.2" edition=":ppc"/>
        <vers num="2.3.2_1.2" edition=":sparc"/>
        <vers num="2.3.2_1.3"/>
        <vers num="2.4.0"/>
        <vers num="2.4.1"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.8"/>
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.6"/>
        <vers num="2.5.7"/>
        <vers num="2.6"/>
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0793" seq="2004-0793" published="2004-10-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The calendar program in bsdmainutils 6.0 through 6.0.14 does not drop root privileges when executed with the -a flag, which allows attackers to execute arbitrary commands via a calendar event file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109396230317359&amp;w=2">20040830 Possible root compromose with bsdmainutils 6.0.x &lt; 6.0.15 (Debian testing/unstable)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11077" adv="1" patch="1">11077</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17162">bsdmainutils-calendar-gain-privileges(17162)</ref>
    </refs>
    <vuln_soft>
      <prod name="bsdmainutils" vendor="debian">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="6.0.7"/>
        <vers num="6.0.8"/>
        <vers num="6.0.9"/>
        <vers num="6.0.10"/>
        <vers num="6.0.11"/>
        <vers num="6.0.12"/>
        <vers num="6.0.13"/>
        <vers num="6.0.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0794" seq="2004-0794" published="2004-10-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple signal handler race conditions in lukemftpd (aka tnftpd before 20040810) allow remote authenticated attackers to cause a denial of service or execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="NETBSD" url="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-009.txt.asc" adv="1" patch="1">NetBSD-SA2004-009</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/025418.html">20040817 Multiple remote vulnerabilities in lukemftpd aka. tnftpd</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-551">DSA-551</ref>
      <ref source="CONFIRM" url="http://www.vuxml.org/freebsd/c4b025bb-f05d-11d8-9837-000c41e2cdad.html" adv="1">http://www.vuxml.org/freebsd/c4b025bb-f05d-11d8-9837-000c41e2cdad.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17020">tnftpd-gain-access(17020)</ref>
    </refs>
    <vuln_soft>
      <prod name="lukemftp" vendor="luke_mewburn">
        <vers num="1.1"/>
        <vers num="1.5"/>
      </prod>
      <prod name="tnftpd" vendor="luke_mewburn">
        <vers num="2003-12-17"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0795" seq="2004-0795" published="2004-10-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">DB2 8.1 remote command server (DB2RCMD.EXE) executes the db2rcmdc.exe program as the db2admin administrator, which allows local users to gain privileges via the DB2REMOTECMD named pipe.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107885081414173&amp;w=2">20040309 IBM DB2 Remote Command Execution Privilege Upgrade (#NISR09032004)</ref>
      <ref source="MISC" url="http://www.nextgenss.com/advisories/db2rmtcmd.txt">http://www.nextgenss.com/advisories/db2rmtcmd.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9821" adv="1" patch="1">9821</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IY53894" adv="1">IY53894</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15420">db2-rcs-gain-privileges(15420)</ref>
    </refs>
    <vuln_soft>
      <prod name="db2_universal_database" vendor="ibm">
        <vers num="8.1" edition=":aix"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0796" seq="2004-0796" published="2004-10-20" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">SpamAssassin 2.5x, and 2.6x before 2.64, allows remote attackers to cause a denial of service via certain malformed messages.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=129337">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=129337</ref>
      <ref source="MLIST" url="http://marc.info/?l=spamassassin-announce&amp;m=109168121628767&amp;w=2">[spamassassin-announce] 20040805 [SA-Announce] SpamAssassin 2.64 is released!</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-06.xml">GLSA-200408-06</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:084">MDKSA-2004:084</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10957" adv="1" patch="1">10957</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2268">FLSA:2268</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16938">spamassassin-dos(16938)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10413">oval:org.mitre.oval:def:10413</ref>
    </refs>
    <vuln_soft>
      <prod name="spamassassin" vendor="spamassassin">
        <vers num="2.40"/>
        <vers num="2.41"/>
        <vers num="2.42"/>
        <vers num="2.43"/>
        <vers num="2.44"/>
        <vers num="2.50"/>
        <vers num="2.55"/>
        <vers num="2.60"/>
        <vers num="2.63"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0797" seq="2004-0797" published="2004-10-20" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The error handling in the (1) inflate and (2) inflateBack functions in ZLib compression library 1.2.x allows local users to cause a denial of service (application crash).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt">SCOSA-2006.6</ref>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.17/SCOSA-2004.17.txt">SCOSA-2004.17</ref>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=252253">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=252253</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000865">CLA-2004:865</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000878">CLA-2004:878</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109353792914900&amp;w=2">20040825 [OpenPKG-SA-2004.038] OpenPKG Security Advisory (zlib)</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-26.xml">GLSA-200408-26</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011085">1011085</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/238678">VU#238678</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:090">MDKSA-2004:090</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_29_zlib.html">SUSE-SA:2004:029</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11051">11051</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.319160">SSA:2004-278</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2043">FLSA:2043</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17119">zlib-inflate-inflateback-dos(17119)</ref>
    </refs>
    <vuln_soft>
      <prod name="zlib" vendor="gnu">
        <vers num="1.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0798" seq="2004-0798" published="2004-10-20" modified="2017-10-04" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the _maincfgret.cgi script for Ipswitch WhatsUp Gold before 8.03 Hotfix 1 allows remote attackers to execute arbitrary code via a long instancename parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?type=vulnerabilities">20040825 Ipswitch WhatsUp Gold Remote Buffer Overflow Vulnerability</ref>
      <ref source="MISC" url="http://www.ipswitch.com/Support/WhatsUp/patch-upgrades.html">http://www.ipswitch.com/Support/WhatsUp/patch-upgrades.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11043">11043</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17111">whatsup-maincfgret-bo(17111)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/566/">566</ref>
    </refs>
    <vuln_soft>
      <prod name="whatsup_gold" vendor="ipswitch">
        <vers num="7.0"/>
        <vers num="7.03"/>
        <vers num="7.04"/>
        <vers num="8.0"/>
        <vers num="8.01"/>
        <vers num="8.03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0799" seq="2004-0799" published="2004-10-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The HTTP daemon in Ipswitch WhatsUp Gold 8.03 and 8.03 Hotfix 1 allows remote attackers to cause a denial of service (server crash) via a GET request containing an MS-DOS device name, as demonstrated using "prn.htm".</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=142&amp;type=vulnerabilities" adv="1" patch="1">20040916 Ipswitch WhatsUp Gold Remote Denial of Service Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.ipswitch.com/Support/WhatsUp/patch-upgrades.html" patch="1">http://www.ipswitch.com/Support/WhatsUp/patch-upgrades.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17418">whatsup-get-prn-dos(17418)</ref>
    </refs>
    <vuln_soft>
      <prod name="whatsup_gold" vendor="ipswitch">
        <vers num="7.0"/>
        <vers num="7.03"/>
        <vers num="7.04"/>
        <vers num="8.0"/>
        <vers num="8.01"/>
        <vers num="8.03"/>
        <vers num="8.03_hotfix_1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0800" seq="2004-0800" published="2004-08-24" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in CDE Mailer (dtmail) on Solaris 8 and 9 allows local users to gain privileges via format strings in the argv[0] value.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-202.shtml">O-202</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=132&amp;type=vulnerabilities" adv="1" patch="1">20040824 CDE Mailer argv[0] Format String Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/928598" adv="1" patch="1">VU#928598</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11027">11027</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17095">dtmail-argv-format-string(17095)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4030">oval:org.mitre.oval:def:4030</ref>
    </refs>
    <vuln_soft>
      <prod name="call_management_system_server" vendor="avaya">
        <vers num="9.0"/>
        <vers num="11.0"/>
        <vers num="12.0"/>
      </prod>
      <prod name="dtmail" vendor="sun">
        <vers num=""/>
      </prod>
      <prod name="solaris" vendor="sun">
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0801" seq="2004-0801" published="2004-09-16" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in foomatic-rip in Foomatic before 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.12/SCOSA-2005.12.txt" adv="1" patch="1">SCOSA-2005.12</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000880" adv="1">CLA-2004:880</ref>
      <ref source="SUSE" url="http://lists.suse.com/archive/suse-security-announce/2006-May/0007.html">SUSE-SA:2006:026</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201005-1">201005</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000757.1-1">1000757</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_31_cups.html" adv="1" patch="1">SUSE-SA:2004:031</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11184">11184</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0047/" adv="1" patch="1">2004-0047</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17388">foomatic-command-execution(17388)</ref>
    </refs>
    <vuln_soft>
      <prod name="foomatic-filters" vendor="linuxprinting.org">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.1"/>
      </prod>
      <prod name="java_desktop_system" vendor="sun">
        <vers num="2.0"/>
        <vers num="2003"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0802" seq="2004-0802" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&amp;view=markup">http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&amp;view=markup</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000870" patch="1">CLA-2004:870</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1">201611</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml" adv="1" patch="1">GLSA-200409-12</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11084" patch="1">11084</ref>
      <ref source="CONFIRM" url="http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html" adv="1">http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17183">imlib2-bmp-bo(17183)</ref>
    </refs>
    <vuln_soft>
      <prod name="imlib" vendor="enlightenment">
        <vers num="1.9"/>
        <vers num="1.9.1"/>
        <vers num="1.9.2"/>
        <vers num="1.9.3"/>
        <vers num="1.9.4"/>
        <vers num="1.9.5"/>
        <vers num="1.9.6"/>
        <vers num="1.9.7"/>
        <vers num="1.9.8"/>
        <vers num="1.9.9"/>
        <vers num="1.9.10"/>
        <vers num="1.9.11"/>
        <vers num="1.9.12"/>
        <vers num="1.9.13"/>
        <vers num="1.9.14"/>
      </prod>
      <prod name="imlib2" vendor="enlightenment">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
      </prod>
      <prod name="imagemagick" vendor="imagemagick">
        <vers num="5.3.3"/>
        <vers num="5.4.3"/>
        <vers num="5.4.4.5"/>
        <vers num="5.4.7"/>
        <vers num="5.4.8"/>
        <vers num="5.4.8.2.1.1.0"/>
        <vers num="5.5.3.2.1.2.0"/>
        <vers num="5.5.6.0_2003-04-09"/>
        <vers num="5.5.7"/>
        <vers num="6.0.2"/>
      </prod>
      <prod name="java_desktop_system" vendor="sun">
        <vers num="2.0"/>
        <vers num="2003"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="turbolinux_desktop" vendor="turbolinux">
        <vers num="10.0"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="turbolinux_workstation" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0803" seq="2004-0803" published="2004-12-23" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/index.php?id=a&amp;anuncio=000888">CLA-2004:888</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109778785107450&amp;w=2">20041013 CESA-2004-006: libtiff</ref>
      <ref source="MISC" url="http://scary.beasts.org/security/CESA-2004-006.txt">http://scary.beasts.org/security/CESA-2004-006.txt</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1">101677</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1">201072</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-567" adv="1" patch="1">DSA-567</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-11.xml">GLSA-200410-11</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/948752" adv="1">VU#948752</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20041209-2.txt">http://www.kde.org/info/security/advisory-20041209-2.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:109">MDKSA-2004:109</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:052">MDKSA-2005:052</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_38_libtiff.html">SUSE-SA:2004:038</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-577.html" adv="1" patch="1">RHSA-2004:577</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-021.html">RHSA-2005:021</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-354.html">RHSA-2005:354</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11406">11406</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17703">libtiff-library-decoding-bo(17703)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100114">oval:org.mitre.oval:def:100114</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8896">oval:org.mitre.oval:def:8896</ref>
    </refs>
    <vuln_soft>
      <prod name="libtiff" vendor="libtiff">
        <vers num="3.4"/>
        <vers num="3.5.1"/>
        <vers num="3.5.2"/>
        <vers num="3.5.3"/>
        <vers num="3.5.4"/>
        <vers num="3.5.5"/>
        <vers num="3.5.7"/>
        <vers num="3.6.0"/>
        <vers num="3.6.1"/>
      </prod>
      <prod name="pdf_library" vendor="pdflib">
        <vers num="5.0.2"/>
      </prod>
      <prod name="wxgtk2" vendor="wxgtk2">
        <vers num="2.5_.0"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
      <prod name="kde" vendor="kde">
        <vers num="3.2"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2"/>
        <vers num="3.2.3"/>
        <vers num="3.3"/>
        <vers num="3.3.1"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.1"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0804" seq="2004-0804" published="2004-11-03" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Vulnerability in tif_dirread.c for libtiff allows remote attackers to cause a denial of service (application crash) via a TIFF image that causes a divide-by-zero error when the number of row bytes is zero, a different vulnerability than CVE-2005-2452.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugzilla.remotesensing.org/show_bug.cgi?id=111">http://bugzilla.remotesensing.org/show_bug.cgi?id=111</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/index.php?id=a&amp;anuncio=000888">CLA-2004:888</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1">101677</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1">201072</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-567" adv="1">DSA-567</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/555304">VU#555304</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20041209-2.txt">http://www.kde.org/info/security/advisory-20041209-2.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:109">MDKSA-2004:109</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:052">MDKSA-2005:052</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_38_libtiff.html">SUSE-SA:2004:038</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-577.html" adv="1" patch="1">RHSA-2004:577</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-021.html">RHSA-2005:021</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-354.html">RHSA-2005:354</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17755">libtiff-dos(17755)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100115">oval:org.mitre.oval:def:100115</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11711">oval:org.mitre.oval:def:11711</ref>
    </refs>
    <vuln_soft>
      <prod name="libtiff" vendor="libtiff">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0805" seq="2004-0805" published="2004-12-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in layer2.c in mpg123 0.59r and possibly mpg123 0.59s allows remote attackers to execute arbitrary code via a certain (1) mp3 or (2) mp2 file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026151.html">20040907 mpg123 buffer overflow vulnerability</ref>
      <ref source="MISC" url="http://www.alighieri.org/advisories/advisory-mpg123.txt">http://www.alighieri.org/advisories/advisory-mpg123.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-564" adv="1" patch="1">DSA-564</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-20.xml">GLSA-200409-20</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:100">MDKSA-2004:100</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/374433">20040916 mpg123 buffer overflow vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11121">11121</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17287">mpg123-layer2c-bo(17287)</ref>
    </refs>
    <vuln_soft>
      <prod name="mpg123" vendor="mpg123">
        <vers num="0.59r"/>
        <vers num="0.59s"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0806" seq="2004-0806" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">cdrecord in the cdrtools package before 2.01, when installed setuid root, does not properly drop privileges before executing a program specified in the RSH environment variable, which allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U">20060401-01-U</ref>
      <ref source="BUGTRAQ" url="http://seclists.org/lists/bugtraq/2004/Sep/0097.html">20040909 Bugtraq: cdrecord local root exploit</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011091">1011091</ref>
      <ref source="BUGTRAQ" url="http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2004-09/0108.html">20040910 CAU-EX-2004-0002: cdrecord-suidshell.sh</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/700326" adv="1">VU#700326</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:091">MDKSA-2004:091</ref>
      <ref source="BID" url="http://www.securityfocus.org/bid/11075" patch="1">11075</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2058">FLSA:2058</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17303">cdrecord-rsh-gain-privileges(17303)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9805">oval:org.mitre.oval:def:9805</ref>
    </refs>
    <vuln_soft>
      <prod name="cdrecord" vendor="cdrtools">
        <vers num="1.11"/>
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0807" seq="2004-0807" published="2004-09-13" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000873" adv="1" patch="1">CLA-2004:873</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109509335230495&amp;w=2">20040913 Samba 3.0 DoS Vulberabilities (CAN-2004-0807 &amp; CAN-2004-0808)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109526231623307&amp;w=2">20040915 [OpenPKG-SA-2004.040] OpenPKG Security Advisory (samba)</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml" adv="1" patch="1">GLSA-200409-16</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=139&amp;type=vulnerabilities" adv="1" patch="1">20040913 Samba 3.x SMBD Remote Denial of Service Vulnerability</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-467.html" adv="1" patch="1">RHSA-2004:467</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0046/" adv="1" patch="1">2004-0046</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11141">oval:org.mitre.oval:def:11141</ref>
    </refs>
    <vuln_soft>
      <prod name="samba" vendor="samba">
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.2a"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4" edition="rc1"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
      </prod>
      <prod name="samba" vendor="sgi">
        <vers num="3.0" edition=":irix"/>
        <vers num="3.0.1" edition=":irix"/>
        <vers num="3.0.2" edition=":irix"/>
        <vers num="3.0.3" edition=":irix"/>
        <vers num="3.0.4" edition=":irix"/>
        <vers num="3.0.5" edition=":irix"/>
        <vers num="3.0.6" edition=":irix"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0808" seq="2004-0808" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000873" patch="1">CLA-2004:873</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109509335230495&amp;w=2">20040913 Samba 3.0 DoS Vulberabilities (CAN-2004-0807 &amp; CAN-2004-0808)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109526231623307&amp;w=2">20040915 [OpenPKG-SA-2004.040] OpenPKG Security Advisory (samba)</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml" adv="1" patch="1">GLSA-200409-16</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=138&amp;type=vulnerabilities" adv="1" patch="1">20040913 Samba nmbd Invalid Length Denial of Service Vulnerability</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-467.html" adv="1" patch="1">RHSA-2004:467</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0046/" adv="1" patch="1">2004-0046</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10344">oval:org.mitre.oval:def:10344</ref>
    </refs>
    <vuln_soft>
      <prod name="samba" vendor="samba">
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.2a"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4" edition="rc1"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0809" seq="2004-0809" published="2004-09-16" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/dav/fs/lock.c?r1=1.32&amp;r2=1.33">http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/dav/fs/lock.c?r1=1.32&amp;r2=1.33</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-558" adv="1" patch="1">DSA-558</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml" adv="1" patch="1">GLSA-200409-21</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-463.html" adv="1">RHSA-2004:463</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0047/" adv="1" patch="1">2004-0047</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17366">apache-moddav-lock-dos(17366)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9588">oval:org.mitre.oval:def:9588</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0.47"/>
        <vers num="2.0.50"/>
      </prod>
      <prod name="secure_web_server_for_tru64" vendor="hp">
        <vers num="4.0_f"/>
        <vers num="4.0_g"/>
        <vers num="5.0_a"/>
        <vers num="5.1"/>
        <vers num="5.1_a"/>
        <vers num="5.8.1"/>
        <vers num="5.8.2"/>
        <vers num="5.9.1"/>
        <vers num="5.9.2"/>
        <vers num="6.3.0"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.00"/>
        <vers num="11.11"/>
        <vers num="11.22"/>
        <vers num="11.23" edition=":ia64_64-bit"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
      <prod name="turbolinux_desktop" vendor="turbolinux">
        <vers num="10.0"/>
      </prod>
      <prod name="turbolinux_home" vendor="turbolinux">
        <vers num=""/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0810" seq="2004-0810" published="2004-12-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Netopia Timbuktu 7.0.3 allows remote attackers to cause a denial of service (server process crash) via a certain data string that is sent to multiple simultaneous client connections to TCP port 407.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://msgs.securepoint.com/cgi-bin/get/bugtraq0411/218.html" adv="1">20041119 Corsaire Security Advisory - Netopia Timbuktu remote buffer overflow issue</ref>
      <ref source="MISC" url="http://www.corsaire.com/advisories/c040720-001.txt">http://www.corsaire.com/advisories/c040720-001.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11714" adv="1">11714</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/vuls/2004/190204/index.htm">http://www.uniras.gov.uk/vuls/2004/190204/index.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18172">timbuktu-multiple-connections-dos(18172)</ref>
    </refs>
    <vuln_soft>
      <prod name="timbuktu_pro_mac" vendor="netopia">
        <vers num="6.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0811" seq="2004-0811" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Apache 2.0.51 prevents "the merging of the Satisfy directive," which could allow attackers to obtain access to restricted resources contrary to the specified authentication configuration.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FEDORA" url="http://fedoranews.org/updates/FEDORA-2004-313.shtml">FEDORA-2004-313</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-33.xml">GLSA-200409-33</ref>
      <ref source="CONFIRM" url="http://www.apache.org/dist/httpd/patches/apply_to_2.0.51/CAN-2004-0811.patch" patch="1">http://www.apache.org/dist/httpd/patches/apply_to_2.0.51/CAN-2004-0811.patch</ref>
      <ref source="CONFIRM" url="http://www.apacheweek.com/features/security-20">http://www.apacheweek.com/features/security-20</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11239">11239</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0049">2004-0049</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17473">apache-satisfy-gain-access(17473)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0.51"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0812" seq="2004-0812" published="2005-04-14" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the Linux kernel before 2.4.23, on the AMD AMD64 and Intel EM64T architectures, associated with "setting up TSS limits," allows local users to cause a denial of service (crash) and possibly execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://linux.bkbits.net:8080/linux-2.6/cset@3fad673ber4GuU7iWppydzNIyLntEQ">http://linux.bkbits.net:8080/linux-2.6/cset@3fad673ber4GuU7iWppydzNIyLntEQ</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-047.shtml" adv="1" patch="1">P-047</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-549.html" adv="1" patch="1">RHSA-2004:549</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11794" adv="1" patch="1">11794</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18346">linux-tss-gain-privilege(18346)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11375">oval:org.mitre.oval:def:11375</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0813" seq="2004-0813" published="2004-12-31" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in the SG_IO functionality in ide-cd allows local users to bypass read-only access and perform unauthorized write and erase operations.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc">20070602-01-P</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html">20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player</ref>
      <ref source="MISC" url="http://lkml.org/lkml/2004/7/30/147">http://lkml.org/lkml/2004/7/30/147</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200711-23.xml">GLSA-200711-23</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2007-0465.html">RHSA-2007:0465</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/25749">25749</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2007/3229">ADV-2007-3229</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17505">linux-sgio-gain-privileges(17505)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10011">oval:org.mitre.oval:def:10011</ref>
    </refs>
    <vuln_soft>
      <prod name="ide-cd" vendor="ide-cd">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0814" seq="2004-0814" published="2004-12-23" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="1.2" CVSS_base_score="1.2" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672</ref>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110306397320336&amp;w=2">20041214 [USN-38-1] Linux kernel vulnerabilities</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-293.html">RHSA-2005:293</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/379005">20041020 CAN-2004-0814: Linux terminal layer races</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11491" adv="1" patch="1">11491</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11492" adv="1" patch="1">11492</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17816">linux-tiocsetd-race-condition(17816)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728">oval:org.mitre.oval:def:10728</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
        <vers num="2.2.9"/>
        <vers num="2.2.10"/>
        <vers num="2.2.11"/>
        <vers num="2.2.12"/>
        <vers num="2.2.13"/>
        <vers num="2.2.14"/>
        <vers num="2.2.15" edition="pre16"/>
        <vers num="2.2.15_pre20"/>
        <vers num="2.2.16" edition="pre6"/>
        <vers num="2.2.17"/>
        <vers num="2.2.18"/>
        <vers num="2.2.19"/>
        <vers num="2.2.20"/>
        <vers num="2.2.21"/>
        <vers num="2.2.22"/>
        <vers num="2.2.23"/>
        <vers num="2.2.24"/>
        <vers num="2.2.25"/>
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0815" seq="2004-0815" published="2004-11-03" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000873" adv="1" patch="1">CLA-2004:873</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109655827913457&amp;w=2">20040930 Samba Security Announcement -- Potential Arbitrary File Access</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1">101584</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1">57664</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-200529-1">200529</ref>
      <ref source="CONFIRM" url="http://us4.samba.org/samba/news/#security_2.2.12">http://us4.samba.org/samba/news/#security_2.2.12</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-600" adv="1" patch="1">DSA-600</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=146&amp;type=vulnerabilities&amp;flashstatus=true" adv="1">20040930 Samba Arbitrary File Access Vulnerability</ref>
      <ref source="MANDRAKE" url="http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:104">MDKSA-2004:104</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_35_samba.html">SUSE-SA:2004:035</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-498.html">RHSA-2004:498</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/377618">20041005 ERRATA: Potential Arbitrary File Access (CAN-2004-0815)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11281" adv="1" patch="1">11281</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0051/">2004-0051</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2102">FLSA:2102</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17556">samba-file-access(17556)</ref>
    </refs>
    <vuln_soft>
      <prod name="samba" vendor="samba">
        <vers num="2.2.0"/>
        <vers num="2.2.0a"/>
        <vers num="2.2.1a"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.3a"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.7a"/>
        <vers num="2.2.8"/>
        <vers num="2.2.8a"/>
        <vers num="2.2.9"/>
        <vers num="2.2.11"/>
        <vers num="2.2a"/>
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.2a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0816" seq="2004-0816" published="2004-12-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer underflow in the firewall logging rules for iptables in Linux before 2.6.8 allows remote attackers to cause a denial of service (application crash) via a malformed IP packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_37_kernel.html">SUSE-SA:2004:037</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11488">11488</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17800">linux-ip-packet-dos(17800)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0817" seq="2004-0817" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000870" patch="1">CLA-2004:870</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1">201611</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-548" adv="1" patch="1">DSA-548</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml" adv="1" patch="1">GLSA-200409-12</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:089">MDKSA-2004:089</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-465.html" adv="1" patch="1">RHSA-2004:465</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11084" patch="1">11084</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17182">imlib-bmp-bo(17182)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843">oval:org.mitre.oval:def:8843</ref>
    </refs>
    <vuln_soft>
      <prod name="imlib" vendor="enlightenment">
        <vers num="1.9"/>
        <vers num="1.9.1"/>
        <vers num="1.9.2"/>
        <vers num="1.9.3"/>
        <vers num="1.9.4"/>
        <vers num="1.9.5"/>
        <vers num="1.9.6"/>
        <vers num="1.9.7"/>
        <vers num="1.9.8"/>
        <vers num="1.9.9"/>
        <vers num="1.9.10"/>
        <vers num="1.9.11"/>
        <vers num="1.9.12"/>
        <vers num="1.9.13"/>
        <vers num="1.9.14"/>
      </prod>
      <prod name="imlib2" vendor="enlightenment">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
      </prod>
      <prod name="imagemagick" vendor="imagemagick">
        <vers num="5.3.3"/>
        <vers num="5.4.3"/>
        <vers num="5.4.4.5"/>
        <vers num="5.4.7"/>
        <vers num="5.4.8"/>
        <vers num="5.4.8.2.1.1.0"/>
        <vers num="5.5.3.2.1.2.0"/>
        <vers num="5.5.6.0_2003-04-09"/>
        <vers num="5.5.7"/>
        <vers num="6.0.2"/>
      </prod>
      <prod name="java_desktop_system" vendor="sun">
        <vers num="2.0"/>
        <vers num="2003"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="turbolinux_desktop" vendor="turbolinux">
        <vers num="10.0"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="turbolinux_workstation" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0818" seq="2004-0818" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0819" seq="2004-0819" published="2004-08-25" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The bridge functionality in OpenBSD 3.4 and 3.5, when running a gateway configured as a bridging firewall with the link2 option for IPSec enabled, allows remote attackers to cause a denial of service (crash) via an ICMP echo (ping) packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109345131508824&amp;w=2">20040825 Vulnerability: OpenBSD 3.5 Kernel Panic.</ref>
      <ref source="OPENBSD" url="http://openbsd.org/errata34.html" adv="1" patch="1">20040826 028: RELIABILITY FIX: August 26, 2004</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17129">openbsd-icmp-echo-dos(17129)</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.4"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0820" seq="2004-0820" published="2004-08-28" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Winamp before 5.0.4 allows remote attackers to execute arbitrary script in the Local computer zone via script in HTML files that are referenced from XML files contained in a .wsz skin file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4338" adv="1" patch="1">ESB-2004.0537</ref>
      <ref source="MISC" url="http://www.frsirt.com/exploits/08252004.skinhead.php" adv="1" patch="1">http://www.frsirt.com/exploits/08252004.skinhead.php</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17124">winamp-wsz-execute-code(17124)</ref>
    </refs>
    <vuln_soft>
      <prod name="winamp" vendor="nullsoft">
        <vers num="2.4"/>
        <vers num="2.5e"/>
        <vers num="2.10"/>
        <vers num="2.24"/>
        <vers num="2.50"/>
        <vers num="2.60" edition=":full"/>
        <vers num="2.60" edition=":lite"/>
        <vers num="2.61" edition=":full"/>
        <vers num="2.62" edition=":standard"/>
        <vers num="2.64" edition=":standard"/>
        <vers num="2.65"/>
        <vers num="2.70" edition=":full"/>
        <vers num="2.71"/>
        <vers num="2.72"/>
        <vers num="2.73" edition=":full"/>
        <vers num="2.74"/>
        <vers num="2.75"/>
        <vers num="2.76"/>
        <vers num="2.77"/>
        <vers num="2.78"/>
        <vers num="2.79"/>
        <vers num="2.80"/>
        <vers num="2.81"/>
        <vers num="2.91"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="5.01"/>
        <vers num="5.02"/>
        <vers num="5.03"/>
        <vers num="5.04"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0821" seq="2004-0821" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The CFPlugIn in Core Foundation framework in Mac OS X allows user supplied libraries to be loaded, which could allow local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://www.auscert.org.au/render.html?it=4363">APPLE-SA-0024-09-07</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-212.shtml" adv="1">O-212</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/704110" adv="1" patch="1">VU#704110</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11135" patch="1">11135</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17291">macos-corefoundation-gain-privileges(17291)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0822" seq="2004-0822" published="2004-09-07" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in The Core Foundation framework (CoreFoundation.framework) in Mac OS X 10.2.8, 10.3.4, and 10.3.5 allows local users to execute arbitrary code via a certain environment variable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-212.shtml">O-212</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/545446">VU#545446</ref>
      <ref source="APPLE" url="http://www.securityfocus.com/advisories/7148">APPLE-SA-2004-09-07</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11136">11136</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17295">macos-corefoundation-bo(17295)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0823" seq="2004-0823" published="2004-09-07" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm">http://support.avaya.com/elmodocs2/security/ASA-2006-157.htm</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4363" adv="1" patch="1">ESB-2004.0559</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-751.html">RHSA-2005:751</ref>
      <ref source="APPLE" url="http://www.securityfocus.com/advisories/7148" adv="1" patch="1">APPLE-SA-2004-09-07</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11137" adv="1" patch="1">11137</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17300">openldap-crypt-gain-access(17300)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10703">oval:org.mitre.oval:def:10703</ref>
    </refs>
    <vuln_soft>
      <prod name="openldap" vendor="openldap">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.2.12"/>
        <vers num="1.2.13"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.0.10"/>
        <vers num="2.0.11"/>
        <vers num="2.0.11_9"/>
        <vers num="2.0.11_11"/>
        <vers num="2.0.11_11s"/>
        <vers num="2.0.12"/>
        <vers num="2.0.13"/>
        <vers num="2.0.14"/>
        <vers num="2.0.15"/>
        <vers num="2.0.16"/>
        <vers num="2.0.17"/>
        <vers num="2.0.18"/>
        <vers num="2.0.19"/>
        <vers num="2.0.20"/>
        <vers num="2.0.21"/>
        <vers num="2.0.22"/>
        <vers num="2.0.23"/>
        <vers num="2.0.25"/>
        <vers num="2.0.27"/>
        <vers num="2.1.4"/>
        <vers num="2.1.10"/>
        <vers num="2.1.11"/>
        <vers num="2.1.12"/>
        <vers num="2.1.13"/>
        <vers num="2.1.14"/>
        <vers num="2.1.15"/>
        <vers num="2.1.16"/>
        <vers num="2.1.17"/>
        <vers num="2.1.18"/>
        <vers num="2.1.19"/>
        <vers num="2.1_.20"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0824" seq="2004-0824" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">PPPDialer for Mac OS X 10.2.8 through 10.3.5 allows local users to overwrite system files via a symlink attack on PPPDialer log files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011175" patch="1">1011175</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4363" adv="1" patch="1">ESB-2004.0559</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-212.shtml" adv="1">O-212</ref>
      <ref source="APPLE" url="http://www.securityfocus.com/advisories/7148" adv="1" patch="1">APPLE-SA-2004-09-07</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11139" patch="1">11139</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17298">macosx-pppdialer-symlink(17298)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0825" seq="2004-0825" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">QuickTime Streaming Server in Mac OS X Server 10.2.8, 10.3.4, and 10.3.5 allows remote attackers to cause a denial of service (application deadlock) via a certain sequence of operations.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109467471617466&amp;w=2">20040908 Re: Apple, Apple Remote Desktop client [Multiple vulnerabilities]</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011176" patch="1">1011176</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-212.shtml" adv="1">O-212</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/914870" adv="1" patch="1">VU#914870</ref>
      <ref source="APPLE" url="http://www.securityfocus.com/advisories/7148" adv="1" patch="1">APPLE-SA-2004-09-07</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11138" patch="1">11138</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17294">quicktime-dos(17294)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2.8"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0826" seq="2004-0826" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109351293827731&amp;w=2">SSRT4779</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11015" patch="1">11015</ref>
      <ref source="ISS" url="http://xforce.iss.net/xforce/alerts/id/180" adv="1" patch="1">20040823 Netscape NSS Library Remote Compromise</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16314">sslv2-client-hello-overflow(16314)</ref>
    </refs>
    <vuln_soft>
      <prod name="network_security_services" vendor="mozilla">
        <vers num="3.2"/>
        <vers num="3.2.1"/>
        <vers num="3.3"/>
        <vers num="3.3.1"/>
        <vers num="3.3.2"/>
        <vers num="3.4"/>
        <vers num="3.4.1"/>
        <vers num="3.4.2"/>
        <vers num="3.5"/>
        <vers num="3.6"/>
        <vers num="3.6.1"/>
        <vers num="3.7"/>
        <vers num="3.7.1"/>
        <vers num="3.7.2"/>
        <vers num="3.7.3"/>
        <vers num="3.7.5"/>
        <vers num="3.7.7"/>
        <vers num="3.8"/>
        <vers num="3.9"/>
      </prod>
      <prod name="certificate_server" vendor="netscape">
        <vers num="1.0" edition="patch1"/>
        <vers num="4.2"/>
      </prod>
      <prod name="directory_server" vendor="netscape">
        <vers num="1.3" edition="patch5"/>
        <vers num="3.1" edition="patch1"/>
        <vers num="3.12"/>
        <vers num="4.1"/>
        <vers num="4.11"/>
        <vers num="4.13"/>
      </prod>
      <prod name="enterprise_server" vendor="netscape">
        <vers num="2.0"/>
        <vers num="2.0.1c"/>
        <vers num="2.0a"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.1b"/>
        <vers num="3.0.7a" edition=":netware"/>
        <vers num="3.0l"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.4"/>
        <vers num="3.5" edition=":solaris"/>
        <vers num="3.5.1"/>
        <vers num="3.6" edition=":solaris"/>
        <vers num="3.6" edition="sp1"/>
        <vers num="3.6" edition="sp2"/>
        <vers num="3.6" edition="sp3"/>
        <vers num="4.0"/>
        <vers num="4.1" edition="sp3"/>
        <vers num="4.1" edition="sp4"/>
        <vers num="4.1" edition="sp5"/>
        <vers num="4.1" edition="sp6"/>
        <vers num="4.1" edition="sp7"/>
        <vers num="4.1" edition="sp8"/>
        <vers num="4.1.1" edition=":netware"/>
        <vers num="5.0" edition=":netware"/>
      </prod>
      <prod name="personalization_engine" vendor="netscape">
        <vers num=""/>
      </prod>
      <prod name="java_enterprise_system" vendor="sun">
        <vers num="2003q4"/>
        <vers num="2004q2"/>
      </prod>
      <prod name="java_system_application_server" vendor="sun">
        <vers num="7.0" edition=":enterprise"/>
        <vers num="7.0" edition=":platform"/>
        <vers num="7.0" edition=":standard"/>
        <vers num="7.0" edition="ur4"/>
        <vers num="7.1"/>
      </prod>
      <prod name="one_application_server" vendor="sun">
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0" edition="sp2"/>
      </prod>
      <prod name="one_web_server" vendor="sun">
        <vers num="4.1" edition="sp1"/>
        <vers num="4.1" edition="sp10"/>
        <vers num="4.1" edition="sp11"/>
        <vers num="4.1" edition="sp12"/>
        <vers num="4.1" edition="sp13"/>
        <vers num="4.1" edition="sp14"/>
        <vers num="4.1" edition="sp2"/>
        <vers num="4.1" edition="sp3"/>
        <vers num="4.1" edition="sp4"/>
        <vers num="4.1" edition="sp5"/>
        <vers num="4.1" edition="sp6"/>
        <vers num="4.1" edition="sp7"/>
        <vers num="4.1" edition="sp8"/>
        <vers num="4.1" edition="sp9"/>
        <vers num="6.0" edition="sp3"/>
        <vers num="6.0" edition="sp4"/>
        <vers num="6.0" edition="sp5"/>
        <vers num="6.0" edition="sp7"/>
        <vers num="6.0" edition="sp8"/>
        <vers num="6.1" edition="sp1"/>
        <vers num="6.1" edition="sp2"/>
      </prod>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.00"/>
        <vers num="11.11"/>
        <vers num="11.23" edition=":ia64_64-bit"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0827" seq="2004-0827" published="2004-09-16" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1">231321</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1">201006</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-547" adv="1" patch="1">DSA-547</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-480.html" adv="1" patch="1">RHSA-2004:480</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-494.html" adv="1" patch="1">RHSA-2004:494</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0412">ADV-2008-0412</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17173">imagemagick-bmp-Bo(17173)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123">oval:org.mitre.oval:def:11123</ref>
    </refs>
    <vuln_soft>
      <prod name="imlib" vendor="enlightenment">
        <vers num="1.9"/>
        <vers num="1.9.1"/>
        <vers num="1.9.2"/>
        <vers num="1.9.3"/>
        <vers num="1.9.4"/>
        <vers num="1.9.5"/>
        <vers num="1.9.6"/>
        <vers num="1.9.7"/>
        <vers num="1.9.8"/>
        <vers num="1.9.9"/>
        <vers num="1.9.10"/>
        <vers num="1.9.11"/>
        <vers num="1.9.12"/>
        <vers num="1.9.13"/>
        <vers num="1.9.14"/>
      </prod>
      <prod name="imlib2" vendor="enlightenment">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
      </prod>
      <prod name="imagemagick" vendor="imagemagick">
        <vers num="5.3.3"/>
        <vers num="5.4.3"/>
        <vers num="5.4.4.5"/>
        <vers num="5.4.7"/>
        <vers num="5.4.8"/>
        <vers num="5.4.8.2.1.1.0"/>
        <vers num="5.5.3.2.1.2.0"/>
        <vers num="5.5.6.0_2003-04-09"/>
        <vers num="5.5.7"/>
        <vers num="6.0.2"/>
      </prod>
      <prod name="java_desktop_system" vendor="sun">
        <vers num="2.0"/>
        <vers num="2003"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="turbolinux" vendor="turbolinux">
        <vers num="desktop_10.0"/>
        <vers num="server_7.0"/>
        <vers num="server_8.0"/>
        <vers num="workstation_7.0"/>
        <vers num="workstation_8.0"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0828" seq="2004-0828" published="2004-11-03" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The ctstrtcasd program in RSCT 2.3.0.0 and earlier on IBM AIX 5.2 and 5.3 does not properly drop privileges before executing the -f option, which allows local users to modify or create arbitrary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011429">1011429</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11264">11264</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17514">ctstrtcasd-file-overwrite(17514)</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0829" seq="2004-0829" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">smbd in Samba before 2.2.11 allows remote attackers to cause a denial of service (daemon crash) by sending a FindNextPrintChangeNotify request without a previous FindFirstPrintChangeNotify, as demonstrated by the SMB client in Windows XP SP2.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://samba.org/samba/history/samba-2.2.11.html" patch="1">http://samba.org/samba/history/samba-2.2.11.html</ref>
      <ref source="BUGTRAQ" url="http://seclists.org/lists/bugtraq/2004/Sep/0003.html" adv="1" patch="1">20040831 Samba FindNextPrintChangeNotify() Error Lets Remote Authenticated Users Crash smbd</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-14.xml" adv="1">GLSA-200409-14</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0043" adv="1">2004-0043</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17138">samba-findnextprintchangenotify-dos(17138)</ref>
    </refs>
    <vuln_soft>
      <prod name="samba" vendor="samba">
        <vers num="1.9.17" edition="p1"/>
        <vers num="1.9.17" edition="p2"/>
        <vers num="1.9.17" edition="p3"/>
        <vers num="1.9.17" edition="p4"/>
        <vers num="1.9.17" edition="p5"/>
        <vers num="1.9.18" edition="p1"/>
        <vers num="1.9.18" edition="p10"/>
        <vers num="1.9.18" edition="p2"/>
        <vers num="1.9.18" edition="p3"/>
        <vers num="1.9.18" edition="p4"/>
        <vers num="1.9.18" edition="p5"/>
        <vers num="1.9.18" edition="p6"/>
        <vers num="1.9.18" edition="p7"/>
        <vers num="1.9.18" edition="p8"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.5a"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.3a"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.7a"/>
        <vers num="2.2.8"/>
        <vers num="2.2.8a"/>
        <vers num="2.2.9"/>
        <vers num="2.2.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0830" seq="2004-0830" published="2004-09-09" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Content Scanner Server in F-Secure Anti-Virus for Microsoft Exchange 6.21 and earlier, F-Secure Anti-Virus for Microsoft Exchange 6.01 and earlier, and F-Secure Internet Gatekeeper 6.32 and earlier allow remote attackers to cause a denial of service (service crash due to unhandled exception) via a certain malformed packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109483205925698&amp;w=2">20040910 F-Secure Internet Gatekeeper Content Scanning Server Denial of Service Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.f-secure.com/security/fsc-2004-2.shtml" adv="1" patch="1">http://www.f-secure.com/security/fsc-2004-2.shtml</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=137&amp;type=vulnerabilities" adv="1" patch="1">20040909 F-Secure Internet Gatekeeper Content Scanning Server Denial of Service Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11145" adv="1" patch="1">11145</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17307">fsecure-content-scanner-dos(17307)</ref>
    </refs>
    <vuln_soft>
      <prod name="f-secure_anti-virus" vendor="f-secure">
        <vers num="6.01" edition=":ms_exchange"/>
        <vers num="6.2" edition=":ms_exchange"/>
        <vers num="6.21" edition=":ms_exchange"/>
      </prod>
      <prod name="f-secure_content_scanner_server" vendor="f-secure">
        <vers num="6.31"/>
      </prod>
      <prod name="internet_gatekeeper" vendor="f-secure">
        <vers num="6.3"/>
        <vers num="6.31"/>
        <vers num="6.32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0831" seq="2004-0831" published="2004-09-14" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">McAfee VirusScan 4.5.1 does not drop SYSTEM privileges before allowing users to browse for files via the "System Scan" properties of the System Tray applet, which could allow local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109526269429728&amp;w=2">20040915 McAfee VirusScan Privilege Escalation Vulnerability [iDEFENSE]</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=140&amp;type=vulnerabilities" adv="1" patch="1">20040914 McAfee VirusScan Privilege Escalation Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17367">mcafee-virusscan-gain-privileges(17367)</ref>
    </refs>
    <vuln_soft>
      <prod name="virusscan" vendor="mcafee">
        <vers num="4.5"/>
        <vers num="4.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0832" seq="2004-0832" published="2004-11-03" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FEDORA" url="http://fedoranews.org/updates/FEDORA--.shtml">FLSA-2006:152809</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-04.xml" adv="1" patch="1">GLSA-200409-04</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:093">MDKSA-2004:093</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11098" adv="1" patch="1">11098</ref>
      <ref source="CONFIRM" url="http://www.squid-cache.org/bugs/show_bug.cgi?id=1045">http://www.squid-cache.org/bugs/show_bug.cgi?id=1045</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0047/" adv="1" patch="1">2004-0047</ref>
      <ref source="CONFIRM" url="http://www1.uk.squid-cache.org/squid/Versions/v2/2.5/bugs/#squid-2.5.STABLE6-ntlm_fetch_string">http://www1.uk.squid-cache.org/squid/Versions/v2/2.5/bugs/#squid-2.5.STABLE6-ntlm_fetch_string</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17218">squid-ntlmssp-dos(17218)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10489">oval:org.mitre.oval:def:10489</ref>
    </refs>
    <vuln_soft>
      <prod name="squid" vendor="squid">
        <vers num="2.5.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0833" seq="2004-0833" published="2004-12-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-554" adv="1" patch="1">DSA-554</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11262" adv="1" patch="1">11262</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17531">sendmail-mail-relay(17531)</ref>
    </refs>
    <vuln_soft>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0834" seq="2004-0834" published="2004-12-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in Speedtouch USB driver before 1.3.1 allows local users to execute arbitrary code via (1) modem_run, (2) pppoa2, or (3) pppoa3.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/showfiles.php?group_id=32758&amp;package_id=28264&amp;release_id=271734">http://sourceforge.net/project/showfiles.php?group_id=32758&amp;package_id=28264&amp;release_id=271734</ref>
      <ref source="CONFIRM" url="http://speedtouch.sourceforge.net/index.php?/news.en.html" adv="1">http://speedtouch.sourceforge.net/index.php?/news.en.html</ref>
      <ref source="MISC" url="http://www.mail-archive.com/speedtouch@ml.free.fr/msg06688.html">http://www.mail-archive.com/speedtouch@ml.free.fr/msg06688.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17792">speedtouch-format-string(17792)</ref>
    </refs>
    <vuln_soft>
      <prod name="mandrake_multi_network_firewall" vendor="mandrakesoft">
        <vers num="8.2"/>
      </prod>
      <prod name="speedtouch_usb_driver" vendor="speedtouch">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.2_beta1"/>
        <vers num="1.2_beta2"/>
        <vers num="1.2_beta3"/>
        <vers num="1.3"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="8.2" edition=":ppc"/>
        <vers num="9.0"/>
        <vers num="9.1" edition=":ppc"/>
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0835" seq="2004-0835" published="2004-11-03" modified="2019-10-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.mysql.com/bug.php?id=3270" adv="1">http://bugs.mysql.com/bug.php?id=3270</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000892">CLA-2004:892</ref>
      <ref source="MISC" url="http://lists.mysql.com/internals/13073" adv="1">http://lists.mysql.com/internals/13073</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011606" adv="1">1011606</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1">101864</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-018.shtml">P-018</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-562" adv="1" patch="1">DSA-562</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" adv="1" patch="1">GLSA-200410-22</ref>
      <ref source="CONFIRM" url="http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html" adv="1">http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html</ref>
      <ref source="CONFIRM" url="http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html" adv="1">http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-597.html" adv="1" patch="1">RHSA-2004:597</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-611.html" adv="1" patch="1">RHSA-2004:611</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11357" adv="1" patch="1">11357</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0054/" adv="1">2004-0054</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17666" adv="1">mysql-alter-restriction-bypass(17666)</ref>
    </refs>
    <vuln_soft>
      <prod name="mysql" vendor="mysql">
        <vers num="4.1.0" edition="alpha"/>
        <vers num="4.1.0.0"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2" edition="alpha"/>
        <vers num="5.0.0" edition="alpha"/>
        <vers num="5.0.0.0"/>
        <vers num="5.0.1"/>
      </prod>
      <prod name="mysql" vendor="oracle">
        <vers num="3.20.32a"/>
        <vers num="3.21"/>
        <vers num="3.22"/>
        <vers num="3.22.26"/>
        <vers num="3.22.27"/>
        <vers num="3.22.28"/>
        <vers num="3.22.29"/>
        <vers num="3.22.30"/>
        <vers num="3.22.32"/>
        <vers num="3.23"/>
        <vers num="3.23.0" edition="alpha"/>
        <vers num="3.23.1"/>
        <vers num="3.23.2"/>
        <vers num="3.23.3"/>
        <vers num="3.23.4"/>
        <vers num="3.23.5"/>
        <vers num="3.23.6"/>
        <vers num="3.23.7"/>
        <vers num="3.23.8"/>
        <vers num="3.23.9"/>
        <vers num="3.23.10"/>
        <vers num="3.23.11"/>
        <vers num="3.23.12"/>
        <vers num="3.23.13"/>
        <vers num="3.23.14"/>
        <vers num="3.23.15"/>
        <vers num="3.23.16"/>
        <vers num="3.23.17"/>
        <vers num="3.23.18"/>
        <vers num="3.23.19"/>
        <vers num="3.23.20" edition="beta"/>
        <vers num="3.23.21"/>
        <vers num="3.23.22"/>
        <vers num="3.23.23"/>
        <vers num="3.23.24"/>
        <vers num="3.23.25"/>
        <vers num="3.23.26"/>
        <vers num="3.23.27"/>
        <vers num="3.23.28" edition="gamma"/>
        <vers num="3.23.29"/>
        <vers num="3.23.30"/>
        <vers num="3.23.31"/>
        <vers num="3.23.32"/>
        <vers num="3.23.33"/>
        <vers num="3.23.34"/>
        <vers num="3.23.35"/>
        <vers num="3.23.36"/>
        <vers num="3.23.37"/>
        <vers num="3.23.38"/>
        <vers num="3.23.39"/>
        <vers num="3.23.40"/>
        <vers num="3.23.41"/>
        <vers num="3.23.42"/>
        <vers num="3.23.43"/>
        <vers num="3.23.44"/>
        <vers num="3.23.45"/>
        <vers num="3.23.46"/>
        <vers num="3.23.47"/>
        <vers num="3.23.48"/>
        <vers num="3.23.49"/>
        <vers num="3.23.50"/>
        <vers num="3.23.51"/>
        <vers num="3.23.52"/>
        <vers num="3.23.53"/>
        <vers num="3.23.53a"/>
        <vers num="3.23.54"/>
        <vers num="3.23.54a"/>
        <vers num="3.23.55"/>
        <vers num="3.23.56"/>
        <vers num="3.23.57"/>
        <vers num="3.23.58"/>
        <vers num="4.0.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.5a"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7" edition="gamma"/>
        <vers num="4.0.8" edition="gamma"/>
        <vers num="4.0.9" edition="gamma"/>
        <vers num="4.0.10"/>
        <vers num="4.0.11" edition="gamma"/>
        <vers num="4.0.12"/>
        <vers num="4.0.13"/>
        <vers num="4.0.14"/>
        <vers num="4.0.15"/>
        <vers num="4.0.16"/>
        <vers num="4.0.17"/>
        <vers num="4.0.18"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0836" seq="2004-0836" published="2004-11-03" modified="2019-10-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.mysql.com/bug.php?id=4017" adv="1">http://bugs.mysql.com/bug.php?id=4017</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000892">CLA-2004:892</ref>
      <ref source="MISC" url="http://lists.mysql.com/internals/14726" adv="1">http://lists.mysql.com/internals/14726</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110140517515735&amp;w=2" adv="1">20041125 [USN-32-1] mysql vulnerabilities</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-018.shtml">P-018</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-562" adv="1">DSA-562</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" adv="1">GLSA-200410-22</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-597.html" adv="1" patch="1">RHSA-2004:597</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-611.html" adv="1" patch="1">RHSA-2004:611</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10981" adv="1">10981</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0054/" adv="1">2004-0054</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17047" adv="1">mysql-realconnect-bo(17047)</ref>
    </refs>
    <vuln_soft>
      <prod name="mysql" vendor="mysql">
        <vers num="4.0.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.5a"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7" edition="gamma"/>
        <vers num="4.0.8" edition="gamma"/>
        <vers num="4.0.9" edition="gamma"/>
        <vers num="4.0.10"/>
        <vers num="4.0.11" edition="gamma"/>
        <vers num="4.0.12"/>
        <vers num="4.0.13"/>
        <vers num="4.0.14"/>
        <vers num="4.0.15"/>
        <vers num="4.0.16"/>
        <vers num="4.0.17"/>
        <vers num="4.0.18"/>
        <vers num="4.0.19"/>
        <vers num="4.0.20"/>
      </prod>
      <prod name="mysql" vendor="oracle">
        <vers num="3.20"/>
        <vers num="3.20.32a"/>
        <vers num="3.21"/>
        <vers num="3.22"/>
        <vers num="3.22.26"/>
        <vers num="3.22.27"/>
        <vers num="3.22.28"/>
        <vers num="3.22.29"/>
        <vers num="3.22.30"/>
        <vers num="3.22.32"/>
        <vers num="3.23"/>
        <vers num="3.23.0" edition="alpha"/>
        <vers num="3.23.1"/>
        <vers num="3.23.2"/>
        <vers num="3.23.3"/>
        <vers num="3.23.4"/>
        <vers num="3.23.5"/>
        <vers num="3.23.6"/>
        <vers num="3.23.7"/>
        <vers num="3.23.8"/>
        <vers num="3.23.9"/>
        <vers num="3.23.10"/>
        <vers num="3.23.11"/>
        <vers num="3.23.12"/>
        <vers num="3.23.13"/>
        <vers num="3.23.14"/>
        <vers num="3.23.15"/>
        <vers num="3.23.16"/>
        <vers num="3.23.17"/>
        <vers num="3.23.18"/>
        <vers num="3.23.19"/>
        <vers num="3.23.20" edition="beta"/>
        <vers num="3.23.21"/>
        <vers num="3.23.22"/>
        <vers num="3.23.23"/>
        <vers num="3.23.24"/>
        <vers num="3.23.25"/>
        <vers num="3.23.26"/>
        <vers num="3.23.27"/>
        <vers num="3.23.28" edition="gamma"/>
        <vers num="3.23.29"/>
        <vers num="3.23.30"/>
        <vers num="3.23.31"/>
        <vers num="3.23.32"/>
        <vers num="3.23.33"/>
        <vers num="3.23.34"/>
        <vers num="3.23.35"/>
        <vers num="3.23.36"/>
        <vers num="3.23.37"/>
        <vers num="3.23.38"/>
        <vers num="3.23.39"/>
        <vers num="3.23.40"/>
        <vers num="3.23.41"/>
        <vers num="3.23.42"/>
        <vers num="3.23.43"/>
        <vers num="3.23.44"/>
        <vers num="3.23.45"/>
        <vers num="3.23.46"/>
        <vers num="3.23.47"/>
        <vers num="3.23.48"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0837" seq="2004-0837" published="2004-11-03" modified="2019-10-07" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.mysql.com/2408" adv="1">http://bugs.mysql.com/2408</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000892">CLA-2004:892</ref>
      <ref source="MISC" url="http://lists.mysql.com/internals/16168" adv="1">http://lists.mysql.com/internals/16168</ref>
      <ref source="MISC" url="http://lists.mysql.com/internals/16173" adv="1">http://lists.mysql.com/internals/16173</ref>
      <ref source="MISC" url="http://lists.mysql.com/internals/16174" adv="1">http://lists.mysql.com/internals/16174</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110140517515735&amp;w=2" adv="1">20041125 [USN-32-1] mysql vulnerabilities</ref>
      <ref source="MISC" url="http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c@1.15" adv="1">http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c@1.15</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011606" adv="1">1011606</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1">101864</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-018.shtml">P-018</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-562" adv="1">DSA-562</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" adv="1">GLSA-200410-22</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-597.html" adv="1" patch="1">RHSA-2004:597</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-611.html" adv="1">RHSA-2004:611</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11357" adv="1">11357</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0054/">2004-0054</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" adv="1">mysql-union-dos(17667)</ref>
    </refs>
    <vuln_soft>
      <prod name="mysql" vendor="mysql">
        <vers num="4.0.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.5a"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7" edition="gamma"/>
        <vers num="4.0.8" edition="gamma"/>
        <vers num="4.0.9" edition="gamma"/>
        <vers num="4.0.10"/>
        <vers num="4.0.11" edition="gamma"/>
        <vers num="4.0.12"/>
        <vers num="4.0.13"/>
        <vers num="4.0.14"/>
        <vers num="4.0.15"/>
        <vers num="4.0.16"/>
        <vers num="4.0.17"/>
        <vers num="4.0.18"/>
        <vers num="4.0.19"/>
        <vers num="4.0.20"/>
        <vers num="4.1.0"/>
      </prod>
      <prod name="mysql" vendor="oracle">
        <vers num="3.20"/>
        <vers num="3.20.32a"/>
        <vers num="3.21"/>
        <vers num="3.22"/>
        <vers num="3.22.26"/>
        <vers num="3.22.27"/>
        <vers num="3.22.28"/>
        <vers num="3.22.29"/>
        <vers num="3.22.30"/>
        <vers num="3.22.32"/>
        <vers num="3.23"/>
        <vers num="3.23.0" edition="alpha"/>
        <vers num="3.23.1"/>
        <vers num="3.23.2"/>
        <vers num="3.23.3"/>
        <vers num="3.23.4"/>
        <vers num="3.23.5"/>
        <vers num="3.23.6"/>
        <vers num="3.23.7"/>
        <vers num="3.23.8"/>
        <vers num="3.23.9"/>
        <vers num="3.23.10"/>
        <vers num="3.23.11"/>
        <vers num="3.23.12"/>
        <vers num="3.23.13"/>
        <vers num="3.23.14"/>
        <vers num="3.23.15"/>
        <vers num="3.23.16"/>
        <vers num="3.23.17"/>
        <vers num="3.23.18"/>
        <vers num="3.23.19"/>
        <vers num="3.23.20" edition="beta"/>
        <vers num="3.23.21"/>
        <vers num="3.23.22"/>
        <vers num="3.23.23"/>
        <vers num="3.23.24"/>
        <vers num="3.23.25"/>
        <vers num="3.23.26"/>
        <vers num="3.23.27"/>
        <vers num="3.23.28" edition="gamma"/>
        <vers num="3.23.29"/>
        <vers num="3.23.30"/>
        <vers num="3.23.31"/>
        <vers num="3.23.32"/>
        <vers num="3.23.33"/>
        <vers num="3.23.34"/>
        <vers num="3.23.35"/>
        <vers num="3.23.36"/>
        <vers num="3.23.37"/>
        <vers num="3.23.38"/>
        <vers num="3.23.39"/>
        <vers num="3.23.40"/>
        <vers num="3.23.41"/>
        <vers num="3.23.42"/>
        <vers num="3.23.43"/>
        <vers num="3.23.44"/>
        <vers num="3.23.45"/>
        <vers num="3.23.46"/>
        <vers num="3.23.47"/>
        <vers num="3.23.48"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0838" seq="2004-0838" published="2004-09-13" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Lexar Safe Guard for JumpDrive Secure 1.0 stores the password insecurely in memory using XOR encryption, which allows local users to read the password directly from the device and access the password protected part of the drive.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="ATSTAKE" url="http://www.atstake.com/research/advisories/2004/a091304-1.txt" adv="1">A091304-1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11162" adv="1">11162</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17342">jumpdrive-safeguard-obtain-password(17342)</ref>
    </refs>
    <vuln_soft>
      <prod name="jumpdrive_secure" vendor="lexar">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0839" seq="2004-0839" published="2004-08-18" modified="2019-04-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html".</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109303291513335&amp;w=2">20040818 What A Drag II XP SP2</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109336221826652&amp;w=2">20040824 What A Drag! -revisited-</ref>
      <ref source="FULLDISC" url="http://seclists.org/lists/fulldisclosure/2004/Aug/0868.html" adv="1">20040818 What A Drag II XP SP2</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/526089" adv="1" patch="1">VU#526089</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10973" adv="1" patch="1">10973</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-293A.html" adv="1" patch="1">TA04-293A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038">MS04-038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17044">ie-dragdrop-code-execution(17044)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1563">oval:org.mitre.oval:def:1563</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2073">oval:org.mitre.oval:def:2073</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3773">oval:org.mitre.oval:def:3773</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4152">oval:org.mitre.oval:def:4152</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6272">oval:org.mitre.oval:def:6272</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7721">oval:org.mitre.oval:def:7721</ref>
    </refs>
    <vuln_soft>
      <prod name="ip600_media_servers" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="ie" vendor="microsoft">
        <vers num="5.0.1" edition="sp1"/>
        <vers num="5.0.1" edition="sp2"/>
        <vers num="5.0.1" edition="sp3"/>
        <vers num="5.0.1" edition="sp4"/>
        <vers num="5.5" edition="sp1"/>
        <vers num="5.5" edition="sp2"/>
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0" edition="sp2"/>
      </prod>
      <prod name="ip_softphone_2050" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="mobile_voice_client_2050" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="optivity_telephony_manager" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="symposium_web_centre_portal" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="symposium_web_client" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="definity_one_media_server" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="s3400" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="s8100" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="1.1"/>
        <vers num="2.0"/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise_64-bit"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="web"/>
      </prod>
      <prod name="windows_98" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
      <prod name="windows_98se" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_me" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":home"/>
        <vers num="" edition=":media_center"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:home"/>
        <vers num="" edition="sp1:media_center"/>
        <vers num="" edition="sp2:home"/>
        <vers num="" edition="sp2:media_center"/>
        <vers num="" edition="sp2:tablet_pc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0840" seq="2004-0840" published="2004-11-03" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The SMTP (Simple Mail Transfer Protocol) component of Microsoft Windows XP 64-bit Edition, Windows Server 2003, Windows Server 2003 64-bit Edition, and the Exchange Routing Engine component of Exchange Server 2003, allows remote attackers to execute arbitrary code via a malicious DNS response message containing length values that are not properly validated.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/394792" adv="1" patch="1">VU#394792</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11374">11374</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-035">MS04-035</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17621">win2k3-smtp-execute-code(17621)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17660">win-ms04035-patch(17660)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2300">oval:org.mitre.oval:def:2300</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3460">oval:org.mitre.oval:def:3460</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5509">oval:org.mitre.oval:def:5509</ref>
    </refs>
    <vuln_soft>
      <prod name="exchange_server" vendor="microsoft">
        <vers num="2003"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="64-bit"/>
        <vers num="r2"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0841" seq="2004-0841" published="2004-12-23" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Internet Explorer 6.x allows remote attackers to install arbitrary programs via mousedown events that call the Popup.show method and use drag-and-drop actions in a popup window, aka "HijackClick 3" and the "Script in Image Tag File Download Vulnerability."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0498.html">20040712 Brand New Hole: Internet Explorer: HijackClick 3</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010679">1010679</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/413886">VU#413886</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/368652" adv="1" patch="1">20040711 HijackClick 3</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/368666">20040712 Re: HijackClick 3</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10690" adv="1" patch="1">10690</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-293A.html">TA04-293A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038">MS04-038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16675">ie-popupshow-perform-actions(16675)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2611">oval:org.mitre.oval:def:2611</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4363">oval:org.mitre.oval:def:4363</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5620">oval:org.mitre.oval:def:5620</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6031">oval:org.mitre.oval:def:6031</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6048">oval:org.mitre.oval:def:6048</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8077">oval:org.mitre.oval:def:8077</ref>
    </refs>
    <vuln_soft>
      <prod name="ip600_media_servers" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="ie" vendor="microsoft">
        <vers num="5.0.1" edition="sp1"/>
        <vers num="5.0.1" edition="sp2"/>
        <vers num="5.0.1" edition="sp3"/>
        <vers num="5.0.1" edition="sp4"/>
        <vers num="5.5" edition="sp1"/>
        <vers num="5.5" edition="sp2"/>
        <vers num="6.0" edition="sp1"/>
      </prod>
      <prod name="definity_one_media_server" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="s3400" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="s8100" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="1.1"/>
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0842" seq="2004-0842" published="2004-12-23" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Internet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from "memory corruption") via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the "&lt;STYLE>@;/*" string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the "CSS Heap Memory Corruption Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109107496214572&amp;w=2">20040728 Re: Crash IE with 11 bytes ;)</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=109060455614702&amp;w=2">20040723 Crash IE with 11 bytes ;)</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=109102919426844&amp;w=2">20040728 Re: Crash IE with 11 bytes ;)</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-006.shtml">P-006</ref>
      <ref source="MISC" url="http://www.ecqurity.com/adv/IEstyle.html" adv="1">http://www.ecqurity.com/adv/IEstyle.html</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/291304">VU#291304</ref>
      <ref source="MISC" url="http://www.securiteam.com/exploits/5NP042KF5A.html">http://www.securiteam.com/exploits/5NP042KF5A.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10816" adv="1" patch="1">10816</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-293A.html">TA04-293A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038">MS04-038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16675">ie-popupshow-perform-actions(16675)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2906">oval:org.mitre.oval:def:2906</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3372">oval:org.mitre.oval:def:3372</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4169">oval:org.mitre.oval:def:4169</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5592">oval:org.mitre.oval:def:5592</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6579">oval:org.mitre.oval:def:6579</ref>
    </refs>
    <vuln_soft>
      <prod name="ip600_media_servers" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="ie" vendor="microsoft">
        <vers num="5.0.1" edition="sp1"/>
        <vers num="5.0.1" edition="sp2"/>
        <vers num="5.0.1" edition="sp3"/>
        <vers num="5.0.1" edition="sp4"/>
        <vers num="5.5" edition="sp1"/>
        <vers num="5.5" edition="sp2"/>
        <vers num="6.0" edition="sp1"/>
      </prod>
      <prod name="definity_one_media_server" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="s3400" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="s8100" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="1.1"/>
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0843" seq="2004-0843" published="2004-11-03" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Internet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote attackers to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/625616" adv="1" patch="1">VU#625616</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-293A.html" adv="1" patch="1">TA04-293A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038">MS04-038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17651">ie-ms04038-patch(17651)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17655">ie-plugin-address-spoofing(17655)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2487">oval:org.mitre.oval:def:2487</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2537">oval:org.mitre.oval:def:2537</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3949">oval:org.mitre.oval:def:3949</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6313">oval:org.mitre.oval:def:6313</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7095">oval:org.mitre.oval:def:7095</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7194">oval:org.mitre.oval:def:7194</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.5"/>
        <vers num="6" edition="windows_server_2003_sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0844" seq="2004-0844" published="2004-11-03" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Internet Explorer 6 on Double Byte Character Set (DBCS) systems allows remote attackers to alter displayed address bars and spoof web pages via a URL containing special characters, facilitating phishing attacks, aka the "Address Bar Spoofing on Double Byte Character Set Systems Vulnerability."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110178042025729&amp;w=2">20041128 Address Bar Spoofing on Double Byte Character Set Locale Vulnerability (CAN-2004-0844) Patched in MS04-038</ref>
      <ref source="NTBUGTRAQ" url="http://marc.info/?l=ntbugtraq&amp;m=110174346717733&amp;w=2">20041128 Address Bar Spoofing on Double Byte Character Set Locale Vulnerability (CAN-2004-0844) Patched in MS04-038</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/431576" adv="1" patch="1">VU#431576</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-293A.html" adv="1" patch="1">TA04-293A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038">MS04-038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17651">ie-ms04038-patch(17651)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17652">ie-dbcs-obtain-information(17652)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2448">oval:org.mitre.oval:def:2448</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8127">oval:org.mitre.oval:def:8127</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6" edition="windows_server_2003_sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0845" seq="2004-0845" published="2004-11-03" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Internet Explorer 5.01, 5.5, and 6 does not properly cache SSL content, which allows remote attackers to obtain information or spoof content via a web site with the same host name as the target web site, whose content is cached and reused when the user visits the target web site.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109770364504803&amp;w=2">20041013 ACROS Security: Poisoning Cached HTTPS Documents in Internet Explorer</ref>
      <ref source="MISC" url="http://www.acrossecurity.com/aspr/ASPR-2004-10-13-1-PUB.txt">http://www.acrossecurity.com/aspr/ASPR-2004-10-13-1-PUB.txt</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/795720" adv="1" patch="1">VU#795720</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-293A.html" adv="1" patch="1">TA04-293A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038">MS04-038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17651">ie-ms04038-patch(17651)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17654">ie-cache-ssl-obtain-information(17654)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2219">oval:org.mitre.oval:def:2219</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3872">oval:org.mitre.oval:def:3872</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5150">oval:org.mitre.oval:def:5150</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5520">oval:org.mitre.oval:def:5520</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5740">oval:org.mitre.oval:def:5740</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7611">oval:org.mitre.oval:def:7611</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.01"/>
        <vers num="5.5"/>
        <vers num="6" edition="windows_server_2003_sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0846" seq="2004-0846" published="2004-11-03" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Microsoft Excel 2000, 2002, 2001 for Mac, and v.X for Mac allows remote attackers to execute arbitrary code via a malicious file containing certain parameters that are not properly validated.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109779810827096&amp;w=2">20041013 Buffer Overflow In Microsoft Excel</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-009.shtml" adv="1">P-009</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/274496" adv="1" patch="1">VU#274496</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-033">MS04-033</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17653">excel-execute-code(17653)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17683">excel-ms04033-patch(17683)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2673">oval:org.mitre.oval:def:2673</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4226">oval:org.mitre.oval:def:4226</ref>
    </refs>
    <vuln_soft>
      <prod name="excel" vendor="microsoft">
        <vers num="2000"/>
        <vers num="2001"/>
        <vers num="2002"/>
        <vers num="x"/>
      </prod>
      <prod name="office" vendor="microsoft">
        <vers num="2000" edition="sp3"/>
        <vers num="2001"/>
        <vers num="v.x"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0847" seq="2004-0847" published="2004-11-03" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "%5C" (encoded backslash), aka "Path Validation Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="NTBUGTRAQ" url="http://archives.neohapsis.com/archives/ntbugtraq/2004-q3/0221.html" adv="1">20040914 Security bug in .NET Forms Authentication</ref>
      <ref source="MISC" url="http://sourceforge.net/mailarchive/forum.php?thread_id=5671607&amp;forum_id=24754">http://sourceforge.net/mailarchive/forum.php?thread_id=5671607&amp;forum_id=24754</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/283646" adv="1">VU#283646</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11342" adv="1">11342</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA05-039A.html" adv="1">TA05-039A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-004">MS05-004</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17644" adv="1">windows-forms-security-bypass(17644)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3556" adv="1">oval:org.mitre.oval:def:3556</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4987" adv="1">oval:org.mitre.oval:def:4987</ref>
    </refs>
    <vuln_soft>
      <prod name="asp.net" vendor="microsoft">
        <vers num="1.1" prev="1" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0848" seq="2004-0848" published="2005-02-08" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%00 (null byte) in .doc filenames or (2) "%0a" (carriage return) in .rtf filenames.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/416001" adv="1" patch="1">VU#416001</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA05-039A.html" adv="1" patch="1">TA05-039A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-005">MS05-005</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19107">ms-url-bo(19107)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2348">oval:org.mitre.oval:def:2348</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2738">oval:org.mitre.oval:def:2738</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4022">oval:org.mitre.oval:def:4022</ref>
    </refs>
    <vuln_soft>
      <prod name="office" vendor="microsoft">
        <vers num="xp" edition="sp1"/>
        <vers num="xp" edition="sp2"/>
        <vers num="xp" edition="sp3"/>
      </prod>
      <prod name="powerpoint" vendor="microsoft">
        <vers num="2002" edition="sp1"/>
        <vers num="2002" edition="sp2"/>
        <vers num="2002" edition="sp3"/>
      </prod>
      <prod name="project" vendor="microsoft">
        <vers num="2002" edition="sp1"/>
      </prod>
      <prod name="visio" vendor="microsoft">
        <vers num="2002" edition="sp1"/>
        <vers num="2002" edition="sp2:professional"/>
        <vers num="2002" edition="sp2:standard"/>
      </prod>
      <prod name="word" vendor="microsoft">
        <vers num="2002" edition="sp1"/>
        <vers num="2002" edition="sp2"/>
        <vers num="2002" edition="sp3"/>
      </prod>
      <prod name="works" vendor="microsoft">
        <vers num="2002"/>
        <vers num="2003"/>
        <vers num="2004"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0849" seq="2004-0849" published="2004-12-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the asn_decode_string() function defined in asn1.c in radiusd for GNU Radius 1.1 and 1.2 before 1.2.94, when compiled with the --enable-snmp option, allows remote attackers to cause a denial of service (daemon crash) via certain SNMP requests.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.gnu.org/archive/html/info-gnu-radius/2004-09/msg00000.html" adv="1" patch="1">[Info-gnu-radius] 20040915 GNU Radius 1.2.94.</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=141&amp;type=vulnerabilities" adv="1" patch="1">20040915 GNU Radius SNMP String Length Integer Overflow Denial of Service Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17391">radius-asndecodestring-bo(17391)</ref>
    </refs>
    <vuln_soft>
      <prod name="radius" vendor="gnu">
        <vers num="0.92.1"/>
        <vers num="0.93"/>
        <vers num="0.94"/>
        <vers num="0.95"/>
        <vers num="0.96"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0850" seq="2004-0850" published="2004-12-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Star before 1.5_alpha46 does not drop the effective user ID (euid) before calling external programs, which could allow local users to gain privileges by modifying the RSH environment variable to reference a malicious program.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011195">1011195</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-11.xml">GLSA-200409-11</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/339089" adv="1" patch="1">VU#339089</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11141" adv="1" patch="1">11141</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17297">star-ssh-gain-privileges(17297)</ref>
    </refs>
    <vuln_soft>
      <prod name="star_tape_archiver" vendor="joerg_schilling">
        <vers num="1.5_a45"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0851" seq="2004-0851" published="2004-09-08" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The (1) write_list and (2) dump_curr_list functions in Net-Acct before 0.71 allows local users to overwrite arbitrary files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch" adv="1">http://exorsus.net/projects/net-acct/net-acct-notempfiles.patch</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109466910232385&amp;w=2">20040908 Insecure Temporary File Creation Vulnerability in Net-Acct</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-559" adv="1" patch="1">DSA-559</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11125" adv="1" patch="1">11125</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17283">net-acct-tmp-symlink(17283)</ref>
    </refs>
    <vuln_soft>
      <prod name="net-acct" vendor="ulrich_callmeier">
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.71"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0852" seq="2004-0852" published="2004-12-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in htget 0.93 allows remote attackers to execute arbitrary code via a crafted URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-611" adv="1" patch="1">DSA-611</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18603">htget-bo(18603)</ref>
    </refs>
    <vuln_soft>
      <prod name="htget" vendor="htget">
        <vers num="0.93"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0853" seq="2004-0853" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0854" seq="2004-0854" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0855" seq="2004-0855" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0856" seq="2004-0856" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0857" seq="2004-0857" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0858" seq="2004-0858" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0859" seq="2004-0859" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0860" seq="2004-0860" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0861" seq="2004-0861" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0866" seq="2004-0866" published="2004-09-16" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Internet Explorer 6.0 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109536612321898&amp;w=2">20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011332" adv="1">1011332</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11186" adv="1" patch="1">11186</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17415">web-browser-session-hijack(17415)</ref>
    </refs>
    <vuln_soft>
      <prod name="konqueror" vendor="kde">
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.5"/>
        <vers num="3.0.5b"/>
        <vers num="3.1"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.4"/>
        <vers num="3.1.5"/>
        <vers num="3.2.1"/>
        <vers num="3.2.3"/>
      </prod>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0" edition="sp2"/>
      </prod>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.9.2"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0867" seq="2004-0867" published="2004-12-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Mozilla Firefox 0.9.2 allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk, and .sch.uk, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session.  NOTE: it was later reported that 2.x is also affected.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://kuza55.blogspot.com/2008/02/understanding-cookie-security.html">http://kuza55.blogspot.com/2008/02/understanding-cookie-security.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109536612321898&amp;w=2">20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011331">1011331</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11186" adv="1">11186</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=252342">https://bugzilla.mozilla.org/show_bug.cgi?id=252342</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17415">web-browser-session-hijack(17415)</ref>
    </refs>
    <vuln_soft>
      <prod name="konqueror" vendor="kde">
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.5"/>
        <vers num="3.0.5b"/>
        <vers num="3.1"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.4"/>
        <vers num="3.1.5"/>
        <vers num="3.2.1"/>
        <vers num="3.2.3"/>
      </prod>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0" edition="sp2"/>
      </prod>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.9.2"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0868" seq="2004-0868" published="2004-12-23" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-0866.  Reason: This candidate is a duplicate of CVE-2004-0866.  Notes: The description for CVE-2004-0866 was inadvertently attached to this issue instead.  All CVE users should reference CVE-2004-0866 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0869" seq="2004-0869" published="2004-09-16" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Internet Explorer does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka "Cross Security Boundary Cookie Injection."</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://securityfocus.com/archive/1/375407" adv="1">20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011332">1011332</ref>
      <ref source="MISC" url="http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt" adv="1">http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17417">web-browser-cookie-session-hijack(17417)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6" edition="windows_server_2003_sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0870" seq="2004-0870" published="2004-09-16" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">KDE Konqueror does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka "Cross Security Boundary Cookie Injection."</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://securityfocus.com/archive/1/375407" adv="1">20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011330">1011330</ref>
      <ref source="MISC" url="http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt" adv="1">http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17417">web-browser-cookie-session-hijack(17417)</ref>
    </refs>
    <vuln_soft>
      <prod name="konqueror" vendor="kde">
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.5"/>
        <vers num="3.0.5b"/>
        <vers num="3.1"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.4"/>
        <vers num="3.1.5"/>
        <vers num="3.2.1"/>
        <vers num="3.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0871" seq="2004-0871" published="2004-09-16" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Mozilla does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka "Cross Security Boundary Cookie Injection."</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://securityfocus.com/archive/1/375407" adv="1">20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011331">1011331</ref>
      <ref source="MISC" url="http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt" adv="1">http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17417">web-browser-cookie-session-hijack(17417)</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="0.9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0872" seq="2004-0872" published="2004-09-16" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Opera does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka "Cross Security Boundary Cookie Injection."</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://securityfocus.com/archive/1/375407" adv="1">20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011329">1011329</ref>
      <ref source="MISC" url="http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt" adv="1">http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17417">web-browser-cookie-session-hijack(17417)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="7.51"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0873" seq="2004-0873" published="2004-12-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Apple iChat AV 2.1, AV 2.0, and 1.0.1 allows remote attackers to execute arbitrary programs via a "link" that references the program.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Sep/msg00001.html" adv="1" patch="1">APPLE-SA-2004-09-16</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17420">ichatav-link-app-execute(17420)</ref>
    </refs>
    <vuln_soft>
      <prod name="ichat" vendor="apple">
        <vers num="1.0.1"/>
      </prod>
      <prod name="ichat_av" vendor="apple">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0874" seq="2004-0874" published="2005-01-10" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-1123.  Reason: This candidate is a reservation duplicate of CVE-2004-1123.  Notes: All CVE users should reference CVE-2004-1123 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0875" seq="2004-0875" published="2004-12-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Phpgroupware (aka webdistro) 0.9.16.002 and earlier allow remote attackers to insert arbitrary HTML or web script, as demonstrated with a request to the wiki module.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://downloads.phpgroupware.org/changelog">http://downloads.phpgroupware.org/changelog</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-22.xml" adv="1" patch="1">GLSA-200409-22</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17289">phpgroupware-xss(17289)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14.003"/>
        <vers num="0.9.14.005"/>
        <vers num="0.9.14.006"/>
        <vers num="0.9.14.007"/>
        <vers num="0.9.16.000"/>
        <vers num="0.9.16.002"/>
        <vers num="0.9.16_rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0880" seq="2004-0880" published="2005-01-27" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="1.2" CVSS_base_score="1.2" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">getmail 4.x before 4.2.0, when run as root, allows local users to overwrite arbitrary files via a symlink attack on an mbox file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109571883130372&amp;w=2">20040919 Local root compromise possible with getmail</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-32.xml">GLSA-200409-32</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-553">DSA-553</ref>
      <ref source="CONFIRM" url="http://www.qcc.ca/~charlesc/software/getmail-4/CHANGELOG">http://www.qcc.ca/~charlesc/software/getmail-4/CHANGELOG</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17437">getmail-mbox-race-condition(17437)</ref>
    </refs>
    <vuln_soft>
      <prod name="getmail" vendor="getmail">
        <vers num="2.3.7"/>
        <vers num="3.x"/>
        <vers num="4.0"/>
        <vers num="4.0.0_b10"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7"/>
        <vers num="4.0.8"/>
        <vers num="4.0.9"/>
        <vers num="4.0.10"/>
        <vers num="4.0.11"/>
        <vers num="4.0.12"/>
        <vers num="4.0.13"/>
        <vers num="4.1"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.1.3"/>
        <vers num="4.1.4"/>
        <vers num="4.1.5"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="slackware_linux" vendor="slackware">
        <vers num="9.1"/>
        <vers num="10.0"/>
        <vers num="current"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0881" seq="2004-0881" published="2005-01-27" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">getmail 4.x before 4.2.0, and other versions before 3.2.5, when run as root, allows local users to write files in arbitrary directories via a symlink attack on subdirectories in the maildir.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109571883130372&amp;w=2">20040919 Local root compromise possible with getmail</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-32.xml">GLSA-200409-32</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-553">DSA-553</ref>
      <ref source="CONFIRM" url="http://www.qcc.ca/~charlesc/software/getmail-4/CHANGELOG">http://www.qcc.ca/~charlesc/software/getmail-4/CHANGELOG</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17439">getmail-maildir-race-condition(17439)</ref>
    </refs>
    <vuln_soft>
      <prod name="getmail" vendor="getmail">
        <vers num="2.3.7"/>
        <vers num="3.x"/>
        <vers num="4.0"/>
        <vers num="4.0.0_b10"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7"/>
        <vers num="4.0.8"/>
        <vers num="4.0.9"/>
        <vers num="4.0.10"/>
        <vers num="4.0.11"/>
        <vers num="4.0.12"/>
        <vers num="4.0.13"/>
        <vers num="4.1"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.1.3"/>
        <vers num="4.1.4"/>
        <vers num="4.1.5"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="slackware_linux" vendor="slackware">
        <vers num="9.1"/>
        <vers num="10.0"/>
        <vers num="current"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0882" seq="2004-0882" published="2005-01-27" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small "maximum data bytes" value.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt">SCOSA-2005.17</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P">20041201-01-P</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000899">CLA-2004:899</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html">APPLE-SA-2005-03-21</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110054671403755&amp;w=2">20041115 Advisory 13/2004: Samba 3.x QFILEPATHINFO unicode filename buffer overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110055646329581&amp;w=2">20041115 [SAMBA] CAN-2004-0882: Possiebl Buffer Overrun in smbd</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110330519803655&amp;w=2">20041217 [OpenPKG-SA-2004.054] OpenPKG Security Advisory (samba)</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/132004.html">http://security.e-matters.de/advisories/132004.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012235">1012235</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-038.shtml">P-038</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/457622">VU#457622</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_40_samba.html">SUSE-SA:2004:040</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0058/" adv="1" patch="1">2004-0058</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18070">samba-qfilepathinfo-bo(18070)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969">oval:org.mitre.oval:def:9969</ref>
    </refs>
    <vuln_soft>
      <prod name="samba" vendor="samba">
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.2a"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4" edition="rc1"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.0.7"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="10.0"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0883" seq="2004-0883" published="2005-01-10" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110072140811965&amp;w=2">20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110082989725345&amp;w=2">20041118 [USN-30-1] Linux kernel vulnerabilities</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/142004.html">http://security.e-matters.de/advisories/142004.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/726198">VU#726198</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-504.html">RHSA-2004:504</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-505.html">RHSA-2004:505</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-537.html" adv="1" patch="1">RHSA-2004:537</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11695" adv="1" patch="1">11695</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18134">linux-smb-response-dos(18134)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18135">linux-smbprocreadxdata-dos(18135)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18136">linux-smbreceivetrans2-dos(18136)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330">oval:org.mitre.oval:def:10330</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0884" seq="2004-0884" published="2005-01-27" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=134657">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=134657</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html">APPLE-SA-2005-03-21</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110693126007214&amp;w=2">20050128 [OpenPKG-SA-2005.004] OpenPKG Security Advisory (sasl)</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-546.html">RHSA-2004:546</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-003.shtml">P-003</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-563" adv="1" patch="1">DSA-563</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-568">DSA-568</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml">GLSA-200410-05</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:106">MDKSA-2004:106</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11347" adv="1" patch="1">11347</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0053/">2004-0053</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2137">FLSA:2137</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17643">cyrus-sasl-saslpath(17643)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11678">oval:org.mitre.oval:def:11678</ref>
    </refs>
    <vuln_soft>
      <prod name="sasl" vendor="cyrus">
        <vers num="1.5.24"/>
        <vers num="1.5.27"/>
        <vers num="1.5.28"/>
        <vers num="2.1.9"/>
        <vers num="2.1.10"/>
        <vers num="2.1.11"/>
        <vers num="2.1.12"/>
        <vers num="2.1.13"/>
        <vers num="2.1.14"/>
        <vers num="2.1.15"/>
        <vers num="2.1.16"/>
        <vers num="2.1.17"/>
        <vers num="2.1.18"/>
        <vers num="2.1.18_r1"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0885" seq="2004-0885" published="2004-11-03" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The mod_ssl module in Apache 2.0.35 through 2.0.52, when using the "SSLCipherSuite" directive in directory or location context, allows remote clients to bypass intended restrictions by using any cipher suite that is allowed by the virtual host configuration.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://issues.apache.org/bugzilla/show_bug.cgi?id=31505">http://issues.apache.org/bugzilla/show_bug.cgi?id=31505</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html">APPLE-SA-2005-08-17</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html">APPLE-SA-2005-08-15</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109786159119069&amp;w=2">20041015 [OpenPKG-SA-2004.044] OpenPKG Security Advisory (modssl)</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1">102198</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm">http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm</ref>
      <ref source="CONFIRM" url="http://www.apacheweek.com/features/security-20">http://www.apacheweek.com/features/security-20</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-562.html">RHSA-2004:562</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-600.html" adv="1" patch="1">RHSA-2004:600</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-816.html">RHSA-2005:816</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0261.html">RHSA-2008:0261</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11360">11360</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-177-1">USN-177-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/0789">ADV-2006-0789</ref>
      <ref source="HP" url="http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX01123">HPSBUX01123</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17671">apache-sslciphersuite-restriction-bypass(17671)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10384">oval:org.mitre.oval:def:10384</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.0.40"/>
        <vers num="2.0.41"/>
        <vers num="2.0.42"/>
        <vers num="2.0.43"/>
        <vers num="2.0.44"/>
        <vers num="2.0.45"/>
        <vers num="2.0.46"/>
        <vers num="2.0.47"/>
        <vers num="2.0.48"/>
        <vers num="2.0.49"/>
        <vers num="2.0.50"/>
        <vers num="2.0.51"/>
        <vers num="2.0.52"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0886" seq="2004-0886" published="2005-01-27" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/index.php?id=a&amp;anuncio=000888">CLA-2004:888</ref>
      <ref source="OPENPKG" url="http://marc.info/?l=bugtraq&amp;m=109779465621929&amp;w=2">OpenPKG-SA-2004.043</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011674">1011674</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1">101677</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1">201072</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-015.shtml">P-015</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-567">DSA-567</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/687568">VU#687568</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20041209-2.txt">http://www.kde.org/info/security/advisory-20041209-2.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:109">MDKSA-2004:109</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:052">MDKSA-2005:052</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_38_libtiff.html">SUSE-SA:2004:038</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-577.html" adv="1" patch="1">RHSA-2004:577</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-021.html">RHSA-2005:021</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-354.html">RHSA-2005:354</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11406" adv="1" patch="1">11406</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0054/">2004-0054</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17715">libtiff-bo(17715)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116">oval:org.mitre.oval:def:100116</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907">oval:org.mitre.oval:def:9907</ref>
    </refs>
    <vuln_soft>
      <prod name="libtiff" vendor="libtiff">
        <vers num="3.4"/>
        <vers num="3.5.1"/>
        <vers num="3.5.2"/>
        <vers num="3.5.3"/>
        <vers num="3.5.4"/>
        <vers num="3.5.5"/>
        <vers num="3.5.7"/>
        <vers num="3.6.0"/>
        <vers num="3.6.1"/>
      </prod>
      <prod name="pdf_library" vendor="pdflib">
        <vers num="5.0.2"/>
      </prod>
      <prod name="wxgtk2" vendor="wxgtk2">
        <vers num="2.5_.0"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
      <prod name="kde" vendor="kde">
        <vers num="3.2"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2"/>
        <vers num="3.2.3"/>
        <vers num="3.3"/>
        <vers num="3.3.1"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.0" edition=":amd64"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.1"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0887" seq="2004-0887" published="2005-01-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SUSE Linux Enterprise Server 9 on the S/390 platform does not properly handle a certain privileged instruction, which allows local users to gain root privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1018">DSA-1018</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_37_kernel.html">SUSE-SA:2004:037</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11489" adv="1" patch="1">11489</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17801">linux-instruction-gain-privileges(17801)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6.10" edition="rc2"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":s_390"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0888" seq="2004-0888" published="2005-01-27" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/index.php?id=a&amp;anuncio=000886">CLA-2004:886</ref>
      <ref source="SUSE" url="http://marc.info/?l=bugtraq&amp;m=109880927526773&amp;w=2">SUSE-SA:2004:039</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=110815379627883&amp;w=2">FLSA:2352</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-573">DSA-573</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-581">DSA-581</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-599">DSA-599</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml">GLSA-200410-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml">GLSA-200410-30</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:113">MDKSA-2004:113</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:114">MDKSA-2004:114</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:115">MDKSA-2004:115</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:116">MDKSA-2004:116</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-543.html" adv="1" patch="1">RHSA-2004:543</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-592.html">RHSA-2004:592</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-066.html">RHSA-2005:066</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-354.html">RHSA-2005:354</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11501" adv="1" patch="1">11501</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2353">FLSA:2353</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17818">xpdf-pdf-bo(17818)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714">oval:org.mitre.oval:def:9714</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-9-1/">USN-9-1</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.0.4"/>
        <vers num="1.0.4_8"/>
        <vers num="1.1.1"/>
        <vers num="1.1.4"/>
        <vers num="1.1.4_2"/>
        <vers num="1.1.4_3"/>
        <vers num="1.1.4_5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.10"/>
        <vers num="1.1.12"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.19_rc5"/>
        <vers num="1.1.20"/>
      </prod>
      <prod name="gpdf" vendor="gnome">
        <vers num="0.112"/>
        <vers num="0.131"/>
      </prod>
      <prod name="koffice" vendor="kde">
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3_beta1"/>
        <vers num="1.3_beta2"/>
        <vers num="1.3_beta3"/>
      </prod>
      <prod name="kpdf" vendor="kde">
        <vers num="3.2"/>
      </prod>
      <prod name="pdftohtml" vendor="pdftohtml">
        <vers num="0.32a"/>
        <vers num="0.32b"/>
        <vers num="0.33"/>
        <vers num="0.33a"/>
        <vers num="0.34"/>
        <vers num="0.35"/>
        <vers num="0.36"/>
      </prod>
      <prod name="tetex" vendor="tetex">
        <vers num="1.0.7"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
      </prod>
      <prod name="xpdf" vendor="xpdf">
        <vers num="0.90"/>
        <vers num="0.91"/>
        <vers num="0.92"/>
        <vers num="0.93"/>
        <vers num="1.0"/>
        <vers num="1.0a"/>
        <vers num="1.1"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.3"/>
        <vers num="3.0"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="kde" vendor="kde">
        <vers num="3.2"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2"/>
        <vers num="3.2.3"/>
        <vers num="3.3"/>
        <vers num="3.3.1"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0889" seq="2004-0889" published="2005-01-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://marc.info/?l=bugtraq&amp;m=109880927526773&amp;w=2">SUSE-SA:2004:039</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml" adv="1" patch="1">GLSA-200410-20</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml">GLSA-200410-30</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:113">MDKSA-2004:113</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11501">11501</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17819">xpdf-pdf-file-bo(17819)</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.0.4"/>
        <vers num="1.0.4_8"/>
        <vers num="1.1.1"/>
        <vers num="1.1.4"/>
        <vers num="1.1.4_2"/>
        <vers num="1.1.4_3"/>
        <vers num="1.1.4_5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.10"/>
        <vers num="1.1.12"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.19_rc5"/>
        <vers num="1.1.20"/>
      </prod>
      <prod name="gpdf" vendor="gnome">
        <vers num="0.112"/>
        <vers num="0.131"/>
      </prod>
      <prod name="koffice" vendor="kde">
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3_beta1"/>
        <vers num="1.3_beta2"/>
        <vers num="1.3_beta3"/>
      </prod>
      <prod name="kpdf" vendor="kde">
        <vers num="3.2"/>
      </prod>
      <prod name="pdftohtml" vendor="pdftohtml">
        <vers num="0.32a"/>
        <vers num="0.32b"/>
        <vers num="0.33"/>
        <vers num="0.33a"/>
        <vers num="0.34"/>
        <vers num="0.35"/>
        <vers num="0.36"/>
      </prod>
      <prod name="tetex" vendor="tetex">
        <vers num="1.0.7"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
      </prod>
      <prod name="xpdf" vendor="xpdf">
        <vers num="0.90"/>
        <vers num="0.91"/>
        <vers num="0.92"/>
        <vers num="0.93"/>
        <vers num="1.0"/>
        <vers num="1.0a"/>
        <vers num="1.1"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.3"/>
        <vers num="3.0"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="kde" vendor="kde">
        <vers num="3.2"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2"/>
        <vers num="3.2.3"/>
        <vers num="3.3"/>
        <vers num="3.3.1"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0890" seq="2004-0890" published="2005-01-10" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reasons: This candidate is a reservation duplicate of another candidate.  Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0891" seq="2004-0891" published="2005-01-27" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gaim.sourceforge.net/security/?id=9" adv="1">http://gaim.sourceforge.net/security/?id=9</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml">GLSA-200410-23</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-604.html" adv="1">RHSA-2004:604</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2188">FLSA:2188</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17786">gaim-msn-slp-bo(17786)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17787">gaim-msn-slp-dos(17787)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17790">gaim-file-transfer-dos(17790)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790">oval:org.mitre.oval:def:11790</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-8-1/">USN-8-1</ref>
    </refs>
    <vuln_soft>
      <prod name="gaim" vendor="rob_flynn">
        <vers num="0.10"/>
        <vers num="0.10.3"/>
        <vers num="0.50"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.55"/>
        <vers num="0.56"/>
        <vers num="0.57"/>
        <vers num="0.58"/>
        <vers num="0.59"/>
        <vers num="0.59.1"/>
        <vers num="0.60"/>
        <vers num="0.61"/>
        <vers num="0.62"/>
        <vers num="0.63"/>
        <vers num="0.64"/>
        <vers num="0.65"/>
        <vers num="0.66"/>
        <vers num="0.67"/>
        <vers num="0.68"/>
        <vers num="0.69"/>
        <vers num="0.70"/>
        <vers num="0.71"/>
        <vers num="0.72"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.75"/>
        <vers num="0.78"/>
        <vers num="0.82"/>
        <vers num="0.82.1"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="slackware_linux" vendor="slackware">
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="10.0"/>
        <vers num="current"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0892" seq="2004-0892" published="2005-01-27" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Microsoft Proxy Server 2.0 and Microsoft ISA Server 2000 (which is included in Small Business Server 2000 and Small Business Server 2003 Premium Edition) allows remote attackers to spoof trusted Internet content on a specially crafted webpage via spoofed reverse DNS lookup results.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11605" adv="1" patch="1">11605</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-039">MS04-039</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17906">isa-cache-reverse-spoof(17906)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4264">oval:org.mitre.oval:def:4264</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4859">oval:org.mitre.oval:def:4859</ref>
    </refs>
    <vuln_soft>
      <prod name="isa_server" vendor="microsoft">
        <vers num="2000" edition="sp1"/>
        <vers num="2000" edition="sp2"/>
      </prod>
      <prod name="proxy_server" vendor="microsoft">
        <vers num="2.0" edition="sp1"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="2000" edition=":small_business_server"/>
        <vers num="2003" edition=":small_business_server"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0893" seq="2004-0893" published="2005-01-10" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044">MS04-044</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18339">win-kernel-lpc-gain-privileges(18339)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1321">oval:org.mitre.oval:def:1321</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1561">oval:org.mitre.oval:def:1561</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1581">oval:org.mitre.oval:def:1581</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1886">oval:org.mitre.oval:def:1886</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2008">oval:org.mitre.oval:def:2008</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4021">oval:org.mitre.oval:def:4021</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4458">oval:org.mitre.oval:def:4458</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A450">oval:org.mitre.oval:def:450</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="datacenter_64-bit" edition="sp1_beta_1"/>
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise" edition="sp1_beta_1"/>
        <vers num="enterprise_64-bit" edition="sp1_beta_1"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="r2" edition="sp1_beta_1"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="standard" edition="sp1_beta_1"/>
        <vers num="web" edition="sp1_beta_1"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition=":enterprise_server"/>
        <vers num="4.0" edition=":server"/>
        <vers num="4.0" edition=":terminal_server"/>
        <vers num="4.0" edition=":workstation"/>
        <vers num="4.0" edition="sp1:enterprise_server"/>
        <vers num="4.0" edition="sp1:server"/>
        <vers num="4.0" edition="sp1:terminal_server"/>
        <vers num="4.0" edition="sp1:workstation"/>
        <vers num="4.0" edition="sp2:enterprise_server"/>
        <vers num="4.0" edition="sp2:server"/>
        <vers num="4.0" edition="sp2:terminal_server"/>
        <vers num="4.0" edition="sp2:workstation"/>
        <vers num="4.0" edition="sp3:enterprise_server"/>
        <vers num="4.0" edition="sp3:server"/>
        <vers num="4.0" edition="sp3:terminal_server"/>
        <vers num="4.0" edition="sp3:workstation"/>
        <vers num="4.0" edition="sp4:enterprise_server"/>
        <vers num="4.0" edition="sp4:server"/>
        <vers num="4.0" edition="sp4:terminal_server"/>
        <vers num="4.0" edition="sp4:workstation"/>
        <vers num="4.0" edition="sp5:enterprise_server"/>
        <vers num="4.0" edition="sp5:server"/>
        <vers num="4.0" edition="sp5:terminal_server"/>
        <vers num="4.0" edition="sp5:workstation"/>
        <vers num="4.0" edition="sp6:enterprise_server"/>
        <vers num="4.0" edition="sp6:server"/>
        <vers num="4.0" edition="sp6:terminal_server"/>
        <vers num="4.0" edition="sp6:workstation"/>
        <vers num="4.0" edition="sp6a:enterprise_server"/>
        <vers num="4.0" edition="sp6a:server"/>
        <vers num="4.0" edition="sp6a:workstation"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":home"/>
        <vers num="" edition=":media_center"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:home"/>
        <vers num="" edition="sp1:media_center"/>
        <vers num="" edition="sp2:home"/>
        <vers num="" edition="sp2:media_center"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0894" seq="2004-0894" published="2005-01-10" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">LSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044">MS04-044</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18340">win-lsass-gain-privileges(18340)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1888">oval:org.mitre.oval:def:1888</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2062">oval:org.mitre.oval:def:2062</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3312">oval:org.mitre.oval:def:3312</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3325">oval:org.mitre.oval:def:3325</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4368">oval:org.mitre.oval:def:4368</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A778">oval:org.mitre.oval:def:778</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="datacenter_64-bit" edition="sp1_beta_1"/>
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise" edition="sp1_beta_1"/>
        <vers num="enterprise_64-bit" edition="sp1_beta_1"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="r2" edition="sp1_beta_1"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="standard" edition="sp1_beta_1"/>
        <vers num="web" edition="sp1_beta_1"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":home"/>
        <vers num="" edition=":media_center"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:home"/>
        <vers num="" edition="sp1:media_center"/>
        <vers num="" edition="sp2:home"/>
        <vers num="" edition="sp2:media_center"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0897" seq="2004-0897" published="2005-01-11" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Indexing Service for Microsoft Windows XP and Server 2003 does not properly validate the length of a message, which allows remote attackers to execute arbitrary code via a buffer overflow attack.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012833">1012833</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-095.shtml" adv="1">P-095</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/657118" adv="1" patch="1">VU#657118</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12228">12228</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-003">MS05-003</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2128">oval:org.mitre.oval:def:2128</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2447">oval:org.mitre.oval:def:2447</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0899" seq="2004-0899" published="2005-01-10" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition, with DHCP logging enabled, does not properly validate the length of certain messages, which allows remote attackers to cause a denial of service (application crash) via a malformed DHCP message, aka "Logging Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-042">MS04-042</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18341">winnt-dhcp-machinename-dos(18341)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2280">oval:org.mitre.oval:def:2280</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4282">oval:org.mitre.oval:def:4282</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition=":alpha"/>
        <vers num="4.0" edition=":enterprise_server"/>
        <vers num="4.0" edition=":server"/>
        <vers num="4.0" edition=":terminal_server"/>
        <vers num="4.0" edition=":terminal_server_alpha"/>
        <vers num="4.0" edition="sp1:alpha"/>
        <vers num="4.0" edition="sp1:enterprise_server"/>
        <vers num="4.0" edition="sp1:server"/>
        <vers num="4.0" edition="sp1:terminal_server"/>
        <vers num="4.0" edition="sp2:alpha"/>
        <vers num="4.0" edition="sp2:enterprise_server"/>
        <vers num="4.0" edition="sp2:server"/>
        <vers num="4.0" edition="sp2:terminal_server"/>
        <vers num="4.0" edition="sp3:alpha"/>
        <vers num="4.0" edition="sp3:enterprise_server"/>
        <vers num="4.0" edition="sp3:server"/>
        <vers num="4.0" edition="sp3:terminal_server"/>
        <vers num="4.0" edition="sp4:alpha"/>
        <vers num="4.0" edition="sp4:enterprise_server"/>
        <vers num="4.0" edition="sp4:server"/>
        <vers num="4.0" edition="sp4:terminal_server"/>
        <vers num="4.0" edition="sp5:alpha"/>
        <vers num="4.0" edition="sp5:enterprise_server"/>
        <vers num="4.0" edition="sp5:server"/>
        <vers num="4.0" edition="sp5:terminal_server"/>
        <vers num="4.0" edition="sp6:alpha"/>
        <vers num="4.0" edition="sp6:enterprise_server"/>
        <vers num="4.0" edition="sp6:server"/>
        <vers num="4.0" edition="sp6:terminal_server"/>
        <vers num="4.0" edition="sp6a:alpha"/>
        <vers num="4.0" edition="sp6a:enterprise_server"/>
        <vers num="4.0" edition="sp6a:server"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0900" seq="2004-0900" published="2005-01-10" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition does not properly validate the length of certain messages, which allows remote attackers to execute arbitrary code via a malformed DHCP message, aka the "DHCP Request Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-042">MS04-042</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18342">winnt-dhcp-hardwareaddress-code-execution(18342)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3577">oval:org.mitre.oval:def:3577</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4846">oval:org.mitre.oval:def:4846</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition=":alpha"/>
        <vers num="4.0" edition=":enterprise_server"/>
        <vers num="4.0" edition=":server"/>
        <vers num="4.0" edition=":terminal_server"/>
        <vers num="4.0" edition=":terminal_server_alpha"/>
        <vers num="4.0" edition="sp1:alpha"/>
        <vers num="4.0" edition="sp1:enterprise_server"/>
        <vers num="4.0" edition="sp1:server"/>
        <vers num="4.0" edition="sp1:terminal_server"/>
        <vers num="4.0" edition="sp2:alpha"/>
        <vers num="4.0" edition="sp2:enterprise_server"/>
        <vers num="4.0" edition="sp2:server"/>
        <vers num="4.0" edition="sp2:terminal_server"/>
        <vers num="4.0" edition="sp3:alpha"/>
        <vers num="4.0" edition="sp3:enterprise_server"/>
        <vers num="4.0" edition="sp3:server"/>
        <vers num="4.0" edition="sp3:terminal_server"/>
        <vers num="4.0" edition="sp4:alpha"/>
        <vers num="4.0" edition="sp4:enterprise_server"/>
        <vers num="4.0" edition="sp4:server"/>
        <vers num="4.0" edition="sp4:terminal_server"/>
        <vers num="4.0" edition="sp5:alpha"/>
        <vers num="4.0" edition="sp5:enterprise_server"/>
        <vers num="4.0" edition="sp5:server"/>
        <vers num="4.0" edition="sp5:terminal_server"/>
        <vers num="4.0" edition="sp6:alpha"/>
        <vers num="4.0" edition="sp6:enterprise_server"/>
        <vers num="4.0" edition="sp6:server"/>
        <vers num="4.0" edition="sp6:terminal_server"/>
        <vers num="4.0" edition="sp6a:alpha"/>
        <vers num="4.0" edition="sp6a:enterprise_server"/>
        <vers num="4.0" edition="sp6a:server"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0901" seq="2004-0901" published="2005-01-10" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-055.shtml">P-055</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=162&amp;type=vulnerabilities&amp;flashstatus=true">20041214 Microsoft Word 6.0/95 Document Converter Buffer Overflow Vulnerability</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-041">MS04-041</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18338">win-converter-font-code-execution(18338)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1241">oval:org.mitre.oval:def:1241</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1655">oval:org.mitre.oval:def:1655</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3310">oval:org.mitre.oval:def:3310</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3882">oval:org.mitre.oval:def:3882</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4076">oval:org.mitre.oval:def:4076</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4576">oval:org.mitre.oval:def:4576</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4749">oval:org.mitre.oval:def:4749</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A539">oval:org.mitre.oval:def:539</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise_64-bit"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="web"/>
      </prod>
      <prod name="windows_98" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
      <prod name="windows_98se" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_me" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition=":enterprise_server"/>
        <vers num="4.0" edition=":server"/>
        <vers num="4.0" edition=":terminal_server"/>
        <vers num="4.0" edition=":workstation"/>
        <vers num="4.0" edition="sp1:enterprise_server"/>
        <vers num="4.0" edition="sp1:server"/>
        <vers num="4.0" edition="sp1:terminal_server"/>
        <vers num="4.0" edition="sp1:workstation"/>
        <vers num="4.0" edition="sp2:enterprise_server"/>
        <vers num="4.0" edition="sp2:server"/>
        <vers num="4.0" edition="sp2:terminal_server"/>
        <vers num="4.0" edition="sp2:workstation"/>
        <vers num="4.0" edition="sp3:enterprise_server"/>
        <vers num="4.0" edition="sp3:server"/>
        <vers num="4.0" edition="sp3:terminal_server"/>
        <vers num="4.0" edition="sp3:workstation"/>
        <vers num="4.0" edition="sp4:enterprise_server"/>
        <vers num="4.0" edition="sp4:server"/>
        <vers num="4.0" edition="sp4:terminal_server"/>
        <vers num="4.0" edition="sp4:workstation"/>
        <vers num="4.0" edition="sp5:enterprise_server"/>
        <vers num="4.0" edition="sp5:server"/>
        <vers num="4.0" edition="sp5:terminal_server"/>
        <vers num="4.0" edition="sp5:workstation"/>
        <vers num="4.0" edition="sp6:enterprise_server"/>
        <vers num="4.0" edition="sp6:server"/>
        <vers num="4.0" edition="sp6:terminal_server"/>
        <vers num="4.0" edition="sp6:workstation"/>
        <vers num="4.0" edition="sp6a:enterprise_server"/>
        <vers num="4.0" edition="sp6a:server"/>
        <vers num="4.0" edition="sp6a:workstation"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":home"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:home"/>
        <vers num="" edition="sp2:home"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0902" seq="2004-0902" published="2005-01-27" modified="2018-05-02" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via (1) the "Send page" functionality, (2) certain responses from a malicious POP3 server, or (3) a link containing a non-ASCII hostname.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=226669">http://bugzilla.mozilla.org/show_bug.cgi?id=226669</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=245066">http://bugzilla.mozilla.org/show_bug.cgi?id=245066</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=256316">http://bugzilla.mozilla.org/show_bug.cgi?id=256316</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=258005">http://bugzilla.mozilla.org/show_bug.cgi?id=258005</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109698896104418&amp;w=2">SSRT4826</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-26.xml">GLSA-200409-26</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html">SUSE-SA:2004:036</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-261A.html" adv="1" patch="1">TA04-261A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17378">mozilla-netscape-nonascii-bo(17378)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17379">mozilla-nspop3protocol-bo(17379)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11201">oval:org.mitre.oval:def:11201</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.7"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.7.3"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="7.3" edition=":i386"/>
        <vers num="7.3" edition=":i686"/>
        <vers num="9.0" edition=":i386"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0903" seq="2004-0903" published="2005-01-27" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the writeGroup function in nsVCardObj.cpp for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows remote attackers to execute arbitrary code via malformed VCard attachments that are not properly handled when previewing a message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=257314" adv="1">http://bugzilla.mozilla.org/show_bug.cgi?id=257314</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109698896104418&amp;w=2">SSRT4826</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-26.xml">GLSA-200409-26</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/414240" adv="1">VU#414240</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html">SUSE-SA:2004:036</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11174" adv="1">11174</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-261A.html">TA04-261A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17380">mozilla-netscape-nsvcardobj-bo(17380)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10873">oval:org.mitre.oval:def:10873</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.7"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.7.3"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="7.3" edition=":i386"/>
        <vers num="7.3" edition=":i686"/>
        <vers num="9.0" edition=":i386"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0904" seq="2004-0904" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to execute arbitrary code via wide bitmap files that trigger heap-based buffer overflows.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=255067" adv="1">http://bugzilla.mozilla.org/show_bug.cgi?id=255067</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109698896104418&amp;w=2">SSRT4826</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-26.xml">GLSA-200409-26</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/847200" adv="1">VU#847200</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html">SUSE-SA:2004:036</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11171" adv="1">11171</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-261A.html">TA04-261A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17381">mozilla-netscape-bmp-bo(17381)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10952">oval:org.mitre.oval:def:10952</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9" edition="rc"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.7" edition="rc3"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.7.3"/>
      </prod>
      <prod name="navigator" vendor="netscape">
        <vers num="7.0"/>
        <vers num="7.0.2"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="7.3" edition=":i386"/>
        <vers num="7.3" edition=":i686"/>
        <vers num="9.0" edition=":i386"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0905" seq="2004-0905" published="2004-09-14" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows remote attackers to perform cross-domain scripting and possibly execute arbitrary code by convincing a user to drag and drop javascript: links to a frame or page in another domain.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=250862" adv="1" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=250862</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109698896104418&amp;w=2">SSRT4826</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-26.xml" adv="1" patch="1">GLSA-200409-26</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/651928" adv="1" patch="1">VU#651928</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3" adv="1">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html" adv="1" patch="1">SUSE-SA:2004:036</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11177" adv="1" patch="1">11177</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-261A.html" adv="1" patch="1">TA04-261A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17374">mozilla-netscape-sameorigin-bypass(17374)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10378">oval:org.mitre.oval:def:10378</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9" edition="rc"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.0" edition="rc1"/>
        <vers num="1.0" edition="rc2"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.2" edition="alpha"/>
        <vers num="1.2" edition="beta"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4" edition="beta"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="1.7" edition="rc3"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
      </prod>
      <prod name="navigator" vendor="netscape">
        <vers num="7.0"/>
        <vers num="7.0.2"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="7.3" edition=":i386"/>
        <vers num="7.3" edition=":i686"/>
        <vers num="9.0" edition=":i386"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0906" seq="2004-0906" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The XPInstall installer in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 sets insecure permissions for certain installed files within xpi packages, which could allow local users to overwrite arbitrary files or execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=231083" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=231083</ref>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=235781" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=235781</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-26.xml">GLSA-200409-26</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/653160" adv="1">VU#653160</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html" adv="1">SUSE-SA:2004:036</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-323.html">RHSA-2005:323</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11192">11192</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17375">mozilla-insecure-file-permissions(17375)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11668">oval:org.mitre.oval:def:11668</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9.2"/>
        <vers num="0.9.2.1"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.4.1"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.35"/>
        <vers num="0.9.48"/>
        <vers num="1.0" edition="rc1"/>
        <vers num="1.0" edition="rc2"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.2" edition="alpha"/>
        <vers num="1.2" edition="beta"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4" edition="beta"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.4"/>
        <vers num="1.5"/>
        <vers num="1.5.1"/>
        <vers num="1.6"/>
        <vers num="1.7" edition="alpha"/>
        <vers num="1.7" edition="beta"/>
        <vers num="1.7" edition="rc1"/>
        <vers num="1.7" edition="rc2"/>
        <vers num="1.7" edition="rc3"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0907" seq="2004-0907" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Linux install .tar.gz archives for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8, create certain files with insecure permissions, which could allow local users to overwrite those files and execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=254303" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=254303</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-26.xml">GLSA-200409-26</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17373">mozilla-tar-insecure-permissions(17373)</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9.2"/>
        <vers num="0.9.2.1"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.4.1"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.35"/>
        <vers num="0.9.48"/>
        <vers num="1.0" edition="rc1"/>
        <vers num="1.0" edition="rc2"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.2" edition="alpha"/>
        <vers num="1.2" edition="beta"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4" edition="beta"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.4"/>
        <vers num="1.5"/>
        <vers num="1.5.1"/>
        <vers num="1.6"/>
        <vers num="1.7" edition="alpha"/>
        <vers num="1.7" edition="beta"/>
        <vers num="1.7" edition="rc1"/>
        <vers num="1.7" edition="rc2"/>
        <vers num="1.7" edition="rc3"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0908" seq="2004-0908" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows untrusted Javascript code to read and write to the clipboard, and possibly obtain sensitive information, via script-generated events such as Ctrl-Ins.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=257523" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=257523</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109698896104418&amp;w=2">SSRT4826</ref>
      <ref source="FEDORA" url="http://marc.info/?l=bugtraq&amp;m=109900315219363&amp;w=2">FLSA:2089</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-26.xml">GLSA-200409-26</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/460528">VU#460528</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html" patch="1">SUSE-SA:2004:036</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11179" patch="1">11179</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17376">mozilla-shortcut-clipboard-access(17376)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9745">oval:org.mitre.oval:def:9745</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9.2"/>
        <vers num="0.9.2.1"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.4.1"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.35"/>
        <vers num="0.9.48"/>
        <vers num="1.0" edition="rc1"/>
        <vers num="1.0" edition="rc2"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.2" edition="alpha"/>
        <vers num="1.2" edition="beta"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4" edition="beta"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.4"/>
        <vers num="1.5"/>
        <vers num="1.5.1"/>
        <vers num="1.6"/>
        <vers num="1.7" edition="alpha"/>
        <vers num="1.7" edition="beta"/>
        <vers num="1.7" edition="rc1"/>
        <vers num="1.7" edition="rc2"/>
        <vers num="1.7" edition="rc3"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0909" seq="2004-0909" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 may allow remote attackers to trick users into performing unexpected actions, including installing software, via signed scripts that request enhanced abilities using the enablePrivilege parameter, then modify the meaning of certain security-relevant dialog messages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=253942">http://bugzilla.mozilla.org/show_bug.cgi?id=253942</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109698896104418&amp;w=2">SSRT4826</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-26.xml">GLSA-200409-26</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/113192" adv="1">VU#113192</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3">http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_36_mozilla.html" adv="1">SUSE-SA:2004:036</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17377">mozilla-enableprivilege-modify-dialog(17377)</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9.2"/>
        <vers num="0.9.2.1"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.4.1"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.35"/>
        <vers num="0.9.48"/>
        <vers num="1.0" edition="rc1"/>
        <vers num="1.0" edition="rc2"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.2" edition="alpha"/>
        <vers num="1.2" edition="beta"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4" edition="beta"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.4"/>
        <vers num="1.5"/>
        <vers num="1.5.1"/>
        <vers num="1.6"/>
        <vers num="1.7" edition="alpha"/>
        <vers num="1.7" edition="beta"/>
        <vers num="1.7" edition="rc1"/>
        <vers num="1.7" edition="rc2"/>
        <vers num="1.7" edition="rc3"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0910" seq="2004-0910" published="2004-11-03" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-0815.  Reason: This candidate is a reservation duplicate of CVE-2004-0815.  Notes: All CVE users should reference CVE-2004-0815 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0911" seq="2004-0911" published="2004-11-03" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">telnetd for netkit 0.17 and earlier, and possibly other versions, on Debian GNU/Linux allows remote attackers to cause a denial of service (free of an invalid pointer), a different vulnerability than CVE-2001-0554.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=273694">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=273694</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-556" adv="1" patch="1">DSA-556</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/375743" adv="1" patch="1">20040918 Debian netkit telnetd vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17540">telnetd-netkit-bo(17540)</ref>
    </refs>
    <vuln_soft>
      <prod name="netkit" vendor="debian">
        <vers num="0.17" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0913" seq="2004-0913" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in ecartis 0.x before 0.129a+1.0.0-snap20020514-1.3 and 1.x before 1.0.0+cvs.20030911-8 allows attackers in the same domain to gain administrator privileges and modify configuration.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4491" patch="1">ESB-2004.0669</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-572" patch="1">DSA-572</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11487" patch="1">11487</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17809">ecartis-gain-privileges(17809)</ref>
    </refs>
    <vuln_soft>
      <prod name="ecartis" vendor="ecartis">
        <vers num="0.129a"/>
        <vers num="1.0.0_snapshot_2002-01-21"/>
        <vers num="1.0.0_snapshot_2002-01-25"/>
        <vers num="1.0.0_snapshot_2002-04-27"/>
        <vers num="1.0.0_snapshot_2002-05-14"/>
        <vers num="1.0.0_snapshot_2002-10-13"/>
        <vers num="1.0.0_snapshot_2003-02-27"/>
        <vers num="1.0.0_snapshot_2003-03-03"/>
        <vers num="1.0.0_snapshot_2003-03-09"/>
        <vers num="1.0.0_snapshot_2003-03-12"/>
        <vers num="1.0.0_snapshot_2003-03-18"/>
        <vers num="1.0.0_snapshot_2003-04-16"/>
        <vers num="1.0.0_snapshot_2003-04-17"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0914" seq="2004-0914" published="2005-01-10" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple vulnerabilities in libXpm for 6.8.1 and earlier, as used in XFree86 and other packages, include (1) multiple integer overflows, (2) out-of-bounds memory accesses, (3) directory traversal, (4) shell metacharacter, (5) endless loops, and (6) memory leaks, which could allow remote attackers to obtain sensitive information, cause a denial of service (application crash), or execute arbitrary code via a certain XPM image file. NOTE: it is highly likely that this candidate will be SPLIT into other candidates in the future, per CVE's content decisions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2004-537.html">RHSA-2004:537</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-607" adv="1" patch="1">DSA-607</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-28.xml" adv="1" patch="1">GLSA-200411-28</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-06.xml">GLSA-200502-06</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-07.xml">GLSA-200502-07</ref>
      <ref source="FEDORA" url="http://www.linuxsecurity.com/content/view/106877/102/">FEDORA-2004-433</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:137">MDKSA-2004:137</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html">FLSA-2006:152803</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-610.html">RHSA-2004:610</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-004.html">RHSA-2005:004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11694" adv="1" patch="1">11694</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-83-1">USN-83-1</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-83-2">USN-83-2</ref>
      <ref source="CONFIRM" url="http://www.x.org/pub/X11R6.8.1/patches/README.xorg-681-CAN-2004-0914.patch">http://www.x.org/pub/X11R6.8.1/patches/README.xorg-681-CAN-2004-0914.patch</ref>
      <ref source="HP" url="http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTU01228">HPSBTU01228</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18142">libxpm-image-bo(18142)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18144">libxpm-improper-memory-access(18144)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18145">libxpm-command-execution(18145)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18146">libxpm-directory-traversal(18146)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18147">libxpm-dos(18147)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9943">oval:org.mitre.oval:def:9943</ref>
    </refs>
    <vuln_soft>
      <prod name="lesstif" vendor="lesstif">
        <vers num="0.93"/>
        <vers num="0.93.12"/>
        <vers num="0.93.18"/>
        <vers num="0.93.34"/>
        <vers num="0.93.36"/>
        <vers num="0.93.40"/>
        <vers num="0.93.91"/>
        <vers num="0.93.94"/>
        <vers num="0.93.96"/>
      </prod>
      <prod name="x11r6" vendor="x.org">
        <vers num="6.7.0"/>
        <vers num="6.8"/>
        <vers num="6.8.1"/>
      </prod>
      <prod name="x11r6" vendor="xfree86_project">
        <vers num="3.3"/>
        <vers num="3.3.2"/>
        <vers num="3.3.3"/>
        <vers num="3.3.4"/>
        <vers num="3.3.5"/>
        <vers num="3.3.6"/>
        <vers num="4.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2.11"/>
        <vers num="4.0.3"/>
        <vers num="4.1.0"/>
        <vers num="4.1.11"/>
        <vers num="4.1.12"/>
        <vers num="4.2.0"/>
        <vers num="4.2.1" edition=":errata"/>
        <vers num="4.3.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0915" seq="2004-0915" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple unknown vulnerabilities in viewcvs before 0.9.2, when exporting a repository as a tar archive, does not properly implement the hide_cvsroot and forbidden settings, which could allow remote attackers to gain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-605" adv="1" patch="1">DSA-605</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18369">viewcvs-repository-weak-security(18369)</ref>
    </refs>
    <vuln_soft>
      <prod name="viewcvs" vendor="viewcvs">
        <vers num="0.9.2"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0916" seq="2004-0916" published="2005-01-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in cabextract before 1.1 allows remote attackers to overwrite arbitrary files via a cabinet file containing .. (dot dot) sequences in a filename.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-574" adv="1" patch="1">DSA-574</ref>
      <ref source="CONFIRM" url="http://www.kyz.uklinux.net/cabextract.php#changes">http://www.kyz.uklinux.net/cabextract.php#changes</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11460" adv="1">11460</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17766">cabextract-directory-traversal(17766)</ref>
    </refs>
    <vuln_soft>
      <prod name="cabextract" vendor="cabextract">
        <vers num="0.2"/>
        <vers num="0.6"/>
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0917" seq="2004-0917" published="2005-01-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The default installation of Vignette Application Portal installs the diagnostic utility without authentication requirements, which allows remote attackers to gain sensitive information, such as server and OS version, and conduct unauthorized activities via an HTTP request to /diag.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011447">1011447</ref>
      <ref source="ATSTAKE" url="http://www.atstake.com/research/advisories/2004/a092804-1.txt" adv="1">A092804-1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11267" adv="1">11267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17530">vignette-diagnostic-obtain-info(17530)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_portal" vendor="vignette">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0918" seq="2004-0918" published="2005-01-27" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt">SCOSA-2005.16</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html">SUSE-SR:2008:014</ref>
      <ref source="OPENPKG" url="http://marc.info/?l=bugtraq&amp;m=109913064629327&amp;w=2">OpenPKG-SA-2004.048</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml">GLSA-200410-15</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=152&amp;type=vulnerabilities&amp;flashstatus=false">20041011 Squid Web Proxy Cache Remote Denial of Service Vulnerability</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-591.html" adv="1" patch="1">RHSA-2004:591</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11385" adv="1" patch="1">11385</ref>
      <ref source="CONFIRM" url="http://www.squid-cache.org/Advisories/SQUID-2004_3.txt">http://www.squid-cache.org/Advisories/SQUID-2004_3.txt</ref>
      <ref source="CONFIRM" url="http://www.squid-cache.org/Advisories/SQUID-2008_1.txt">http://www.squid-cache.org/Advisories/SQUID-2008_1.txt</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/1969/references" adv="1">ADV-2008-1969</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17688">squid-snmp-asnparseheader-dos(17688)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931">oval:org.mitre.oval:def:10931</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html">FEDORA-2008-6045</ref>
    </refs>
    <vuln_soft>
      <prod name="openpkg" vendor="openpkg">
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="current"/>
      </prod>
      <prod name="squid" vendor="squid">
        <vers num="2.0_patch2"/>
        <vers num="2.1_patch2"/>
        <vers num="2.3_.stable4"/>
        <vers num="2.3_.stable5"/>
        <vers num="2.4"/>
        <vers num="2.4_.stable2"/>
        <vers num="2.4_.stable6"/>
        <vers num="2.4_.stable7"/>
        <vers num="2.5_.stable1"/>
        <vers num="2.5_.stable3"/>
        <vers num="2.5_.stable4"/>
        <vers num="2.5_.stable5"/>
        <vers num="2.5_.stable6"/>
        <vers num="3.0_pre1"/>
        <vers num="3.0_pre2"/>
        <vers num="3.0_pre3"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0919" seq="2004-0919" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The syscons CONS_SCRSHOT ioctl in FreeBSD 5.x allows local users to read arbitrary kernel memory via (1) negative coordinates or (2) large coordinates.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:15.syscons.asc" patch="1">FreeBSD-SA-04:15</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/969078" adv="1">VU#969078</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11321" patch="1">11321</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17584">syscons-consscrshot-info-disclosure(17584)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="5.0" edition="alpha"/>
        <vers num="5.0" edition="release_p14"/>
        <vers num="5.0" edition="releng"/>
        <vers num="5.1" edition="alpha"/>
        <vers num="5.1" edition="release"/>
        <vers num="5.1" edition="release_p5"/>
        <vers num="5.1" edition="releng"/>
        <vers num="5.2"/>
        <vers num="5.2.1" edition="release"/>
        <vers num="5.2.1" edition="releng"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0920" seq="2004-0920" published="2004-11-03" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Symantec Norton AntiVirus 2004, and earlier versions, allows a virus or other malicious code to avoid detection or cause a denial of service (application crash) using a filename containing an MS-DOS device name.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=147&amp;type=vulnerabilities">20041005 Symantec Norton AntiVirus Reserved Device Name Handling Vulnerability</ref>
      <ref source="MISC" url="http://www.seifried.org/security/advisories/kssa-010.html">http://www.seifried.org/security/advisories/kssa-010.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17603">nav-antivirus-security-bypass(17603)</ref>
    </refs>
    <vuln_soft>
      <prod name="norton_antivirus" vendor="symantec">
        <vers num="2.1" prev="1" edition=":ms_exchange"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0921" seq="2004-0921" published="2005-01-27" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">AFP Server on Mac OS X 10.3.x to 10.3.5, when a guest has mounted an AFP volume, allows the guest to "terminate authenticated user mounts" via modified SessionDestroy packets.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html" adv="1" patch="1">APPLE-SA-2004-09-30</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11322" adv="1" patch="1">11322</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="5.0.2"/>
        <vers num="6.0"/>
        <vers num="6.1"/>
        <vers num="6.5"/>
        <vers num="6.5.1"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0922" seq="2004-0922" published="2005-01-27" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">AFP Server on Mac OS X 10.3.x to 10.3.5, under certain conditions, does not properly set the guest group ID, which causes AFP to change a write-only AFP Drop Box to be read-write when the Drop Box is on a share that is mounted by a guest, which allows attackers to read the Drop Box.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html" adv="1" patch="1">APPLE-SA-2004-09-30</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11322" adv="1" patch="1">11322</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="5.0.2"/>
        <vers num="6.0"/>
        <vers num="6.1"/>
        <vers num="6.5"/>
        <vers num="6.5.1"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0923" seq="2004-0923" published="2005-01-27" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">CUPS 1.1.20 and earlier records authentication information for a device URI in the error_log file, which allows local users to obtain user names and passwords.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html">APPLE-SA-2004-09-30</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-002.shtml">P-002</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-566">DSA-566</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/557062" adv="1">VU#557062</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:116">MDKSA-2004:116</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-543.html" adv="1" patch="1">RHSA-2004:543</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11324" adv="1" patch="1">11324</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17593">cups-password-disclosure(17593)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10710">oval:org.mitre.oval:def:10710</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.0.4"/>
        <vers num="1.0.4_8"/>
        <vers num="1.1.1"/>
        <vers num="1.1.4"/>
        <vers num="1.1.4_2"/>
        <vers num="1.1.4_3"/>
        <vers num="1.1.4_5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.10"/>
        <vers num="1.1.12"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.19_rc5"/>
        <vers num="1.1.20"/>
        <vers num="1.1.21"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0924" seq="2004-0924" published="2005-01-27" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">NetInfo Manager on Mac OS X 10.3.x through 10.3.5, after an initial root login, reports the root account as being disabled, even when it has not.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html" adv="1" patch="1">APPLE-SA-2004-09-30</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11322" adv="1">11322</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.0.4"/>
        <vers num="1.0.4_8"/>
        <vers num="1.1.1"/>
        <vers num="1.1.4"/>
        <vers num="1.1.4_2"/>
        <vers num="1.1.4_3"/>
        <vers num="1.1.4_5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.10"/>
        <vers num="1.1.12"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.19_rc5"/>
        <vers num="1.1.20"/>
        <vers num="1.1.21"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0925" seq="2004-0925" published="2005-01-27" modified="2008-09-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Postfix on Mac OS X 10.3.x through 10.3.5, with SMTPD AUTH enabled, does not properly clear the username between authentication attempts, which allows users with the longest username to prevent other valid users from being able to authenticate.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html" adv="1" patch="1">APPLE-SA-2004-09-30</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0926" seq="2004-0926" published="2005-01-27" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Apple QuickTime on Mac OS 10.2.8 through 10.3.5 may allow remote attackers to execute arbitrary code via a certain BMP image.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html" adv="1" patch="1">APPLE-SA-2004-09-30</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Oct/msg00001.html">APPLE-SA-2004-10-27</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11322" adv="1" patch="1">11322</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.0.4"/>
        <vers num="1.0.4_8"/>
        <vers num="1.1.1"/>
        <vers num="1.1.4"/>
        <vers num="1.1.4_2"/>
        <vers num="1.1.4_3"/>
        <vers num="1.1.4_5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.10"/>
        <vers num="1.1.12"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.19_rc5"/>
        <vers num="1.1.20"/>
        <vers num="1.1.21"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0927" seq="2004-0927" published="2005-01-27" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ServerAdmin in Mac OS X 10.2.8 through 10.3.5 uses the same example self-signed certificate on each system, which allows remote attackers to decrypt sessions.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html" adv="1" patch="1">APPLE-SA-2004-09-30</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11322">11322</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.0.4"/>
        <vers num="1.0.4_8"/>
        <vers num="1.1.1"/>
        <vers num="1.1.4"/>
        <vers num="1.1.4_2"/>
        <vers num="1.1.4_3"/>
        <vers num="1.1.4_5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.10"/>
        <vers num="1.1.12"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.19_rc5"/>
        <vers num="1.1.20"/>
        <vers num="1.1.21"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0928" seq="2004-0928" published="2004-10-05" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Microsoft IIS Connector in JRun 4.0 and Macromedia ColdFusion MX 6.0, 6.1, and 6.1 J2EE allows remote attackers to bypass authentication and view source files, such as .asp, .pl, and .php files, via an HTTP request that ends in ";.cfm".</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109621995623823&amp;w=2">20040923 New Macromedia Security Zone Bulletins Posted</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=148&amp;type=vulnerabilities" adv="1" patch="1">20041005 ColdFusion MX 6.1 on IIS File Contents Disclosure</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/977440" adv="1" patch="1">VU#977440</ref>
      <ref source="CONFIRM" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" adv="1" patch="1">http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html</ref>
      <ref source="CONFIRM" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html" adv="1" patch="1">http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11245" adv="1" patch="1">11245</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17484">coldfusion-jrun-restriction-bypass(17484)</ref>
    </refs>
    <vuln_soft>
      <prod name="cosminexus_enterprise" vendor="hitachi">
        <vers num="01_01_1" edition=":enterprise"/>
        <vers num="01_01_1" edition=":standard"/>
        <vers num="01_02_2" edition=":enterprise"/>
        <vers num="01_02_2" edition=":standard"/>
      </prod>
      <prod name="cosminexus_server" vendor="hitachi">
        <vers num="web_01-01_1"/>
        <vers num="web_01-01_2"/>
      </prod>
      <prod name="coldfusion" vendor="macromedia">
        <vers num="6.0"/>
        <vers num="6.1"/>
      </prod>
      <prod name="jrun" vendor="macromedia">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0929" seq="2004-0929" published="2005-01-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the OJPEGVSetField function in tif_ojpeg.c for libtiff 3.6.1 and earlier, when compiled with the OJPEG_SUPPORT (old JPEG support) option, allows remote attackers to execute arbitrary code via a malformed TIFF image.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=154&amp;type=vulnerabilities" adv="1" patch="1">20041022 Novell SuSe Linux LibTIFF Heap Overflow Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/129910">VU#129910</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_38_libtiff.html">SUSE-SA:2004:038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17843">libtiff-ojpegvsetfield-bo(17843)</ref>
    </refs>
    <vuln_soft>
      <prod name="libtiff" vendor="libtiff">
        <vers num="3.6.1"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0930" seq="2004-0930" published="2005-01-27" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt">SCOSA-2005.17</ref>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P">20041201-01-P</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000899">CLA-2004:899</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html">APPLE-SA-2005-03-21</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109993720717957&amp;w=2">20041108 [SECURITY] CAN-2004-0930: Potential Remote Denial of Service Vulnerability</ref>
      <ref source="OPENPKG" url="http://marc.info/?l=bugtraq&amp;m=110330519803655&amp;w=2">OpenPKG-SA-2004.054</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101783-1">101783</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-21.xml">GLSA 200411-21</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=156&amp;type=vulnerabilities&amp;flashstatus=false" adv="1" patch="1">20041108 Samba SMBD Remote Denial of Service Vulnerability</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:131">MDKSA-2004:131</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_40_samba.html">SUSE-SA:2004:040</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11624" adv="1" patch="1">11624</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17987">samba-msfnmatch-dos(17987)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10936">oval:org.mitre.oval:def:10936</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-22-1/">USN-22-1</ref>
    </refs>
    <vuln_soft>
      <prod name="samba" vendor="samba">
        <vers num="3.0.0"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.0.7"/>
      </prod>
      <prod name="samba" vendor="sgi">
        <vers num="3.0" edition=":irix"/>
        <vers num="3.0.1" edition=":irix"/>
        <vers num="3.0.2" edition=":irix"/>
        <vers num="3.0.3" edition=":irix"/>
        <vers num="3.0.4" edition=":irix"/>
        <vers num="3.0.5" edition=":irix"/>
        <vers num="3.0.6" edition=":irix"/>
        <vers num="3.0.7" edition=":irix"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="10.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0931" seq="2004-0931" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">MySQL MaxDB before 7.5.00.18 allows remote attackers to cause a denial of service (crash) via an HTTP request to webdbm with high ASCII values in the Server field, which triggers an assert error in the IsAscii7 function.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=150&amp;type=vulnerabilities&amp;flashstatus=false">20041006 MySQL MaxDB Web Agent WebDBMServer Name Denial of Service Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11346" patch="1">11346</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17633">maxdb-isascii7dos(17633)</ref>
    </refs>
    <vuln_soft>
      <prod name="maxdb" vendor="mysql">
        <vers num="7.5.00.08"/>
        <vers num="7.5.00.11"/>
        <vers num="7.5.00.12"/>
        <vers num="7.5.00.14"/>
        <vers num="7.5.00.15"/>
        <vers num="7.5.00.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0932" seq="2004-0932" published="2005-01-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">McAfee Anti-Virus Engine DATS drivers before 4398 released on Oct 13th 2004 and DATS Driver before 4397 October 6th 2004 allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=153&amp;type=vulnerabilities&amp;flashstatus=true">20041018 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11448" adv="1" patch="1">11448</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17761">antivirus-zip-protection-bypass(17761)</ref>
    </refs>
    <vuln_soft>
      <prod name="archive_zip" vendor="archive_zip">
        <vers num="1.13"/>
      </prod>
      <prod name="brightstor_arcserve_backup" vendor="ca">
        <vers num="11.1"/>
      </prod>
      <prod name="etrust_antivirus" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.0_sp2"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_antivirus_gateway" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_ez_antivirus" vendor="ca">
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.3"/>
      </prod>
      <prod name="etrust_ez_armor" vendor="ca">
        <vers num="2.0"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="etrust_intrusion_detection" vendor="ca">
        <vers num="1.4.1.13"/>
        <vers num="1.4.5"/>
        <vers num="1.5"/>
      </prod>
      <prod name="etrust_secure_content_manager" vendor="ca">
        <vers num="1.0" edition="sp1"/>
        <vers num="1.1"/>
      </prod>
      <prod name="inoculateit" vendor="ca">
        <vers num="6.0"/>
      </prod>
      <prod name="nod32_antivirus" vendor="eset_software">
        <vers num="1.0.11"/>
        <vers num="1.0.12"/>
        <vers num="1.0.13"/>
      </prod>
      <prod name="kaspersky_anti-virus" vendor="kaspersky_lab">
        <vers num="3.0"/>
        <vers num="4.0"/>
        <vers num="5.0"/>
      </prod>
      <prod name="antivirus_engine" vendor="mcafee">
        <vers num="4.3.20"/>
      </prod>
      <prod name="rav_antivirus_desktop" vendor="rav_antivirus">
        <vers num="8.6"/>
      </prod>
      <prod name="rav_antivirus_for_file_servers" vendor="rav_antivirus">
        <vers num="1.0"/>
      </prod>
      <prod name="rav_antivirus_for_mail_servers" vendor="rav_antivirus">
        <vers num="8.4.2"/>
      </prod>
      <prod name="sophos_anti-virus" vendor="sophos">
        <vers num="3.4.6"/>
        <vers num="3.78"/>
        <vers num="3.78d"/>
        <vers num="3.79"/>
        <vers num="3.80"/>
        <vers num="3.81"/>
        <vers num="3.82"/>
        <vers num="3.83"/>
        <vers num="3.84"/>
        <vers num="3.85"/>
        <vers num="3.86"/>
      </prod>
      <prod name="sophos_puremessage_anti-virus" vendor="sophos">
        <vers num="4.6"/>
      </prod>
      <prod name="sophos_small_business_suite" vendor="sophos">
        <vers num="1.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0933" seq="2004-0933" published="2005-01-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp">http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=153&amp;type=vulnerabilities&amp;flashstatus=true">20041018 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11448" adv="1" patch="1">11448</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17761">antivirus-zip-protection-bypass(17761)</ref>
    </refs>
    <vuln_soft>
      <prod name="archive_zip" vendor="archive_zip">
        <vers num="1.13"/>
      </prod>
      <prod name="brightstor_arcserve_backup" vendor="ca">
        <vers num="11.1"/>
      </prod>
      <prod name="etrust_antivirus" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.0_sp2"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_antivirus_gateway" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_ez_antivirus" vendor="ca">
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.3"/>
      </prod>
      <prod name="etrust_ez_armor" vendor="ca">
        <vers num="2.0"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="etrust_intrusion_detection" vendor="ca">
        <vers num="1.4.1.13"/>
        <vers num="1.4.5"/>
        <vers num="1.5"/>
      </prod>
      <prod name="etrust_secure_content_manager" vendor="ca">
        <vers num="1.0" edition="sp1"/>
        <vers num="1.1"/>
      </prod>
      <prod name="inoculateit" vendor="ca">
        <vers num="6.0"/>
      </prod>
      <prod name="nod32_antivirus" vendor="eset_software">
        <vers num="1.0.11"/>
        <vers num="1.0.12"/>
        <vers num="1.0.13"/>
      </prod>
      <prod name="kaspersky_anti-virus" vendor="kaspersky_lab">
        <vers num="3.0"/>
        <vers num="4.0"/>
        <vers num="5.0"/>
      </prod>
      <prod name="antivirus_engine" vendor="mcafee">
        <vers num="4.3.20"/>
      </prod>
      <prod name="rav_antivirus_desktop" vendor="rav_antivirus">
        <vers num="8.6"/>
      </prod>
      <prod name="rav_antivirus_for_file_servers" vendor="rav_antivirus">
        <vers num="1.0"/>
      </prod>
      <prod name="rav_antivirus_for_mail_servers" vendor="rav_antivirus">
        <vers num="8.4.2"/>
      </prod>
      <prod name="sophos_anti-virus" vendor="sophos">
        <vers num="3.4.6"/>
        <vers num="3.78"/>
        <vers num="3.78d"/>
        <vers num="3.79"/>
        <vers num="3.80"/>
        <vers num="3.81"/>
        <vers num="3.82"/>
        <vers num="3.83"/>
        <vers num="3.84"/>
        <vers num="3.85"/>
        <vers num="3.86"/>
      </prod>
      <prod name="sophos_puremessage_anti-virus" vendor="sophos">
        <vers num="4.6"/>
      </prod>
      <prod name="sophos_small_business_suite" vendor="sophos">
        <vers num="1.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0934" seq="2004-0934" published="2005-01-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Kaspersky 3.x to 4.x allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=153&amp;type=vulnerabilities&amp;flashstatus=true">20041018 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/968818">VU#968818</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11448" adv="1" patch="1">11448</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17761">antivirus-zip-protection-bypass(17761)</ref>
    </refs>
    <vuln_soft>
      <prod name="archive_zip" vendor="archive_zip">
        <vers num="1.13"/>
      </prod>
      <prod name="brightstor_arcserve_backup" vendor="ca">
        <vers num="11.1"/>
      </prod>
      <prod name="etrust_antivirus" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.0_sp2"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_antivirus_gateway" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_ez_antivirus" vendor="ca">
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.3"/>
      </prod>
      <prod name="etrust_ez_armor" vendor="ca">
        <vers num="2.0"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="etrust_intrusion_detection" vendor="ca">
        <vers num="1.4.1.13"/>
        <vers num="1.4.5"/>
        <vers num="1.5"/>
      </prod>
      <prod name="etrust_secure_content_manager" vendor="ca">
        <vers num="1.0" edition="sp1"/>
        <vers num="1.1"/>
      </prod>
      <prod name="inoculateit" vendor="ca">
        <vers num="6.0"/>
      </prod>
      <prod name="nod32_antivirus" vendor="eset_software">
        <vers num="1.0.11"/>
        <vers num="1.0.12"/>
        <vers num="1.0.13"/>
      </prod>
      <prod name="kaspersky_anti-virus" vendor="kaspersky_lab">
        <vers num="3.0"/>
        <vers num="4.0"/>
        <vers num="5.0"/>
      </prod>
      <prod name="antivirus_engine" vendor="mcafee">
        <vers num="4.3.20"/>
      </prod>
      <prod name="rav_antivirus_desktop" vendor="rav_antivirus">
        <vers num="8.6"/>
      </prod>
      <prod name="rav_antivirus_for_file_servers" vendor="rav_antivirus">
        <vers num="1.0"/>
      </prod>
      <prod name="rav_antivirus_for_mail_servers" vendor="rav_antivirus">
        <vers num="8.4.2"/>
      </prod>
      <prod name="sophos_anti-virus" vendor="sophos">
        <vers num="3.4.6"/>
        <vers num="3.78"/>
        <vers num="3.78d"/>
        <vers num="3.79"/>
        <vers num="3.80"/>
        <vers num="3.81"/>
        <vers num="3.82"/>
        <vers num="3.83"/>
        <vers num="3.84"/>
        <vers num="3.85"/>
        <vers num="3.86"/>
      </prod>
      <prod name="sophos_puremessage_anti-virus" vendor="sophos">
        <vers num="4.6"/>
      </prod>
      <prod name="sophos_small_business_suite" vendor="sophos">
        <vers num="1.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0935" seq="2004-0935" published="2005-01-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Eset Anti-Virus before 1.020 (16th September 2004) allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=153&amp;type=vulnerabilities&amp;flashstatus=true">20041018 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/968818">VU#968818</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11448" adv="1" patch="1">11448</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17761">antivirus-zip-protection-bypass(17761)</ref>
    </refs>
    <vuln_soft>
      <prod name="archive_zip" vendor="archive_zip">
        <vers num="1.13"/>
      </prod>
      <prod name="brightstor_arcserve_backup" vendor="ca">
        <vers num="11.1"/>
      </prod>
      <prod name="etrust_antivirus" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.0_sp2"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_antivirus_gateway" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_ez_antivirus" vendor="ca">
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.3"/>
      </prod>
      <prod name="etrust_ez_armor" vendor="ca">
        <vers num="2.0"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="etrust_intrusion_detection" vendor="ca">
        <vers num="1.4.1.13"/>
        <vers num="1.4.5"/>
        <vers num="1.5"/>
      </prod>
      <prod name="etrust_secure_content_manager" vendor="ca">
        <vers num="1.0" edition="sp1"/>
        <vers num="1.1"/>
      </prod>
      <prod name="inoculateit" vendor="ca">
        <vers num="6.0"/>
      </prod>
      <prod name="nod32_antivirus" vendor="eset_software">
        <vers num="1.0.11"/>
        <vers num="1.0.12"/>
        <vers num="1.0.13"/>
      </prod>
      <prod name="kaspersky_anti-virus" vendor="kaspersky_lab">
        <vers num="3.0"/>
        <vers num="4.0"/>
        <vers num="5.0"/>
      </prod>
      <prod name="antivirus_engine" vendor="mcafee">
        <vers num="4.3.20"/>
      </prod>
      <prod name="rav_antivirus_desktop" vendor="rav_antivirus">
        <vers num="8.6"/>
      </prod>
      <prod name="rav_antivirus_for_file_servers" vendor="rav_antivirus">
        <vers num="1.0"/>
      </prod>
      <prod name="rav_antivirus_for_mail_servers" vendor="rav_antivirus">
        <vers num="8.4.2"/>
      </prod>
      <prod name="sophos_anti-virus" vendor="sophos">
        <vers num="3.4.6"/>
        <vers num="3.78"/>
        <vers num="3.78d"/>
        <vers num="3.79"/>
        <vers num="3.80"/>
        <vers num="3.81"/>
        <vers num="3.82"/>
        <vers num="3.83"/>
        <vers num="3.84"/>
        <vers num="3.85"/>
        <vers num="3.86"/>
      </prod>
      <prod name="sophos_puremessage_anti-virus" vendor="sophos">
        <vers num="4.6"/>
      </prod>
      <prod name="sophos_small_business_suite" vendor="sophos">
        <vers num="1.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0936" seq="2004-0936" published="2005-01-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">RAV antivirus allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=153&amp;type=vulnerabilities&amp;flashstatus=true">20041018 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/968818">VU#968818</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11448" adv="1" patch="1">11448</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17761">antivirus-zip-protection-bypass(17761)</ref>
    </refs>
    <vuln_soft>
      <prod name="archive_zip" vendor="archive_zip">
        <vers num="1.13"/>
      </prod>
      <prod name="brightstor_arcserve_backup" vendor="ca">
        <vers num="11.1"/>
      </prod>
      <prod name="etrust_antivirus" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.0_sp2"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_antivirus_gateway" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_ez_antivirus" vendor="ca">
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.3"/>
      </prod>
      <prod name="etrust_ez_armor" vendor="ca">
        <vers num="2.0"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="etrust_intrusion_detection" vendor="ca">
        <vers num="1.4.1.13"/>
        <vers num="1.4.5"/>
        <vers num="1.5"/>
      </prod>
      <prod name="etrust_secure_content_manager" vendor="ca">
        <vers num="1.0" edition="sp1"/>
        <vers num="1.1"/>
      </prod>
      <prod name="inoculateit" vendor="ca">
        <vers num="6.0"/>
      </prod>
      <prod name="nod32_antivirus" vendor="eset_software">
        <vers num="1.0.11"/>
        <vers num="1.0.12"/>
        <vers num="1.0.13"/>
      </prod>
      <prod name="kaspersky_anti-virus" vendor="kaspersky_lab">
        <vers num="3.0"/>
        <vers num="4.0"/>
        <vers num="5.0"/>
      </prod>
      <prod name="antivirus_engine" vendor="mcafee">
        <vers num="4.3.20"/>
      </prod>
      <prod name="rav_antivirus_desktop" vendor="rav_antivirus">
        <vers num="8.6"/>
      </prod>
      <prod name="rav_antivirus_for_file_servers" vendor="rav_antivirus">
        <vers num="1.0"/>
      </prod>
      <prod name="rav_antivirus_for_mail_servers" vendor="rav_antivirus">
        <vers num="8.4.2"/>
      </prod>
      <prod name="sophos_anti-virus" vendor="sophos">
        <vers num="3.4.6"/>
        <vers num="3.78"/>
        <vers num="3.78d"/>
        <vers num="3.79"/>
        <vers num="3.80"/>
        <vers num="3.81"/>
        <vers num="3.82"/>
        <vers num="3.83"/>
        <vers num="3.84"/>
        <vers num="3.85"/>
        <vers num="3.86"/>
      </prod>
      <prod name="sophos_puremessage_anti-virus" vendor="sophos">
        <vers num="4.6"/>
      </prod>
      <prod name="sophos_small_business_suite" vendor="sophos">
        <vers num="1.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0937" seq="2004-0937" published="2005-02-09" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Sophos Anti-Virus before 3.87.0, and Sophos Anti-Virus for Windows 95, 98, and Me before 3.88.0, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=153&amp;type=vulnerabilities&amp;flashstatus=true">20041018 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/968818">VU#968818</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11448" adv="1" patch="1">11448</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17761">antivirus-zip-protection-bypass(17761)</ref>
    </refs>
    <vuln_soft>
      <prod name="archive_zip" vendor="archive_zip">
        <vers num="1.13"/>
      </prod>
      <prod name="brightstor_arcserve_backup" vendor="ca">
        <vers num="11.1"/>
      </prod>
      <prod name="etrust_antivirus" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.0_sp2"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_antivirus_gateway" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_ez_antivirus" vendor="ca">
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.3"/>
      </prod>
      <prod name="etrust_ez_armor" vendor="ca">
        <vers num="2.0"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="etrust_intrusion_detection" vendor="ca">
        <vers num="1.4.1.13"/>
        <vers num="1.4.5"/>
        <vers num="1.5"/>
      </prod>
      <prod name="etrust_secure_content_manager" vendor="ca">
        <vers num="1.0" edition="sp1"/>
        <vers num="1.1"/>
      </prod>
      <prod name="inoculateit" vendor="ca">
        <vers num="6.0"/>
      </prod>
      <prod name="nod32_antivirus" vendor="eset_software">
        <vers num="1.0.11"/>
        <vers num="1.0.12"/>
        <vers num="1.0.13"/>
      </prod>
      <prod name="kaspersky_anti-virus" vendor="kaspersky_lab">
        <vers num="3.0"/>
        <vers num="4.0"/>
        <vers num="5.0"/>
      </prod>
      <prod name="antivirus_engine" vendor="mcafee">
        <vers num="4.3.20"/>
      </prod>
      <prod name="rav_antivirus_desktop" vendor="rav_antivirus">
        <vers num="8.6"/>
      </prod>
      <prod name="rav_antivirus_for_file_servers" vendor="rav_antivirus">
        <vers num="1.0"/>
      </prod>
      <prod name="rav_antivirus_for_mail_servers" vendor="rav_antivirus">
        <vers num="8.4.2"/>
      </prod>
      <prod name="sophos_anti-virus" vendor="sophos">
        <vers num="3.4.6"/>
        <vers num="3.78"/>
        <vers num="3.78d"/>
        <vers num="3.79"/>
        <vers num="3.80"/>
        <vers num="3.81"/>
        <vers num="3.82"/>
        <vers num="3.83"/>
        <vers num="3.84"/>
        <vers num="3.85"/>
        <vers num="3.86"/>
      </prod>
      <prod name="sophos_puremessage_anti-virus" vendor="sophos">
        <vers num="4.6"/>
      </prod>
      <prod name="sophos_small_business_suite" vendor="sophos">
        <vers num="1.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0938" seq="2004-0938" published="2004-11-03" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-29.xml" adv="1" patch="1">GLSA-200409-29</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/541574" adv="1" patch="1">VU#541574</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11222" adv="1" patch="1">11222</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17440">freeradius-dos(17440)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10837">oval:org.mitre.oval:def:10837</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1347">oval:org.mitre.oval:def:1347</ref>
    </refs>
    <vuln_soft>
      <prod name="freeradius" vendor="freeradius">
        <vers num="1.0.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0939" seq="2004-0939" published="2005-02-09" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">changepassword.cgi in Neoteris Instant Virtual Extranet (IVE) 3.x and 4.x, with LDAP authentication or NT domain authentication enabled, does not limit the number of times a bad password can be entered, which allows remote attackers to guess passwords via a brute force attack.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109709990708794&amp;w=2">20041006 [GoSecure Advisory] Neoteris IVE Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011552">1011552</ref>
      <ref source="MISC" url="http://www.gosecure.ca/SecInfo/gosecure-2004-10.txt">http://www.gosecure.ca/SecInfo/gosecure-2004-10.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17629">juniper-netscreen-password-bruteforce(17629)</ref>
    </refs>
    <vuln_soft>
      <prod name="instant_virtual_extranet" vendor="neoteris">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0940" seq="2004-0940" published="2005-02-09" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="OPENPKG" url="http://marc.info/?l=bugtraq&amp;m=109906660225051&amp;w=2">OpenPKG-SA-2004.047</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011783">1011783</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1">102197</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm">http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm</ref>
      <ref source="CONFIRM" url="http://www.apacheweek.com/features/security-13">http://www.apacheweek.com/features/security-13</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-594">DSA-594</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:134">MDKSA-2004:134</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-600.html">RHSA-2004:600</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-816.html">RHSA-2005:816</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11471" adv="1" patch="1">11471</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/0789">ADV-2006-0789</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17785">apache-modinclude-bo(17785)</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.6"/>
        <vers num="1.3.7" edition=":dev"/>
        <vers num="1.3.9"/>
        <vers num="1.3.11"/>
        <vers num="1.3.12"/>
        <vers num="1.3.14"/>
        <vers num="1.3.17"/>
        <vers num="1.3.18"/>
        <vers num="1.3.19"/>
        <vers num="1.3.20"/>
        <vers num="1.3.22"/>
        <vers num="1.3.23"/>
        <vers num="1.3.24"/>
        <vers num="1.3.25"/>
        <vers num="1.3.26"/>
        <vers num="1.3.27"/>
        <vers num="1.3.28"/>
        <vers num="1.3.29"/>
        <vers num="1.3.31"/>
        <vers num="1.3.32"/>
      </prod>
      <prod name="openpkg" vendor="openpkg">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="current"/>
      </prod>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.00"/>
        <vers num="11.11"/>
        <vers num="11.20"/>
        <vers num="11.22"/>
      </prod>
      <prod name="slackware_linux" vendor="slackware">
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="10.0"/>
        <vers num="current"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0941" seq="2004-0941" published="2005-02-09" modified="2018-05-02" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and earlier may allow remote attackers to execute arbitrary code via malformed image files that trigger the overflows due to improper calls to the gdMalloc function, a different set of vulnerabilities than CVE-2004-0990.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-071.shtml">P-071</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-601">DSA-601</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:113">MDKSA-2006:113</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:114">MDKSA-2006:114</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:122">MDKSA-2006:122</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-638.html">RHSA-2004:638</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2006-0194.html">RHSA-2006:0194</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11663" adv="1" patch="1">11663</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0058" adv="1" patch="1">2004-0058</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18048">gd-graphics-gdmalloc-bo(18048)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11176">oval:org.mitre.oval:def:11176</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1195">oval:org.mitre.oval:def:1195</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-25-1/">USN-25-1</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-33-1/">USN-33-1</ref>
    </refs>
    <vuln_soft>
      <prod name="gdlib" vendor="gd_graphics_library">
        <vers num="1.8.4"/>
        <vers num="2.0.1"/>
        <vers num="2.0.20"/>
        <vers num="2.0.21"/>
        <vers num="2.0.22"/>
        <vers num="2.0.23"/>
        <vers num="2.0.26"/>
        <vers num="2.0.27"/>
        <vers num="2.0.28"/>
        <vers num="2.0.33"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0942" seq="2004-0942" published="2005-02-09" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html">APPLE-SA-2005-08-17</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html">APPLE-SA-2005-08-15</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028248.html">20041101 DoS in Apache 2.0.52 ?</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=110384374213596&amp;w=2">SSRT4876</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1">102198</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm">http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:135">MDKSA-2004:135</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-562.html">RHSA-2004:562</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0061/">2004-0061</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/0789">ADV-2006-0789</ref>
      <ref source="HP" url="http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX01123">HPSBUX01123</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17930">apache-http-get-dos(17930)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10962">oval:org.mitre.oval:def:10962</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0.52" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0943" seq="2004-0943" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0944" seq="2004-0944" published="2004-02-28" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The web management interface for Mitel 3300 Integrated Communications Platform (ICP) before 4.2.2.11 generates easily predictable web session IDs, which allows remote attackers to hijack other sessions via the parentsessionid cookie.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.corsaire.com/advisories/c040817-002.txt" adv="1">http://www.corsaire.com/advisories/c040817-002.txt</ref>
      <ref source="CONFIRM" url="http://www.mitel.com/DocController?documentId=14223" adv="1" patch="1">http://www.mitel.com/DocController?documentId=14223</ref>
      <ref source="MISC" url="http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en" adv="1" patch="1">http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0945" seq="2004-0945" published="2005-02-28" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The web management interface for Mitel 3300 Integrated Communications Platform (ICP) before 4.2.2.11 allows remote authenticated users to cause a denial of service (resource exhaustion) via a large number of active sessions, which exceeds ICP's maximum.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.corsaire.com/advisories/c040817-003.txt" adv="1">http://www.corsaire.com/advisories/c040817-003.txt</ref>
      <ref source="CONFIRM" url="http://www.mitel.com/DocController?documentId=14223" adv="1">http://www.mitel.com/DocController?documentId=14223</ref>
      <ref source="MISC" url="http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en" adv="1">http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en</ref>
    </refs>
    <vuln_soft>
      <prod name="mitel_3300_integrated_communication_platform" vendor="mitel">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0946" seq="2004-0946" published="2005-01-10" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">rquotad in nfs-utils (rquota_server.c) before 1.0.6-r6 on 64-bit architectures does not properly perform an integer conversion, which leads to a stack-based buffer overflow and allows remote attackers to execute arbitrary code via a crafted NFS request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.gentoo.org/show_bug.cgi?id=72113">http://bugs.gentoo.org/show_bug.cgi?id=72113</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-08.xml" adv="1" patch="1">GLSA-200412-08</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/698302">VU#698302</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:005">MDKSA-2005:005</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-583.html" adv="1" patch="1">RHSA-2004:583</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-014.html">RHSA-2005:014</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/426072/30/6740/threaded">FLSA-2006:138098</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11911" adv="1" patch="1">11911</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18455">nfsutils-getquotainfo-bo(18455)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10464">oval:org.mitre.oval:def:10464</ref>
    </refs>
    <vuln_soft>
      <prod name="nfs-utils" vendor="nfs">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.6"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0947" seq="2004-0947" published="2005-02-09" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in unarj before 2.63a-r2 allows remote attackers to execute arbitrary code via an arj archive that contains long filenames.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FEDORA" url="http://lwn.net/Articles/121827/">FLSA:2272</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-652">DSA-652</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-29.xml" adv="1" patch="1">GLSA-200411-29</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-007.html">RHSA-2005:007</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11665" adv="1" patch="1">11665</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18044">unarj-longfilename-bo(18044)</ref>
    </refs>
    <vuln_soft>
      <prod name="unarj" vendor="arj_software_inc.">
        <vers num="2.62"/>
        <vers num="2.63_a"/>
        <vers num="2.64"/>
        <vers num="2.65"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.0"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0948" seq="2004-0948" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  It was a duplicate assignment before public disclosure.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0949" seq="2004-0949" published="2005-01-10" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110072140811965&amp;w=2">20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/142004.html">http://security.e-matters.de/advisories/142004.html</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-504.html">RHSA-2004:504</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-505.html">RHSA-2004:505</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-537.html" adv="1" patch="1">RHSA-2004:537</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11695" adv="1" patch="1">11695</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0061/">2004-0061</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18137">linux-smbrecvtrans2-memory-leak(18137)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360">oval:org.mitre.oval:def:10360</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-30-1/">USN-30-1</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0950" seq="2004-0950" published="2005-02-09" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">NetOp Host before 7.65 build 2004278 allows remote attackers to obtain sensitive hostname, username and local IP address information via (1) a NetOp HELO request, or (2) when responses are disabled, a "custom" HELO request.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://msgs.securepoint.com/cgi-bin/get/bugtraq0411/213.html">20041119 Corsaire Security Advisory - Danware NetOp Host multiple information disclosure issues</ref>
      <ref source="MISC" url="http://www.corsaire.com/advisories/c040619-001.txt" adv="1">http://www.corsaire.com/advisories/c040619-001.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11710" adv="1" patch="1">11710</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18171">danware-helo-obtain-information(18171)</ref>
    </refs>
    <vuln_soft>
      <prod name="netop" vendor="danware_data">
        <vers num="6.0"/>
        <vers num="6.50"/>
        <vers num="7.0.1_build2002-01-29"/>
        <vers num="7.50_build2003-08-04"/>
        <vers num="7.60_build2003-06-24"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0951" seq="2004-0951" published="2004-12-31" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The make_recovery command for the TFTP server in HP Ignite-UX before C.6.2.241 makes a copy of the password file in the TFTP directory tree, which allows remote attackers to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1014711">1014711</ref>
      <ref source="MISC" url="http://www.corsaire.com/advisories/c041123-001.txt" adv="1" patch="1">http://www.corsaire.com/advisories/c041123-001.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/14568">14568</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/21858">hpigniteux-makerecovery-bypass-security(21858)</ref>
    </refs>
    <vuln_soft>
      <prod name="ignite-ux" vendor="hp">
        <vers num="c.6.2.241"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0952" seq="2004-0952" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">HP-UX B.11.00 through B.11.23, when running Ignite-UX and using the add_new_client command, causes the TFTP server to set world-writable permissions on part of the directory tree, which allows remote attackers to modify data or cause disk consumption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=112420609211136&amp;w=2">20050816 Corsaire Security Advisory: HP Ignite-UX filesystem permissions issue</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=112422597529112&amp;w=2">SSRT4874</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1014711">1014711</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/21857">hpigniteux-addnewclient-gain-access(21857)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5775">oval:org.mitre.oval:def:5775</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.00"/>
        <vers num="11.11"/>
        <vers num="11.22"/>
        <vers num="11.23" edition=":ia64_64-bit"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0953" seq="2004-0953" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the C2S module in the open source Jabber 2.x server (Jabberd) allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long username.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029346.html">20041124 Jabberd2.x remote BuffJabberd2.x remote Buffer Overflowser Overflows</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110144303826709&amp;w=2">20041124 Jabberd2.x remote BuffJabberd2.x remote Buffer Overflowser Overflows</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11741" adv="1" patch="1">11741</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18238">jabberd2-c2s-bo(18238)</ref>
    </refs>
    <vuln_soft>
      <prod name="jabber_server" vendor="jabber_software_foundation">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0954" seq="2004-0954" published="2004-12-23" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-0597.  Reason: This candidate is a reservation duplicate of CVE-2004-0597.  Notes: All CVE users should reference CVE-2004-0597 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0955" seq="2004-0955" published="2004-12-23" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-0599.  Reason: This candidate is a reservation duplicate of CVE-2004-0599 (the first item listed in that candidate).  Notes: All CVE users should reference CVE-2004-0599 instead of this candidate.  All references and descriptions have been removed from this candidate to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0956" seq="2004-0956" published="2005-01-10" modified="2019-10-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.mysql.com/bug.php?id=3870">http://bugs.mysql.com/bug.php?id=3870</ref>
      <ref source="CONFIRM" url="http://lists.mysql.com/packagers/202">http://lists.mysql.com/packagers/202</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" adv="1" patch="1">GLSA-200410-22</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_01_sr.html">SUSE-SR:2004:001</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0054/">2004-0054</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17768">mysql-match-against-dos(17768)</ref>
    </refs>
    <vuln_soft>
      <prod name="mysql" vendor="mysql">
        <vers num="4.0.20"/>
      </prod>
      <prod name="mysql" vendor="oracle">
        <vers num="4.0.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.5a"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7" edition="gamma"/>
        <vers num="4.0.8" edition="gamma"/>
        <vers num="4.0.9" edition="gamma"/>
        <vers num="4.0.10"/>
        <vers num="4.0.11" edition="gamma"/>
        <vers num="4.0.12"/>
        <vers num="4.0.13"/>
        <vers num="4.0.14"/>
        <vers num="4.0.15"/>
        <vers num="4.0.18"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0957" seq="2004-0957" published="2005-02-09" modified="2019-10-07" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000947">CLA-2005:947</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-018.shtml">P-018</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-707">DSA-707</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:070">MDKSA-2005:070</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-597.html">RHSA-2004:597</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-611.html">RHSA-2004:611</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17783">mysql-underscore-gain-priv(17783)</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-32-1/">USN-32-1</ref>
    </refs>
    <vuln_soft>
      <prod name="mysql" vendor="mysql">
        <vers num="4.0.20"/>
      </prod>
      <prod name="openpkg" vendor="openpkg">
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="current"/>
      </prod>
      <prod name="mysql" vendor="oracle">
        <vers num="3.20"/>
        <vers num="3.20.32a"/>
        <vers num="3.21"/>
        <vers num="3.22"/>
        <vers num="3.22.26"/>
        <vers num="3.22.27"/>
        <vers num="3.22.28"/>
        <vers num="3.22.29"/>
        <vers num="3.22.30"/>
        <vers num="3.22.32"/>
        <vers num="3.23"/>
        <vers num="3.23.2"/>
        <vers num="3.23.3"/>
        <vers num="3.23.4"/>
        <vers num="3.23.5"/>
        <vers num="3.23.8"/>
        <vers num="3.23.9"/>
        <vers num="3.23.10"/>
        <vers num="3.23.22"/>
        <vers num="3.23.23"/>
        <vers num="3.23.24"/>
        <vers num="3.23.25"/>
        <vers num="3.23.26"/>
        <vers num="3.23.27"/>
        <vers num="3.23.28" edition="gamma"/>
        <vers num="3.23.29"/>
        <vers num="3.23.30"/>
        <vers num="3.23.31"/>
        <vers num="3.23.32"/>
        <vers num="3.23.33"/>
        <vers num="3.23.34"/>
        <vers num="3.23.36"/>
        <vers num="3.23.37"/>
        <vers num="3.23.38"/>
        <vers num="3.23.39"/>
        <vers num="3.23.40"/>
        <vers num="3.23.41"/>
        <vers num="3.23.42"/>
        <vers num="3.23.43"/>
        <vers num="3.23.44"/>
        <vers num="3.23.45"/>
        <vers num="3.23.46"/>
        <vers num="3.23.47"/>
        <vers num="3.23.48"/>
        <vers num="3.23.49"/>
        <vers num="3.23.50"/>
        <vers num="3.23.51"/>
        <vers num="3.23.52"/>
        <vers num="3.23.53"/>
        <vers num="3.23.53a"/>
        <vers num="3.23.54"/>
        <vers num="3.23.54a"/>
        <vers num="3.23.55"/>
        <vers num="3.23.56"/>
        <vers num="3.23.58"/>
        <vers num="3.23.59"/>
        <vers num="4.0.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.5a"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7" edition="gamma"/>
        <vers num="4.0.8" edition="gamma"/>
        <vers num="4.0.9" edition="gamma"/>
        <vers num="4.0.10"/>
        <vers num="4.0.11" edition="gamma"/>
        <vers num="4.0.12"/>
        <vers num="4.0.13"/>
        <vers num="4.0.14"/>
        <vers num="4.0.15"/>
        <vers num="4.0.18"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0958" seq="2004-0958" published="2004-11-03" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">php_variables.c in PHP before 5.0.2 allows remote attackers to read sensitive memory contents via (1) GET, (2) POST, or (3) COOKIE GPC variables that end in an open bracket character, which causes PHP to calculate an incorrect string length.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0053.html">20040915 [VulnWatch] PHP Vulnerability N. 1</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109527531130492&amp;w=2">20040915 PHP Vulnerability N. 1</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011279">1011279</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-687.html" adv="1" patch="1">RHSA-2004:687</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2344">FLSA:2344</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17393">php-phpinfo-disclose-memory(17393)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10863">oval:org.mitre.oval:def:10863</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="5.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0959" seq="2004-0959" published="2004-11-03" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">rfc1867.c in PHP before 5.0.2 allows local users to upload files to arbitrary locations via a PHP script with a certain MIME header that causes the "$_FILES" array to be modified.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0054.html">20040915 Php Vulnerability N. 2</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109534848430404&amp;w=2">20040915 Php Vulnerability N. 2</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011307">1011307</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-687.html" adv="1" patch="1">RHSA-2004:687</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2344">FLSA:2344</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17392">php-mime-array-execute-code(17392)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10961">oval:org.mitre.oval:def:10961</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="5.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0960" seq="2004-0960" published="2005-02-09" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-29.xml">GLSA-200409-29</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/541574" adv="1">VU#541574</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11222" adv="1" patch="1">11222</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17440">freeradius-dos(17440)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11023">oval:org.mitre.oval:def:11023</ref>
    </refs>
    <vuln_soft>
      <prod name="freeradius" vendor="freeradius">
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.8"/>
        <vers num="0.8.1"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="1.0.0"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0961" seq="2004-0961" published="2005-02-09" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200409-29.xml">GLSA-200409-29</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/541574" adv="1">VU#541574</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11222" adv="1" patch="1">11222</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17440">freeradius-dos(17440)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10024">oval:org.mitre.oval:def:10024</ref>
    </refs>
    <vuln_soft>
      <prod name="freeradius" vendor="freeradius">
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.8"/>
        <vers num="0.8.1"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="1.0.0"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0962" seq="2004-0962" published="2005-02-09" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Apple Remote Desktop Client 1.2.4 executes a GUI application as root when it is started by an Apple Remote Desktop Administrator application, which allows remote authenticated users to execute arbitrary code when loginwindow is active via Fast User Switching.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Oct/msg00002.html">APPLE-SA-2004-10-27</ref>
    </refs>
    <vuln_soft>
      <prod name="apple_remote_desktop" vendor="apple">
        <vers num="2.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0963" seq="2004-0963" published="2005-02-09" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Microsoft Word 2002 (10.6612.6714) SP3, and possibly other versions, allows remote attackers to cause a denial of service (application exception) and possibly execute arbitrary code in winword.exe via certain unexpected values in a .doc file, including (1) an offset that triggers an out-of-bounds memory access, (2) a certain value that causes a large memory copy as triggered by an integer conversion error, and other values.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109716247230733&amp;w=2">20041006 [HV-HIGH] MS Word multiple exceptions, at least one exploitable</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-023">MS05-023</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17635">word-file-parsing-bo(17635)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1795">oval:org.mitre.oval:def:1795</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2105">oval:org.mitre.oval:def:2105</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2216">oval:org.mitre.oval:def:2216</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A420">oval:org.mitre.oval:def:420</ref>
    </refs>
    <vuln_soft>
      <prod name="word" vendor="microsoft">
        <vers num="2002" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0964" seq="2004-0964" published="2005-02-09" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Zinf 2.2.1 on Windows, and other older versions for Linux, allows remote attackers or local users to execute arbitrary code via certain values in a .pls file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109608092609200&amp;w=2">20040924 Buffer overflow in Zinf 2.2.1 for Win32</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109638486728548&amp;w=2">20040927 Re: Buffer overflow in Zinf 2.2.1 for Win32+exploit</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/8341">8341</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-587" adv="1" patch="1">DSA-587</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11248" adv="1" patch="1">11248</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17491">zinf-pls-bo(17491)</ref>
    </refs>
    <vuln_soft>
      <prod name="zinf" vendor="zinf">
        <vers num="2.2.1"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0965" seq="2004-0965" published="2005-02-09" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">stmkfont in HP-UX B.11.00 through B.11.23 relies on the user-specified PATH when executing certain commands, which allows local users to execute arbitrary code by modifying the PATH environment variable to point to malicious programs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109837243713696&amp;w=2">20041021 NSFOCUS SA2004-02 : HP-UX stmkfont Local Privilege Escalation Vulnerability</ref>
      <ref source="MISC" url="http://www.nsfocus.com/english/homepage/research/0402.htm">http://www.nsfocus.com/english/homepage/research/0402.htm</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/7351">SSRT4807</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11493" adv="1" patch="1">11493</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17813">hpux-stmkfont-gain-privileges(17813)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5538">oval:org.mitre.oval:def:5538</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.00"/>
        <vers num="11.11"/>
        <vers num="11.22"/>
        <vers num="11.23" edition=":ia64_64-bit"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0966" seq="2004-0966" published="2005-02-09" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The (1) autopoint and (2) gettextize scripts in the GNU gettext package 1.14 and later versions, as used in Trustix Secure Linux 1.5 through 2.1 and other operating systems, allows local users to overwrite files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323</ref>
      <ref source="OPENPKG" url="http://marc.info/?l=bugtraq&amp;m=110382652226638&amp;w=2">OpenPKG-SA-2004.055</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-10.xml">GLSA-200410-10</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00000.html">FLSA:136323</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11282" adv="1" patch="1">11282</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0050">2004-0050</ref>
      <ref source="MANDRIVA" url="http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:051">MDKSA-2006:051</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">script-temporary-file-overwrite(17583)</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-5-1/">USN-5-1</ref>
    </refs>
    <vuln_soft>
      <prod name="gettext" vendor="gnu">
        <vers num="0.14.1"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0967" seq="2004-0967" published="2005-02-09" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The (1) pj-gs.sh, (2) ps2epsi, (3) pv.sh, and (4) sysvlp.sh scripts in the ESP Ghostscript (espgs) package in Trustix Secure Linux 1.5 through 2.1, and other operating systems, allow local users to overwrite files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.19/SCOSA-2006.19.txt">SCOSA-2006.19</ref>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.23/SCOSA-2006.23.txt">SCOSA-2006.23</ref>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136321">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136321</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-081.html">RHSA-2005:081</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11285" adv="1" patch="1">11285</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0050">2004-0050</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">script-temporary-file-overwrite(17583)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10284">oval:org.mitre.oval:def:10284</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-3-1/">USN-3-1</ref>
    </refs>
    <vuln_soft>
      <prod name="ghostscript" vendor="aladdin_enterprises">
        <vers num="4.3"/>
        <vers num="4.3.2"/>
        <vers num="5.10.10" edition=":mdk"/>
        <vers num="5.10.10_1" edition=":mdk"/>
        <vers num="5.10.12cl"/>
        <vers num="5.10.15"/>
        <vers num="5.10.16"/>
        <vers num="5.10cl"/>
        <vers num="5.50"/>
        <vers num="5.50.8"/>
        <vers num="5.50.8_7"/>
        <vers num="6.51"/>
        <vers num="6.52"/>
        <vers num="6.53"/>
        <vers num="7.0.4"/>
        <vers num="7.0.5"/>
        <vers num="7.0.6"/>
        <vers num="7.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0968" seq="2004-0968" published="2005-02-09" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The catchsegv script in glibc 2.3.2 and earlier allows local users to overwrite files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136318">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136318</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200410-19.xml">GLSA-200410-19</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-636">DSA-636</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-586.html">RHSA-2004:586</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-261.html">RHSA-2005:261</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11286" adv="1" patch="1">11286</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0050">2004-0050</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">script-temporary-file-overwrite(17583)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9523">oval:org.mitre.oval:def:9523</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-4-1/">USN-4-1</ref>
    </refs>
    <vuln_soft>
      <prod name="glibc" vendor="gnu">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.1.6"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.3.10"/>
        <vers num="2.1.9"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.3"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.10"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0969" seq="2004-0969" published="2005-02-09" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The groffer script in the Groff package 1.18 and later versions, as used in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml" adv="1" patch="1">GLSA-200411-15</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11287" adv="1" patch="1">11287</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0050">2004-0050</ref>
      <ref source="MANDRIVA" url="http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038">MDKSA-2006:038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">script-temporary-file-overwrite(17583)</ref>
    </refs>
    <vuln_soft>
      <prod name="groff" vendor="gnu">
        <vers num="1.19"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0970" seq="2004-0970" published="2005-02-09" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The (1) gzexe, (2) zdiff, and (3) znew scripts in the gzip package, as used by other packages such as ncompress, allows local users to overwrite files via a symlink attack on temporary files.  NOTE: the znew vulnerability may overlap CVE-2003-0367.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-588" adv="1">DSA-588</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11288" adv="1" patch="1">11288</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0050">2004-0050</ref>
      <ref source="MISC" url="http://www.zataz.net/adviso/ncompress-09052005.txt">http://www.zataz.net/adviso/ncompress-09052005.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">script-temporary-file-overwrite(17583)</ref>
    </refs>
    <vuln_soft>
      <prod name="gzip" vendor="gnu">
        <vers num="1.2.4a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0971" seq="2004-0971" published="2005-02-09" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml" adv="1" patch="1">GLSA-200410-24</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-012.html">RHSA-2005:012</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11289" adv="1" patch="1">11289</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0050">2004-0050</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">script-temporary-file-overwrite(17583)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">oval:org.mitre.oval:def:10497</ref>
    </refs>
    <vuln_soft>
      <prod name="kerberos" vendor="mit">
        <vers num="5-1.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0972" seq="2004-0972" published="2005-02-09" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The lvmcreate_initrd script in the lvm package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136308">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136308</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHBA-2004-232.html">RHBA-2004:232</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11290" adv="1" patch="1">11290</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0050" adv="1" patch="1">2004-0050</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">script-temporary-file-overwrite(17583)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10632">oval:org.mitre.oval:def:10632</ref>
    </refs>
    <vuln_soft>
      <prod name="logical_volume_management_utilities" vendor="lvm">
        <vers num="1.0.1"/>
        <vers num="1.0.4"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0973" seq="2004-0973" published="2004-12-23" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-0457.  Reason: This candidate is a reservation duplicate of CVE-2004-0457.  Notes: All CVE users should reference CVE-2004-0457 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0974" seq="2004-0974" published="2005-02-09" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The netatalk package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-25.xml" adv="1" patch="1">GLSA-200410-25</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0050">2004-0050</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">script-temporary-file-overwrite(17583)</ref>
    </refs>
    <vuln_soft>
      <prod name="open_source_apple_file_share_protocol_suite" vendor="netatalk">
        <vers num="1.5_pre6"/>
        <vers num="1.6.1"/>
        <vers num="1.6.4"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0975" seq="2004-0975" published="2005-02-09" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136302">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136302</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-603">DSA-603</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml">GLSA-200411-15</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-476.html">RHSA-2005:476</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11293" adv="1" patch="1">11293</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0050">2004-0050</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">script-temporary-file-overwrite(17583)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10621">oval:org.mitre.oval:def:10621</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A164">oval:org.mitre.oval:def:164</ref>
    </refs>
    <vuln_soft>
      <prod name="mandrake_multi_network_firewall" vendor="mandrakesoft">
        <vers num="8.2"/>
      </prod>
      <prod name="openssl" vendor="openssl">
        <vers num="0.9.6"/>
        <vers num="0.9.6a"/>
        <vers num="0.9.6b"/>
        <vers num="0.9.6c"/>
        <vers num="0.9.6d"/>
        <vers num="0.9.6e"/>
        <vers num="0.9.6f"/>
        <vers num="0.9.6g"/>
        <vers num="0.9.6h"/>
        <vers num="0.9.6i"/>
        <vers num="0.9.6j"/>
        <vers num="0.9.6k"/>
        <vers num="0.9.6l"/>
        <vers num="0.9.6m"/>
        <vers num="0.9.7c"/>
        <vers num="0.9.7d"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0976" seq="2004-0976" published="2005-02-09" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple scripts in the perl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FEDORA" url="http://fedoranews.org/updates/FEDORA--.shtml">FLSA-2006:152845</ref>
      <ref source="OPENPKG" url="http://marc.info/?l=bugtraq&amp;m=110547693019788&amp;w=2">OpenPKG-SA-2005.001</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-620">DSA-620</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:031">MDKSA-2005:031</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-881.html">RHSA-2005:881</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11294" adv="1" patch="1">11294</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0050">2004-0050</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">script-temporary-file-overwrite(17583)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9752">oval:org.mitre.oval:def:9752</ref>
    </refs>
    <vuln_soft>
      <prod name="perl" vendor="larry_wall">
        <vers num="5.6"/>
        <vers num="5.6.1"/>
        <vers num="5.8.0"/>
        <vers num="5.8.1"/>
        <vers num="5.8.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0977" seq="2004-0977" published="2005-02-09" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The make_oidjoins_check script in PostgreSQL 7.4.5 and earlier allows local users to overwrite files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136300">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136300</ref>
      <ref source="OPENPKG" url="http://marc.info/?l=bugtraq&amp;m=109910073808903&amp;w=2">OpenPKG-SA-2004.046</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200410-16.xml">GLSA-200410-16</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-577" adv="1" patch="1">DSA-577</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:149">MDKSA-2004:149</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-489.html">RHSA-2004:489</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11295" adv="1" patch="1">11295</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0050">2004-0050</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">script-temporary-file-overwrite(17583)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11360">oval:org.mitre.oval:def:11360</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-6-1/">USN-6-1</ref>
    </refs>
    <vuln_soft>
      <prod name="postgresql" vendor="postgresql">
        <vers num="7.2.1"/>
        <vers num="7.4.3"/>
        <vers num="7.4.5"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0978" seq="2004-0978" published="2005-02-09" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the Hrtbeat.ocx (Heartbeat) ActiveX control for Internet Explorer 5.01 through 6, when users who visit online gaming sites that are associated with MSN, allows remote attackers to execute arbitrary code via the SetupData parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110616221411579&amp;w=2">20050119 MSN Heartbeat Control Buffer Overflow</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/673134" adv="1">VU#673134</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/heartbeatfull.txt">http://www.ngssoftware.com/advisories/heartbeatfull.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11367">11367</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038">MS04-038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17714">heartbeat-activex(17714)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-0979" seq="2004-0979" published="2004-12-31" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Internet Explorer on Windows XP does not properly modify the "Drag and Drop or copy and paste files" setting when the user sets it to "Disable" or "Prompt," which may enable security-sensitive operations that are inconsistent with the user's intended configuration.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/630720" adv="1">VU#630720</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-293A.html">TA04-293A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038">MS04-038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17820">ie-dragdrop-security-bypass(17820)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0" edition="sp2"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":embedded"/>
        <vers num="" edition=":home"/>
        <vers num="" edition=":media_center"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:embedded"/>
        <vers num="" edition="sp1:home"/>
        <vers num="" edition="sp1:media_center"/>
        <vers num="" edition="sp2:home"/>
        <vers num="" edition="sp2:media_center"/>
        <vers num="" edition="sp2:tablet_pc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0980" seq="2004-0980" published="2005-02-09" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 through 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028590.html">20041111 ez-ipupdate format string bug</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-592">DSA-592</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-20.xml" adv="1" patch="1">GLSA-200411-20</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:129">MDKSA-2004:129</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11657" adv="1" patch="1">11657</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18032">eziupdate-showmessage-format-string(18032)</ref>
    </refs>
    <vuln_soft>
      <prod name="ez-ipupdate" vendor="angus_mackay">
        <vers num="3.0.11b5"/>
        <vers num="3.0.11b8"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0981" seq="2004-0981" published="2005-02-09" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the EXIF parsing routine in ImageMagick before 6.1.0 allows remote attackers to execute arbitrary code via a certain image file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-11.xml">GLSA-200411-11</ref>
      <ref source="CONFIRM" url="http://www.imagemagick.org/www/Changelog.html">http://www.imagemagick.org/www/Changelog.html</ref>
      <ref source="BID" url="http://www.securityfocus.org/bid/11548">11548</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17903">imagemagick-exif-image-bo(17903)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10472">oval:org.mitre.oval:def:10472</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-7-1/">USN-7-1</ref>
    </refs>
    <vuln_soft>
      <prod name="imagemagick" vendor="imagemagick">
        <vers num="5.3.3"/>
        <vers num="5.4.3"/>
        <vers num="5.4.4.5"/>
        <vers num="5.4.7"/>
        <vers num="5.4.8"/>
        <vers num="5.4.8.2.1.1.0"/>
        <vers num="5.5.3.2.1.2.0"/>
        <vers num="5.5.6.0_2003-04-09"/>
        <vers num="5.5.7"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="6.0.7"/>
        <vers num="6.0.8"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0982" seq="2004-0982" published="2005-02-09" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the getauthfromURL function in httpget.c in mpg123 pre0.59s and mpg123 0.59r could allow remote attackers or local users to execute arbitrary code via an mp3 file that contains a long string before the @ (at sign) in a URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109834486312407&amp;w=2">20041019 mpg123 "getauthfromurl" buffer overflow</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011832">1011832</ref>
      <ref source="MISC" url="http://www.barrossecurity.com/advisories/mpg123_getauthfromurl_bof_advisory.txt">http://www.barrossecurity.com/advisories/mpg123_getauthfromurl_bof_advisory.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-578" adv="1" patch="1">DSA-578</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-27.xml">GLSA-200410-27</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11468" adv="1" patch="1">11468</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17574">mpg123-getauthfromurl-bo(17574)</ref>
    </refs>
    <vuln_soft>
      <prod name="mpg123" vendor="mpg123">
        <vers num="0.59r"/>
        <vers num="pre0.59s"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0983" seq="2004-0983" published="2005-03-01" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-586">DSA-586</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:128">MDKSA-2004:128</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-635.html">RHSA-2004:635</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11618" adv="1" patch="1">11618</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17985">ruby-cgi-dos(17985)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10268">oval:org.mitre.oval:def:10268</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/20-1/">USN-20-1</ref>
    </refs>
    <vuln_soft>
      <prod name="ruby" vendor="yukihiro_matsumoto">
        <vers num="1.6"/>
        <vers num="1.6.7"/>
        <vers num="1.8"/>
        <vers num="1.8.1"/>
        <vers num="1.8.2_pre1"/>
        <vers num="1.8.2_pre2"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0984" seq="2004-0984" published="2004-12-31" modified="2008-09-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in the dotlock implementation in mailutils before 1:0.5-4 on Debian GNU/Linux allows attackers to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://packages.debian.org/changelogs/pool/main/m/mailutils/mailutils_0.6-2/changelog">http://packages.debian.org/changelogs/pool/main/m/mailutils/mailutils_0.6-2/changelog</ref>
    </refs>
    <vuln_soft>
      <prod name="mailutils" vendor="gnu">
        <vers num="1.0.5.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0985" seq="2004-0985" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Internet Explorer 6.x on Windows XP SP2 allows remote attackers to execute arbitrary code, as demonstrated using a document with a draggable file type such as .xml, .doc, .py, .cdf, .css, .pdf, or .ppt, and using ADODB.Connection and ADODB.recordset to write to a .hta file that is interpreted in the Local Zone by HTML Help.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109829111200055&amp;w=2">20041020 Re: How to Break Windows XP SP2 + Internet Explorer 6 SP2</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109830296130857&amp;w=2">20041020 How to Break Windows XP SP2 + Internet Explorer 6 SP2</ref>
      <ref source="NTBUGTRAQ" url="http://marc.info/?l=ntbugtraq&amp;m=109828076802478&amp;w=2">20041020 How to Break Windows XP SP2 + Internet Explorer 6 SP2</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17824">ie-anchorclick-command-execution(17824)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0986" seq="2004-0986" published="2005-03-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Iptables before 1.2.11, under certain conditions, does not properly load the required modules at system startup, which causes the firewall rules to fail to load and protect the system from remote attackers.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://rpmfind.net/linux/RPM/suse/updates/9.2/i386/rpm/i586/iptables-1.2.11-4.2.i586.html">http://rpmfind.net/linux/RPM/suse/updates/9.2/i386/rpm/i586/iptables-1.2.11-4.2.i586.html</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-026.shtml">P-026</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-580">DSA-580</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:125">MDKSA-2004:125</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11570" adv="1" patch="1">11570</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2252">FLSA:2252</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17928">iptables-module-dos(17928)</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-81-1/">USN-81-1</ref>
    </refs>
    <vuln_soft>
      <prod name="suse_iptables" vendor="suse">
        <vers num="1.2.11"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.0.2"/>
        <vers num="2.4.0"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18"/>
        <vers num="2.4.19"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23"/>
        <vers num="2.4.24"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.6.0"/>
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6"/>
        <vers num="2.6.7"/>
        <vers num="2.6.8"/>
        <vers num="2.6.9" edition="2.6.20"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0987" seq="2004-0987" published="2005-01-10" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the process_menu function in yardradius 1.0.20 allows remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278384">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278384</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-598" adv="1" patch="1">DSA-598</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11753" adv="1" patch="1">11753</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18270">yardradius-processmenu-bo(18270)</ref>
    </refs>
    <vuln_soft>
      <prod name="yard_radius" vendor="yard_radius">
        <vers num="1.0.17"/>
        <vers num="1.0.18"/>
        <vers num="1.0.19"/>
        <vers num="1.0.20"/>
        <vers num="1.0_pre13"/>
        <vers num="1.0_pre14"/>
        <vers num="1.0_pre15"/>
      </prod>
      <prod name="yard_radius" vendor="yard_radius_project">
        <vers num="1.0.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0988" seq="2004-0988" published="2005-03-01" modified="2008-09-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer overflow on Apple QuickTime before 6.5.2, when running on Windows systems, allows remote attackers to cause a denial of service (memory consumption) via certain inputs that cause a large memory operation.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Oct/msg00001.html">APPLE-SA-2004-10-27</ref>
    </refs>
    <vuln_soft>
      <prod name="quicktime" vendor="apple">
        <vers num="5.0.2"/>
        <vers num="6.0"/>
        <vers num="6.1"/>
        <vers num="6.5"/>
        <vers num="6.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0989" seq="2004-0989" published="2005-03-01" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000890">CLA-2004:890</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html">APPLE-SA-2005-01-25</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109880813013482&amp;w=2">20041026 libxml2 remote buffer overflows (not in xml parsing code though)</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011941">1011941</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-029.shtml">P-029</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-582">DSA-582</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml">GLSA-200411-05</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_01_sr.html">SUSE-SR:2005:001</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-615.html">RHSA-2004:615</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-650.html">RHSA-2004:650</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11526" adv="1" patch="1">11526</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17870">libxml2-xmlnanoftpscanurl-bo(17870)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17872">libxml2-nanoftp-file-bo(17872)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17875">libxml2-xmlnanoftpscanproxy-bo(17875)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17876">libxml2-nanohttp-file-bo(17876)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505">oval:org.mitre.oval:def:10505</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173">oval:org.mitre.oval:def:1173</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-89-1/">USN-89-1</ref>
    </refs>
    <vuln_soft>
      <prod name="libxml" vendor="xmlsoft">
        <vers num="1.8.17"/>
      </prod>
      <prod name="libxml2" vendor="xmlsoft">
        <vers num="2.5.11"/>
        <vers num="2.6.6"/>
        <vers num="2.6.7"/>
        <vers num="2.6.8"/>
        <vers num="2.6.9"/>
        <vers num="2.6.11"/>
        <vers num="2.6.12"/>
        <vers num="2.6.13"/>
        <vers num="2.6.14"/>
      </prod>
      <prod name="command_line_xml_toolkit" vendor="xmlstarlet">
        <vers num="0.9.1"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0990" seq="2004-0990" published="2005-03-01" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html">SUSE-SR:2006:003</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109882489302099&amp;w=2">20041026 libgd integer overflow</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-071.shtml">P-071</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-589">DSA-589</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-591">DSA-591</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-601">DSA-601</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-602">DSA-602</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:132">MDKSA-2004:132</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:113">MDKSA-2006:113</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:114">MDKSA-2006:114</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:122">MDKSA-2006:122</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-638.html">RHSA-2004:638</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11523" adv="1" patch="1">11523</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0058">2004-0058</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17866">gd-png-bo(17866)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-939">https://issues.rpath.com/browse/RPL-939</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1260">oval:org.mitre.oval:def:1260</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9952">oval:org.mitre.oval:def:9952</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-11-1/">USN-11-1</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-25-1/">USN-25-1</ref>
    </refs>
    <vuln_soft>
      <prod name="gdlib" vendor="gd_graphics_library">
        <vers num="1.8.4"/>
        <vers num="2.0.1"/>
        <vers num="2.0.15"/>
        <vers num="2.0.20"/>
        <vers num="2.0.21"/>
        <vers num="2.0.22"/>
        <vers num="2.0.23"/>
        <vers num="2.0.26"/>
        <vers num="2.0.27"/>
        <vers num="2.0.28"/>
      </prod>
      <prod name="openpkg" vendor="openpkg">
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="current"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0991" seq="2004-0991" published="2005-01-11" modified="2008-09-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in mpg123 before 0.59s-r9 allows remote attackers to execute arbitrary code via frame headers in MP2 or MP3 files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200501-14.xml" adv="1" patch="1">GLSA-200501-14</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:009">MDKSA-2005:009</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12218">12218</ref>
    </refs>
    <vuln_soft>
      <prod name="mpg123" vendor="mpg123">
        <vers num="0.59m"/>
        <vers num="0.59n"/>
        <vers num="0.59o"/>
        <vers num="0.59p"/>
        <vers num="0.59q"/>
        <vers num="0.59r"/>
        <vers num="0.59s"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0992" seq="2004-0992" published="2005-03-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the -a option (daemon mode) in Proxytunnel before 1.2.3 allows remote attackers to execute arbitrary code via format string specifiers in an invalid proxy answer.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://proxytunnel.sourceforge.net/news.html">http://proxytunnel.sourceforge.net/news.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-07.xml" adv="1" patch="1">GLSA-200411-07</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11592" adv="1" patch="1">11592</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17945">proxytunnel-message-format-string(17945)</ref>
    </refs>
    <vuln_soft>
      <prod name="proxytunnel" vendor="proxytunnel">
        <vers num="1.0.6"/>
        <vers num="1.1.3"/>
        <vers num="1.2.2"/>
        <vers num="1.2_.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0993" seq="2004-0993" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in hpsockd before 0.6 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-604" adv="1" patch="1">DSA-604</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11800" adv="1">11800</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18359">hpsockd-bo(18359)</ref>
    </refs>
    <vuln_soft>
      <prod name="sockd" vendor="hp">
        <vers num="0.4"/>
        <vers num="0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0994" seq="2004-0994" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple integer overflows in xzgv 0.8 and earlier allow remote attackers to execute arbitrary code via images with large width and height values, which trigger a heap-based buffer overflow, as demonstrated in the read_prf_file function in readprf.c.  NOTE: CVE-2004-0994 and CVE-2004-1095 identify sets of bugs that only partially overlap, despite having the same developer.  Therefore, they should be regarded as distinct.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://marc.info/?l=bugtraq&amp;m=110297198402077&amp;w=2">20041213 Multiple Vendor xzgv PRF Parsing Integer Overflow Vulnerability</ref>
      <ref source="CONFIRM" url="http://rus.members.beeb.net/xzgv-0.8-integer-overflow-fix.diff">http://rus.members.beeb.net/xzgv-0.8-integer-overflow-fix.diff</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-614">DSA-614</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18454">xzgv-readprffile-bo(18454)</ref>
    </refs>
    <vuln_soft>
      <prod name="xzgv_image_viewer" vendor="zgv">
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
      </prod>
      <prod name="zgv_image_viewer" vendor="zgv">
        <vers num="5.5"/>
        <vers num="5.6"/>
        <vers num="5.7"/>
        <vers num="5.8"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0995" seq="2004-0995" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-0996" seq="2004-0996" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">main.c in cscope 15-4 and 15-5 creates temporary files with predictable filenames, which allows local users to overwrite arbitrary files via a symlink attack.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=306172">http://docs.info.apple.com/article.html?artnum=306172</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html">APPLE-SA-2007-07-31</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110133485519690&amp;w=2">20041124 STG Security Advisory: [SSA-20041122-09] cscope insecure temp file creation vulnerability</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-610" adv="1" patch="1">DSA-610</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-11.xml">GLSA-200412-11</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/381443">20041117 RX171104 Cscope v15.5 and minors - symlink vulnerability - advisory, exploit and patch.</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/381506">20041118 Re: RX171104 Cscope v15.5 and minors - symlink vulnerability - advisory, exploit and patch.</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/381611">20041118 Re: RX171104 Cscope v15.5 and minors - symlink vulnerability - advisory, exploit and patch.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11697" adv="1" patch="1">11697</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/25159">25159</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2007/2732">ADV-2007-2732</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18125">cscope-tmp-race-condition(18125)</ref>
    </refs>
    <vuln_soft>
      <prod name="cscope" vendor="cscope">
        <vers num="13.0"/>
        <vers num="15.1"/>
        <vers num="15.3"/>
        <vers num="15.4"/>
        <vers num="15.5"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="unixware" vendor="sco">
        <vers num="7.1.1"/>
        <vers num="7.1.3"/>
        <vers num="7.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0997" seq="2004-0997" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the ptrace MIPS assembly code in Linux kernel 2.4 before 2.4.17 allows local users to gain privileges via unknown vectors.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product release:
Linux, Linux kernel, 2.4.17</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes" patch="1">http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes</ref>
      <ref source="MISC" url="http://svn.debian.org/wsvn/kernel/patch-tracking/CVE-2004-0997?op=file&amp;rev=0&amp;sc=0">http://svn.debian.org/wsvn/kernel/patch-tracking/CVE-2004-0997?op=file&amp;rev=0&amp;sc=0</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067" adv="1" patch="1">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069" adv="1" patch="1">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070" adv="1" patch="1">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082" adv="1" patch="1">DSA-1082</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/18176">18176</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0998" seq="2004-0998" published="2004-12-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in telnetd-ssl 0.17 and earlier allows remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-616" adv="1" patch="1">DSA-616</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/995038" adv="1" patch="1">VU#995038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18654">netkit-telnetssl-format-string(18654)</ref>
    </refs>
    <vuln_soft>
      <prod name="telnetd" vendor="telnetd">
        <vers num="0.17.18"/>
        <vers num="0.17.25"/>
      </prod>
      <prod name="telnetd-ssl" vendor="telnetd">
        <vers num="0.17.17_0.1.1"/>
        <vers num="0.17.17_0.1.2" edition=":woody1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-0999" seq="2004-0999" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">zgv 5.5.3 allows remote attackers to cause a denial of service (application crash via segmentation fault) via crafted multiple-image (animated) GIF images.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-608" patch="1">DSA-608</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11915">11915</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18480">zgv-multiple-image-dos(18480)</ref>
    </refs>
    <vuln_soft>
      <prod name="zgv_image_viewer" vendor="zgv">
        <vers num="5.5.3"/>
        <vers num="5.6"/>
        <vers num="5.7"/>
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1000" seq="2004-1000" published="2004-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">lintian 1.23 and earlier removes the working directory even if it was not created by lintian, which may allow local users to delete arbitrary files or directories via a symlink attack.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18808">lintian-symlink(18808)</ref>
    </refs>
    <vuln_soft>
      <prod name="lintian" vendor="debian">
        <vers num="1.2_0.17.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1001" seq="2004-1001" published="2005-03-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the passwd_check function in Shadow 4.0.4.1, and possibly other versions before 4.0.5, allows local users to conduct unauthorized activities when an error from a pam_chauthtok function call is not properly handled.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000894">CLA-2004:894</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-585">DSA-585</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17902">shadow-pwdcheck-modify-account(17902)</ref>
    </refs>
    <vuln_soft>
      <prod name="shadow-utils" vendor="debian">
        <vers num="4.0.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1002" seq="2004-1002" published="2005-03-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer underflow in pppd in cbcp.c for ppp 2.4.1 allows remote attackers to cause a denial of service (daemon crash) via a CBCP packet with an invalid length value that causes pppd to access an incorrect memory location.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/379450">20041026 pppd out of bounds memory access, possible DOS</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17874">ppp-ccp-headers-dos(17874)</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-12-1/">USN-12-1</ref>
    </refs>
    <vuln_soft>
      <prod name="ppp" vendor="samba">
        <vers num="2.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1003" seq="2004-1003" published="2005-03-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Trend ScanMail allows remote attackers to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://cgi.nessus.org/plugins/dump.php3?id=14312">http://cgi.nessus.org/plugins/dump.php3?id=14312</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17962">scanmail-file-access(17962)</ref>
    </refs>
    <vuln_soft>
      <prod name="scanmail_domino" vendor="trend_micro">
        <vers num="2.6"/>
        <vers num="2.51"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1004" seq="2004-1004" published="2005-04-14" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple format string vulnerabilities in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to have an unknown impact.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-639">DSA-639</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-24.xml">GLSA-200502-24</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-217.html" adv="1" patch="1">RHSA-2005:217</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18902">midnightcommander-format-string(18902)</ref>
    </refs>
    <vuln_soft>
      <prod name="midnight_commander" vendor="midnight_commander">
        <vers num="4.5.40"/>
        <vers num="4.5.41"/>
        <vers num="4.5.42"/>
        <vers num="4.5.43"/>
        <vers num="4.5.44"/>
        <vers num="4.5.45"/>
        <vers num="4.5.46"/>
        <vers num="4.5.47"/>
        <vers num="4.5.48"/>
        <vers num="4.5.49"/>
        <vers num="4.5.50"/>
        <vers num="4.5.51"/>
        <vers num="4.5.52"/>
        <vers num="4.5.54"/>
        <vers num="4.5.55"/>
        <vers num="4.6"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="turbolinux_workstation" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1005" seq="2004-1005" published="2005-04-14" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to have an unknown impact.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-639">DSA-639</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-24.xml">GLSA-200502-24</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-217.html" adv="1" patch="1">RHSA-2005:217</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18898">midnight-commander-bo(18898)</ref>
    </refs>
    <vuln_soft>
      <prod name="midnight_commander" vendor="midnight_commander">
        <vers num="4.5.40"/>
        <vers num="4.5.41"/>
        <vers num="4.5.42"/>
        <vers num="4.5.43"/>
        <vers num="4.5.44"/>
        <vers num="4.5.45"/>
        <vers num="4.5.46"/>
        <vers num="4.5.47"/>
        <vers num="4.5.48"/>
        <vers num="4.5.49"/>
        <vers num="4.5.50"/>
        <vers num="4.5.51"/>
        <vers num="4.5.52"/>
        <vers num="4.5.54"/>
        <vers num="4.5.55"/>
        <vers num="4.6"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="turbolinux_workstation" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1006" seq="2004-1006" published="2005-03-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the log functions in dhcpd for dhcp 2.x allows remote DNS servers to execute arbitrary code via certain DNS messages, a different vulnerability than CVE-2002-0702.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0287.html">20041025 debian dhcpd, old format string bug</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-11/0037.html">20041102 Re: debian dhcpd, old format string bug</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109968710822449&amp;w=2">20041105 Re: debian dhcpd, old format string bug</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-584" adv="1" patch="1">DSA-584</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/448384">VU#448384</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-212.html">RHSA-2005:212</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11591" adv="1" patch="1">11591</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17963">dhcp-log-format-string(17963)</ref>
    </refs>
    <vuln_soft>
      <prod name="dhcpd" vendor="isc">
        <vers num="2.0.pl5"/>
        <vers num="3.0" edition="rc12"/>
        <vers num="3.0" edition="rc4"/>
        <vers num="3.0.1" edition="rc1"/>
        <vers num="3.0.1" edition="rc10"/>
        <vers num="3.0.1" edition="rc11"/>
        <vers num="3.0.1" edition="rc12"/>
        <vers num="3.0.1" edition="rc13"/>
        <vers num="3.0.1" edition="rc14"/>
        <vers num="3.0.1" edition="rc2"/>
        <vers num="3.0.1" edition="rc3"/>
        <vers num="3.0.1" edition="rc4"/>
        <vers num="3.0.1" edition="rc5"/>
        <vers num="3.0.1" edition="rc6"/>
        <vers num="3.0.1" edition="rc7"/>
        <vers num="3.0.1" edition="rc8"/>
        <vers num="3.0.1" edition="rc9"/>
        <vers num="3.0_b2pl9"/>
        <vers num="3.0_b2pl23"/>
        <vers num="3.0_pl1"/>
        <vers num="3.0_pl2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1007" seq="2004-1007" published="2005-03-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The quoted-printable decoder in bogofilter 0.17.4 to 0.92.7 allows remote attackers to cause a denial of service (application crash) via mail headers that cause a line feed (LF) to be replaced by a null byte that is written to an incorrect memory address.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01">http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17916">bogofilter-dos(17916)</ref>
    </refs>
    <vuln_soft>
      <prod name="email_filter" vendor="bogofilter">
        <vers num="0.9.0.3"/>
        <vers num="0.9.0.4"/>
        <vers num="0.9.0.5"/>
        <vers num="0.92"/>
        <vers num="0.92.4"/>
        <vers num="0.92.6"/>
        <vers num="0.92.7"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1008" seq="2004-1008" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer signedness error in the ssh2_rdpkt function in PuTTY before 0.56 allows remote attackers to execute arbitrary code via a SSH2_MSG_DEBUG packet with a modified stringlen parameter, which leads to a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109889312917613&amp;w=2">20041027 PuTTY SSH client vulnerability</ref>
      <ref source="CONFIRM" url="http://www.chiark.greenend.org.uk/~sgtatham/putty/">http://www.chiark.greenend.org.uk/~sgtatham/putty/</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-29.xml" adv="1" patch="1">GLSA-200410-29</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=155&amp;type=vulnerabilities&amp;flashstatus=true">20041027 PuTTY SSH2_MSG_DEBUG Buffer Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11549" adv="1" patch="1">11549</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002414">http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002414</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002416">http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002416</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17886">putty-ssh2msgdebug-bo(17886)</ref>
    </refs>
    <vuln_soft>
      <prod name="putty" vendor="putty">
        <vers num="0.48"/>
        <vers num="0.49"/>
        <vers num="0.50"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.53b"/>
        <vers num="0.54"/>
        <vers num="0.55"/>
      </prod>
      <prod name="tortoisecvs" vendor="tortoisecvs">
        <vers num="1.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1009" seq="2004-1009" published="2005-04-14" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-639" adv="1" patch="1">DSA-639</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-512.html">RHSA-2005:512</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18903">midnight-commander-dos(18903)</ref>
    </refs>
    <vuln_soft>
      <prod name="midnight_commander" vendor="midnight_commander">
        <vers num="4.5.40"/>
        <vers num="4.5.41"/>
        <vers num="4.5.42"/>
        <vers num="4.5.43"/>
        <vers num="4.5.44"/>
        <vers num="4.5.45"/>
        <vers num="4.5.46"/>
        <vers num="4.5.47"/>
        <vers num="4.5.48"/>
        <vers num="4.5.49"/>
        <vers num="4.5.50"/>
        <vers num="4.5.51"/>
        <vers num="4.5.52"/>
        <vers num="4.5.54"/>
        <vers num="4.5.55"/>
        <vers num="4.6"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="turbolinux_workstation" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1010" seq="2004-1010" published="2005-03-01" modified="2018-10-03" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Info-Zip 2.3 and possibly earlier versions, when using recursive folder compression, allows remote attackers to execute arbitrary code via a ZIP file containing a long pathname.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028379.html">20041103 [HV-MED] Zip/Linux long path buffer overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109958840611053&amp;w=2">20041103 [HV-MED] Zip/Linux long path buffer overflow</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-16.xml">GLSA-200411-16</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-072.shtml">P-072</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-624">DSA-624</ref>
      <ref source="MISC" url="http://www.hexview.com/docs/20041103-1.txt">http://www.hexview.com/docs/20041103-1.txt</ref>
      <ref source="CONFIRM" url="http://www.info-zip.org/FAQ.html">http://www.info-zip.org/FAQ.html</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:141">MDKSA-2004:141</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-634.html">RHSA-2004:634</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11603" adv="1" patch="1">11603</ref>
      <ref source="TURBO" url="http://www.turbolinux.com/security/2005/TLSA-2005-18.txt">TLSA-2005-18</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2255">FLSA:2255</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17956">infozip-compressed-folder-bo(17956)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9848">oval:org.mitre.oval:def:9848</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/18-1/">USN-18-1</ref>
    </refs>
    <vuln_soft>
      <prod name="zip" vendor="info-zip">
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1011" seq="2004-1011" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&amp;msg=143">[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released</ref>
      <ref source="CONFIRM" url="http://asg.web.cmu.edu/cyrus/download/imapd/changes.html">http://asg.web.cmu.edu/cyrus/download/imapd/changes.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110123023521619&amp;w=2">20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/152004.html">http://security.e-matters.de/advisories/152004.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-34.xml">GLSA-200411-34</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:139">MDKSA-2004:139</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18198">cyrus-imap-username-bo(18198)</ref>
    </refs>
    <vuln_soft>
      <prod name="cyrus_imap_server" vendor="carnegie_mellon_university">
        <vers num="2.1.7"/>
        <vers num="2.1.9"/>
        <vers num="2.1.10"/>
        <vers num="2.1.16"/>
        <vers num="2.2.0_alpha"/>
        <vers num="2.2.1_beta"/>
        <vers num="2.2.2_beta"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
      </prod>
      <prod name="openpkg" vendor="openpkg">
        <vers num="current"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1012" seq="2004-1012" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&amp;msg=143">[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released</ref>
      <ref source="CONFIRM" url="http://asg.web.cmu.edu/cyrus/download/imapd/changes.html">http://asg.web.cmu.edu/cyrus/download/imapd/changes.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110123023521619&amp;w=2">20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/152004.html">http://security.e-matters.de/advisories/152004.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-34.xml">GLSA-200411-34</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-597">DSA-597</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:139">MDKSA-2004:139</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18199">cyrus-imap-commands-execute-code(18199)</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-31-1/">USN-31-1</ref>
    </refs>
    <vuln_soft>
      <prod name="cyrus_imap_server" vendor="carnegie_mellon_university">
        <vers num="2.1.7"/>
        <vers num="2.1.9"/>
        <vers num="2.1.10"/>
        <vers num="2.1.16"/>
        <vers num="2.2.0_alpha"/>
        <vers num="2.2.1_beta"/>
        <vers num="2.2.2_beta"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
      </prod>
      <prod name="openpkg" vendor="openpkg">
        <vers num="current"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1013" seq="2004-1013" published="2005-01-10" modified="2016-12-07" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&amp;msg=143">[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released</ref>
      <ref source="CONFIRM" url="http://asg.web.cmu.edu/cyrus/download/imapd/changes.html">http://asg.web.cmu.edu/cyrus/download/imapd/changes.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110123023521619&amp;w=2">20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/152004.html">http://security.e-matters.de/advisories/152004.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-34.xml">GLSA-200411-34</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-597" adv="1" patch="1">DSA-597</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:139">MDKSA-2004:139</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-31-1/">USN-31-1</ref>
    </refs>
    <vuln_soft>
      <prod name="cyrus_imap_server" vendor="carnegie_mellon_university">
        <vers num="2.1.7"/>
        <vers num="2.1.9"/>
        <vers num="2.1.10"/>
        <vers num="2.1.16"/>
        <vers num="2.2.0_alpha"/>
        <vers num="2.2.1_beta"/>
        <vers num="2.2.2_beta"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
      </prod>
      <prod name="openpkg" vendor="openpkg">
        <vers num="current"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1014" seq="2004-1014" published="2005-01-10" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">statd in nfs-utils 1.257 and earlier does not ignore the SIGPIPE signal, which allows remote attackers to cause a denial of service (server process crash) via a TCP connection that is prematurely terminated.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/nfs/nfs-utils/ChangeLog?rev=1.258&amp;view=markup">http://cvs.sourceforge.net/viewcvs.py/nfs/nfs-utils/ChangeLog?rev=1.258&amp;view=markup</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-606">DSA-606</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-583.html">RHSA-2004:583</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-014.html">RHSA-2005:014</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/426072/30/6740/threaded">FLSA-2006:138098</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11785" adv="1" patch="1">11785</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0065/">2004-0065</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18332">nfs-utils-statd-dos(18332)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10899">oval:org.mitre.oval:def:10899</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-36-1/">USN-36-1</ref>
    </refs>
    <vuln_soft>
      <prod name="nfs-utils" vendor="nfs">
        <vers num="1.0.6"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1015" seq="2004-1015" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&amp;msg=145">[cyrus-announce] 20041123 Cyrus IMAPd 2.2.10 Released</ref>
      <ref source="CONFIRM" url="http://asg.web.cmu.edu/cyrus/download/imapd/changes.html">http://asg.web.cmu.edu/cyrus/download/imapd/changes.html</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-34.xml" adv="1" patch="1">GLSA-200411-34</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:139">MDKSA-2004:139</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18274">cyrus-magic-plus-bo(18274)</ref>
    </refs>
    <vuln_soft>
      <prod name="cyrus_imap_server" vendor="carnegie_mellon_university">
        <vers num="1.4"/>
        <vers num="1.5.19"/>
        <vers num="2.0.12"/>
        <vers num="2.0.16"/>
        <vers num="2.1.7"/>
        <vers num="2.1.9"/>
        <vers num="2.1.10"/>
        <vers num="2.1.16"/>
        <vers num="2.2.0_alpha"/>
        <vers num="2.2.1_beta"/>
        <vers num="2.2.2_beta"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
        <vers num="2.2.9"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1016" seq="2004-1016" published="2005-01-10" modified="2018-05-02" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://isec.pl/vulnerabilities/isec-0019-scm.txt">http://isec.pl/vulnerabilities/isec-0019-scm.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_44_kernel.html">SUSE-SA:2004:044</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-689.html">RHSA-2004:689</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-016.html">RHSA-2005:016</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-017.html">RHSA-2005:017</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11921" adv="1" patch="1">11921</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18483">linux-scmsend-dos(18483)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816">oval:org.mitre.oval:def:11816</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-38-1/">USN-38-1</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.4.28"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1017" seq="2004-1017" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple "overflows" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1017">DSA-1017</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-689.html">RHSA-2004:689</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-016.html">RHSA-2005:016</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-017.html">RHSA-2005:017</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12102">12102</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336" patch="1">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18433">linux-ioedgeport-bo(18433)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9786">oval:org.mitre.oval:def:9786</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1018" seq="2004-1018" published="2005-01-10" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple integer handling errors in PHP before 4.3.10 allow attackers to bypass safe mode restrictions, cause a denial of service, or execute arbitrary code via (1) a negative offset value to the shmop_write function, (2) an "integer overflow/underflow" in the pack function, or (3) an "integer overflow/underflow" in the unpack function.  NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute.  This candidate may change significantly in the future as a result of further discussion.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110314318531298&amp;w=2">20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5</ref>
      <ref source="MISC" url="http://www.hardened-php.net/advisories/012004.txt">http://www.hardened-php.net/advisories/012004.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:151">MDKSA-2004:151</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:072">MDKSA-2005:072</ref>
      <ref source="CONFIRM" url="http://www.php.net/release_4_3_10.php">http://www.php.net/release_4_3_10.php</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-032.html">RHSA-2005:032</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-816.html">RHSA-2005:816</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/9028">HPSBMA01212</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/384920">20041219 PHP shmop.c module permits write of arbitrary memory.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12045">12045</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2344">FLSA:2344</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18515">php-shmopwrite-outofbounds-memory(18515)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10949">oval:org.mitre.oval:def:10949</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-99-1/">USN-99-1</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1019" seq="2004-1019" published="2005-01-10" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html">SUSE-SU-2015:0365</ref>
      <ref source="SUSE" url="http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html">openSUSE-SU-2015:0325</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110314318531298&amp;w=2">20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5</ref>
      <ref source="OPENPKG" url="http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html">OpenPKG-SA-2004.053</ref>
      <ref source="MISC" url="http://www.hardened-php.net/advisories/012004.txt">http://www.hardened-php.net/advisories/012004.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:151">MDKSA-2004:151</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html">SUSE-SA:2005:002</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html">http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html</ref>
      <ref source="CONFIRM" url="http://www.php.net/release_4_3_10.php">http://www.php.net/release_4_3_10.php</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-687.html" adv="1" patch="1">RHSA-2004:687</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-032.html">RHSA-2005:032</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-816.html">RHSA-2005:816</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/9028">HPSBMA01212</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2344">FLSA:2344</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18514">php-unserialize-code-execution(18514)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511">oval:org.mitre.oval:def:10511</ref>
    </refs>
    <vuln_soft>
      <prod name="openpkg" vendor="openpkg">
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="current"/>
      </prod>
      <prod name="php" vendor="php">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.0.7"/>
        <vers num="3.0.8"/>
        <vers num="3.0.9"/>
        <vers num="3.0.10"/>
        <vers num="3.0.11"/>
        <vers num="3.0.12"/>
        <vers num="3.0.13"/>
        <vers num="3.0.14"/>
        <vers num="3.0.15"/>
        <vers num="3.0.16"/>
        <vers num="3.0.17"/>
        <vers num="3.0.18"/>
        <vers num="4.0"/>
        <vers num="4.0.1" edition="patch1"/>
        <vers num="4.0.1" edition="patch2"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3" edition="patch1"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7" edition="rc1"/>
        <vers num="4.0.7" edition="rc2"/>
        <vers num="4.0.7" edition="rc3"/>
        <vers num="4.1.0"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.2" edition=":dev"/>
        <vers num="4.2.0"/>
        <vers num="4.2.1"/>
        <vers num="4.2.2"/>
        <vers num="4.2.3"/>
        <vers num="4.3.0"/>
        <vers num="4.3.1"/>
        <vers num="4.3.2"/>
        <vers num="4.3.3"/>
        <vers num="4.3.4"/>
        <vers num="4.3.5"/>
        <vers num="4.3.6"/>
        <vers num="4.3.7"/>
        <vers num="4.3.8"/>
        <vers num="4.3.9"/>
        <vers num="5.0" edition="rc1"/>
        <vers num="5.0" edition="rc2"/>
        <vers num="5.0" edition="rc3"/>
        <vers num="5.0.0"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1020" seq="2004-1020" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The addslashes function in PHP 4.3.9 does not properly escape a NULL (/0) character, which may allow remote attackers to read arbitrary files in PHP applications that contain a directory traversal vulnerability in require or include statements, but are otherwise protected by the magic_quotes_gpc mechanism.  NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute.  This candidate may change significantly in the future as a result of further discussion.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000915">CLA-2005:915</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-14.xml" adv="1">GLSA-200412-14</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:151">MDKSA-2004:151</ref>
      <ref source="CONFIRM" url="http://www.php.net/release_4_3_10.php" adv="1">http://www.php.net/release_4_3_10.php</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/9028">HPSBMA01212</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/384663" adv="1">20041216 PHP Input Validation Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11981" patch="1">11981</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18516">php-addslashes-view-files(18516)</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="4.3.6"/>
        <vers num="4.3.7"/>
        <vers num="4.3.8"/>
        <vers num="4.3.9"/>
        <vers num="5.0" edition="rc1"/>
        <vers num="5.0" edition="rc2"/>
        <vers num="5.0" edition="rc3"/>
        <vers num="5.0.0"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1021" seq="2004-1021" published="2005-03-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">iCal before 1.5.4 on Mac OS X 10.2.3, and other later versions, does not alert the user when handling calendars that use alarms, which allows attackers to execute programs and send e-mail via alarms.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2004/Nov/msg00000.html">APPLE-SA-2004-11-22</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18209">ical-calendar-authorization-bypass(18209)</ref>
    </refs>
    <vuln_soft>
      <prod name="ical" vendor="apple">
        <vers num="1.5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1022" seq="2004-1022" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Kerio Winroute Firewall before 6.0.7, ServerFirewall before 1.0.1, and MailServer before 6.0.5 use symmetric encryption for user passwords, which allows attackers to decrypt the user database and obtain the passwords by extracting the secret key from within the software.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110304957607578&amp;w=2">20041214 [CAN-2004-1022] Insecure Credential Storage on Kerio Software</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18470">kerio-weak-encryption(18470)</ref>
    </refs>
    <vuln_soft>
      <prod name="kerio_mailserver" vendor="kerio">
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.1.1"/>
        <vers num="5.6.3"/>
        <vers num="5.6.4"/>
        <vers num="5.6.5"/>
        <vers num="5.7.0"/>
        <vers num="5.7.1"/>
        <vers num="5.7.2"/>
        <vers num="5.7.3"/>
        <vers num="5.7.4"/>
        <vers num="5.7.5"/>
        <vers num="5.7.6"/>
        <vers num="5.7.7"/>
        <vers num="5.7.8"/>
        <vers num="5.7.9"/>
        <vers num="5.7.10"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
      </prod>
      <prod name="serverfirewall" vendor="kerio">
        <vers num="1.0"/>
      </prod>
      <prod name="winroute_firewall" vendor="kerio">
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="5.0.3"/>
        <vers num="5.0.4"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
        <vers num="5.0.8"/>
        <vers num="5.0.9"/>
        <vers num="5.1"/>
        <vers num="5.1.1"/>
        <vers num="5.1.2"/>
        <vers num="5.1.3"/>
        <vers num="5.1.4"/>
        <vers num="5.1.5"/>
        <vers num="5.1.6"/>
        <vers num="5.1.7"/>
        <vers num="5.1.8"/>
        <vers num="5.1.9"/>
        <vers num="5.1.10"/>
        <vers num="5.10"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="6.0.7"/>
        <vers num="6.0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1023" seq="2004-1023" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Kerio Winroute Firewall before 6.0.9, ServerFirewall before 1.0.1, and MailServer before 6.0.5, when installed on Windows based systems, do not modify the ACLs for critical files, which allows local users with Power Users privileges to modify programs, install malicious DLLs in the plug-ins folder, and modify XML files related to configuration.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110305387813002&amp;w=2">20041214 [CAN-2004-1023] Insecure default file system permissions on Microsoft versions of Kerio Software</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18471">kerio-insecure-permissions(18471)</ref>
    </refs>
    <vuln_soft>
      <prod name="kerio_mailserver" vendor="kerio">
        <vers num="6.0.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
      </prod>
      <prod name="serverfirewall" vendor="kerio">
        <vers num="1.0.0"/>
      </prod>
      <prod name="winroute_firewall" vendor="kerio">
        <vers num="6.0.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="6.0.7"/>
        <vers num="6.0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1025" seq="2004-1025" published="2005-01-10" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple heap-based buffer overflows in imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:007">MDKSA-2005:007</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-651.html" adv="1" patch="1">RHSA-2004:651</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11830" adv="1">11830</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10786">oval:org.mitre.oval:def:10786</ref>
    </refs>
    <vuln_soft>
      <prod name="imlib" vendor="enlightenment">
        <vers num="1.9.13"/>
        <vers num="1.9.14"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="7.3" edition=":i386"/>
        <vers num="7.3" edition=":i686"/>
        <vers num="9.0" edition=":i386"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1026" seq="2004-1026" published="2005-01-10" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple integer overflows in the image handler for imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-628">DSA-628</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-03.xml">GLSA-200412-03</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:007">MDKSA-2005:007</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-651.html" adv="1" patch="1">RHSA-2004:651</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11830" adv="1">11830</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10771">oval:org.mitre.oval:def:10771</ref>
    </refs>
    <vuln_soft>
      <prod name="imlib" vendor="enlightenment">
        <vers num="1.9.13"/>
        <vers num="1.9.14"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="7.3" edition=":i386"/>
        <vers num="7.3" edition=":i686"/>
        <vers num="9.0" edition=":i386"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1027" seq="2004-1027" published="2005-03-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the -x (extract) command line option in unarj allows remote attackers to overwrite arbitrary files via an arj archive with filenames that contain .. (dot dot) sequences.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027348.html">20041010 unarj dir-transversal bug (../../../..)</ref>
      <ref source="FEDORA" url="http://lwn.net/Articles/121827/">FLSA:2272</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-29.xml">GLSA-200411-29</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-628">DSA-628</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-652">DSA-652</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-007.html">RHSA-2005:007</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11436" adv="1" patch="1">11436</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17684">unarj-directory-traversal(17684)</ref>
    </refs>
    <vuln_soft>
      <prod name="unarj" vendor="arj_software_inc.">
        <vers num="2.62"/>
        <vers num="2.63_a"/>
        <vers num="2.64"/>
        <vers num="2.65"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1028" seq="2004-1028" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=170&amp;type=vulnerabilities" adv="1">20041220 IBM AIX chcod Local Privilege Escalation Vulnerability</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IY64354&amp;apar=only">IY64354</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IY64355&amp;apar=only">IY64355</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IY64356&amp;apar=only">IY64356</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18625">aix-chcod-gain-privileges(18625)</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.1"/>
        <vers num="5.1l"/>
        <vers num="5.2"/>
        <vers num="5.2.2"/>
        <vers num="5.2_l"/>
        <vers num="5.3"/>
        <vers num="5.3_l"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1029" seq="2004-1029" published="2005-03-01" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe classes and execute arbitrary code by using the reflection API to access private Java packages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://jouko.iki.fi/adv/javaplugin.html">http://jouko.iki.fi/adv/javaplugin.html</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Feb/msg00000.html">APPLE-SA-2005-02-22</ref>
      <ref source="CONFIRM" url="http://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html">http://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/61">61</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101523-1" adv="1" patch="1">101523</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1" adv="1" patch="1">57591</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=158&amp;type=vulnerabilities">20041122 Sun Java Plugin Arbitrary Package Access Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/760344">VU#760344</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12317" patch="1">12317</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0599" adv="1">ADV-2008-0599</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21257249">http://www-1.ibm.com/support/docview.wss?uid=swg21257249</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18188">sdk-jre-applet-restriction-bypass(18188)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5674">oval:org.mitre.oval:def:5674</ref>
    </refs>
    <vuln_soft>
      <prod name="java_sdk-rte" vendor="hp">
        <vers num="1.3" edition=":hp-ux_pa-risc"/>
        <vers num="1.4" edition=":hp-ux_pa-risc"/>
      </prod>
      <prod name="jdk" vendor="sun">
        <vers num="1.3.1_01" edition=":linux"/>
        <vers num="1.3.1_01" edition=":solaris"/>
        <vers num="1.3.1_01a" edition=":windows"/>
        <vers num="1.3.1_02" edition=":linux"/>
        <vers num="1.3.1_02" edition=":solaris"/>
        <vers num="1.3.1_02" edition=":windows"/>
        <vers num="1.3.1_03" edition=":linux"/>
        <vers num="1.3.1_03" edition=":solaris"/>
        <vers num="1.3.1_03" edition=":windows"/>
        <vers num="1.3.1_04" edition=":windows"/>
        <vers num="1.3.1_05" edition=":linux"/>
        <vers num="1.3.1_05" edition=":solaris"/>
        <vers num="1.3.1_05" edition=":windows"/>
        <vers num="1.3.1_06" edition=":linux"/>
        <vers num="1.3.1_06" edition=":solaris"/>
        <vers num="1.3.1_06" edition=":windows"/>
        <vers num="1.3.1_07" edition=":linux"/>
        <vers num="1.3.1_07" edition=":solaris"/>
        <vers num="1.3.1_07" edition=":windows"/>
        <vers num="1.4" edition=":linux"/>
        <vers num="1.4" edition=":solaris"/>
        <vers num="1.4" edition=":windows"/>
        <vers num="1.4.0_01" edition=":windows"/>
        <vers num="1.4.0_02" edition=":linux"/>
        <vers num="1.4.0_02" edition=":solaris"/>
        <vers num="1.4.0_02" edition=":windows"/>
        <vers num="1.4.0_03" edition=":linux"/>
        <vers num="1.4.0_03" edition=":solaris"/>
        <vers num="1.4.0_03" edition=":windows"/>
        <vers num="1.4.0_4" edition=":linux"/>
        <vers num="1.4.0_4" edition=":solaris"/>
        <vers num="1.4.0_4" edition=":windows"/>
        <vers num="1.4.1" edition=":linux"/>
        <vers num="1.4.1" edition=":solaris"/>
        <vers num="1.4.1" edition=":windows"/>
        <vers num="1.4.1_01" edition=":linux"/>
        <vers num="1.4.1_01" edition=":solaris"/>
        <vers num="1.4.1_01" edition=":windows"/>
        <vers num="1.4.1_02" edition=":linux"/>
        <vers num="1.4.1_02" edition=":solaris"/>
        <vers num="1.4.1_02" edition=":windows"/>
        <vers num="1.4.1_03" edition=":linux"/>
        <vers num="1.4.1_03" edition=":solaris"/>
        <vers num="1.4.1_03" edition=":windows"/>
        <vers num="1.4.2" edition=":linux"/>
        <vers num="1.4.2" edition=":solaris"/>
        <vers num="1.4.2" edition=":windows"/>
        <vers num="1.4.2_01" edition=":linux"/>
        <vers num="1.4.2_02" edition=":linux"/>
        <vers num="1.4.2_03" edition=":linux"/>
        <vers num="1.4.2_03" edition=":solaris"/>
        <vers num="1.4.2_03" edition=":windows"/>
        <vers num="1.4.2_04" edition=":linux"/>
        <vers num="1.4.2_04" edition=":solaris"/>
        <vers num="1.4.2_04" edition=":windows"/>
        <vers num="1.4.2_05" edition=":linux"/>
        <vers num="1.4.2_05" edition=":solaris"/>
        <vers num="1.4.2_05" edition=":windows"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.3.0" edition=":linux"/>
        <vers num="1.3.0" edition=":solaris"/>
        <vers num="1.3.0" edition=":windows"/>
        <vers num="1.3.0" edition="update1:linux"/>
        <vers num="1.3.0" edition="update2:linux"/>
        <vers num="1.3.0" edition="update2:solaris"/>
        <vers num="1.3.0" edition="update2:windows"/>
        <vers num="1.3.0" edition="update3:linux"/>
        <vers num="1.3.0" edition="update4:linux"/>
        <vers num="1.3.0" edition="update4:windows"/>
        <vers num="1.3.0" edition="update5:linux"/>
        <vers num="1.3.0" edition="update5:solaris"/>
        <vers num="1.3.0" edition="update5:windows"/>
        <vers num="1.3.1" edition=":linux"/>
        <vers num="1.3.1" edition="update1:linux"/>
        <vers num="1.3.1" edition="update1:solaris"/>
        <vers num="1.3.1" edition="update1:windows"/>
        <vers num="1.3.1" edition="update1a:windows"/>
        <vers num="1.3.1" edition="update4:solaris"/>
        <vers num="1.3.1" edition="update4:windows"/>
        <vers num="1.3.1" edition="update8:linux"/>
        <vers num="1.3.1" edition="update8:solaris"/>
        <vers num="1.3.1" edition="update8:windows"/>
        <vers num="1.3.1_02" edition=":linux"/>
        <vers num="1.3.1_02" edition=":solaris"/>
        <vers num="1.3.1_02" edition=":windows"/>
        <vers num="1.3.1_03" edition=":linux"/>
        <vers num="1.3.1_03" edition=":solaris"/>
        <vers num="1.3.1_03" edition=":windows"/>
        <vers num="1.3.1_05" edition=":linux"/>
        <vers num="1.3.1_05" edition=":solaris"/>
        <vers num="1.3.1_05" edition=":windows"/>
        <vers num="1.3.1_06" edition=":linux"/>
        <vers num="1.3.1_06" edition=":solaris"/>
        <vers num="1.3.1_06" edition=":windows"/>
        <vers num="1.3.1_07" edition=":linux"/>
        <vers num="1.3.1_07" edition=":solaris"/>
        <vers num="1.3.1_07" edition=":windows"/>
        <vers num="1.3.1_09" edition=":linux"/>
        <vers num="1.3.1_09" edition=":solaris"/>
        <vers num="1.3.1_09" edition=":windows"/>
        <vers num="1.4" edition=":linux"/>
        <vers num="1.4" edition=":solaris"/>
        <vers num="1.4" edition=":windows"/>
        <vers num="1.4.0_01" edition=":solaris"/>
        <vers num="1.4.0_01" edition=":windows"/>
        <vers num="1.4.0_02" edition=":linux"/>
        <vers num="1.4.0_02" edition=":solaris"/>
        <vers num="1.4.0_02" edition=":windows"/>
        <vers num="1.4.0_03" edition=":linux"/>
        <vers num="1.4.0_03" edition=":solaris"/>
        <vers num="1.4.0_03" edition=":windows"/>
        <vers num="1.4.0_04" edition=":linux"/>
        <vers num="1.4.0_04" edition=":solaris"/>
        <vers num="1.4.0_04" edition=":windows"/>
        <vers num="1.4.1" edition=":linux"/>
        <vers num="1.4.1" edition=":solaris"/>
        <vers num="1.4.1" edition=":windows"/>
        <vers num="1.4.1" edition="update3:linux"/>
        <vers num="1.4.1" edition="update3:solaris"/>
        <vers num="1.4.1" edition="update3:windows"/>
        <vers num="1.4.1_01" edition=":linux"/>
        <vers num="1.4.1_01" edition=":solaris"/>
        <vers num="1.4.1_01" edition=":windows"/>
        <vers num="1.4.1_02" edition=":linux"/>
        <vers num="1.4.1_02" edition=":solaris"/>
        <vers num="1.4.1_02" edition=":windows"/>
        <vers num="1.4.1_07" edition=":windows"/>
        <vers num="1.4.2" edition=":linux"/>
        <vers num="1.4.2" edition=":solaris"/>
        <vers num="1.4.2" edition=":windows"/>
        <vers num="1.4.2" edition="update1:linux"/>
        <vers num="1.4.2" edition="update1:solaris"/>
        <vers num="1.4.2" edition="update1:windows"/>
        <vers num="1.4.2" edition="update2:linux"/>
        <vers num="1.4.2" edition="update2:solaris"/>
        <vers num="1.4.2" edition="update2:windows"/>
        <vers num="1.4.2" edition="update3:linux"/>
        <vers num="1.4.2" edition="update3:solaris"/>
        <vers num="1.4.2" edition="update3:windows"/>
        <vers num="1.4.2" edition="update4:linux"/>
        <vers num="1.4.2" edition="update4:solaris"/>
        <vers num="1.4.2" edition="update4:windows"/>
        <vers num="1.4.2" edition="update5:linux"/>
        <vers num="1.4.2" edition="update5:solaris"/>
        <vers num="1.4.2" edition="update5:windows"/>
      </prod>
      <prod name="enterprise_firewall" vendor="symantec">
        <vers num="8.0" edition=":solaris"/>
        <vers num="8.0" edition=":windows_2000_nt"/>
      </prod>
      <prod name="gateway_security_5400" vendor="symantec">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="10.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.00"/>
        <vers num="11.11"/>
        <vers num="11.22"/>
        <vers num="11.23" edition=":ia64_64-bit"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1030" seq="2004-1030" published="2005-03-01" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to gain sensitive information by calling fcronsighup with an arbitrary file, which reveals the contents of the file that can not be parsed in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-27.xml">GLSA-200411-27</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=157&amp;type=vulnerabilities&amp;flashstatus=false">20041115 Multiple Security Vulnerabilities in Fcron</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11684" adv="1" patch="1">11684</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18075">fcron-fcronsighup-obtain-info(18075)</ref>
    </refs>
    <vuln_soft>
      <prod name="fcron" vendor="thibault_godouet">
        <vers num="2.0.1"/>
        <vers num="2.9.4"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1031" seq="2004-1031" published="2005-03-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifiable by the user, such as /proc/self/cmdline or /proc/self/environ.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-27.xml">GLSA-200411-27</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=157&amp;type=vulnerabilities&amp;flashstatus=false">20041115 Multiple Security Vulnerabilities in Fcron</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11684" adv="1" patch="1">11684</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18076">fcron-fcronsighup-restrictions-bypass(18076)</ref>
    </refs>
    <vuln_soft>
      <prod name="fcron" vendor="thibault_godouet">
        <vers num="2.0.1"/>
        <vers num="2.9.4"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1032" seq="2004-1032" published="2005-03-01" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to delete arbitrary files or create arbitrary empty files via a target filename with a large number of leading slash (/) characters such that fcronsighup does not properly append the intended fcrontab.sig to the resulting string.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-27.xml" adv="1" patch="1">GLSA-200411-27</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=157&amp;type=vulnerabilities&amp;flashstatus=false">20041115 Multiple Security Vulnerabilities in Fcron</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18077">fcron-fcronsighup-create-files(18077)</ref>
    </refs>
    <vuln_soft>
      <prod name="fcron" vendor="thibault_godouet">
        <vers num="2.0.1"/>
        <vers num="2.9.4"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1033" seq="2004-1033" published="2005-03-01" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Fcron 2.0.1, 2.9.4, and possibly earlier versions leak file descriptors of open files, which allows local users to bypass access restrictions and read fcron.allow and fcron.deny via the EDITOR environment variable.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-27.xml">GLSA-200411-27</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=157&amp;type=vulnerabilities&amp;flashstatus=false">20041115 Multiple Security Vulnerabilities in Fcron</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11684" adv="1" patch="1">11684</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18078">fcron-fcrontab-obtain-info(18078)</ref>
    </refs>
    <vuln_soft>
      <prod name="fcron" vendor="thibault_godouet">
        <vers num="2.0.1"/>
        <vers num="2.9.4"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1034" seq="2004-1034" published="2005-03-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the http_open function in Kaffeine before 0.5, whose code is also used in gxine before 0.3.3, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long Content-Type header for a Real Audio Media (.ram) playlist file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/028061.html">20041025 Kaffeine Media Player Conteny Type overflow</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-14.xml">GLSA-200411-14</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1060299&amp;group_id=9655&amp;atid=109655">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1060299&amp;group_id=9655&amp;atid=109655</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11528" adv="1" patch="1">11528</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17849">kaffeine-ram-bo(17849)</ref>
    </refs>
    <vuln_soft>
      <prod name="kaffeine_player" vendor="kaffeine">
        <vers num="0.4.2"/>
        <vers num="0.4.3"/>
        <vers num="0.4.3b"/>
        <vers num="0.5_rc1"/>
      </prod>
      <prod name="gxine" vendor="xine">
        <vers num="0.3"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1035" seq="2004-1035" published="2005-03-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple integer signedness errors in (1) imapcommon.c, (2) main.c, (3) request.c, and (4) select.c for up-imapproxy IMAP proxy 1.2.2 allow remote attackers to cause a denial of service (server crash) and possibly leak sensitive information via certain literal values that are not properly handled when using the IMAP_Line_Read function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109995749510773&amp;w=2">20041107 up-imapproxy DoS vulnerabilities</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17999">upimapproxy-dos(17999)</ref>
    </refs>
    <vuln_soft>
      <prod name="imap_proxy" vendor="imap_proxy">
        <vers num="1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1036" seq="2004-1036" published="2005-03-01" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the decoding of encoded text in certain headers in mime.php for SquirrelMail 1.4.3a and earlier, and 1.5.1-cvs before 23rd October 2004, allows remote attackers to execute arbitrary web script or HTML.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000905">CLA-2004:905</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html" adv="1">APPLE-SA-2005-01-25</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html" adv="1">APPLE-SA-2005-03-21</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110012133608004&amp;w=2">20041110 [SquirrelMail Security Advisory] Cross Site Scripting in encoded text</ref>
      <ref source="CONFIRM" url="http://voxel.dl.sourceforge.net/sourceforge/squirrelmail/sm143a-xss.diff">http://voxel.dl.sourceforge.net/sourceforge/squirrelmail/sm143a-xss.diff</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-25.xml" adv="1" patch="1">GLSA-200411-25</ref>
      <ref source="CONFIRM" url="http://www.squirrelmail.org/">http://www.squirrelmail.org/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18031">squirrelmail-mime-xss(18031)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9592">oval:org.mitre.oval:def:9592</ref>
    </refs>
    <vuln_soft>
      <prod name="squirrelmail" vendor="squirrelmail">
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.3_rc1"/>
        <vers num="1.4.3a"/>
        <vers num="1.5_dev"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1037" seq="2004-1037" published="2005-03-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The search function in TWiki 20030201 allows remote attackers to execute arbitrary commands via shell metacharacters in a search string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/bugtraq/2004-11/0201.html">20041116 Re: [Full-Disclosure] TWiki search function allows arbitrary shell command execution</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000918">CLA-2005:918</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110037207516456&amp;w=2">20041112 TWiki search function allows arbitrary shell command execution</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-33.xml">GLSA-200411-33</ref>
      <ref source="CONFIRM" url="http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithSearch">http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithSearch</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-039.shtml">P-039</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11674" adv="1" patch="1">11674</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18062">twik-search-command-execution(18062)</ref>
    </refs>
    <vuln_soft>
      <prod name="twiki" vendor="twiki">
        <vers num="2003-02-01"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1038" seq="2004-1038" published="2005-03-01" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">A design error in the IEEE1394 specification allows attackers with physical access to a device to read and write to sensitive memory using a modified FireWire/IEEE 1394 client, thus bypassing intended restrictions that would normally require greater degrees of physical access to exploit.  NOTE: this was reported in 2008 to affect Windows Vista, but some Linux-based operating systems have protection mechanisms against this attack.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://it.slashdot.org/article.pl?sid=08/03/04/1258210">http://it.slashdot.org/article.pl?sid=08/03/04/1258210</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109881362530790&amp;w=2">20041026 pacsec.jp advisory: Firewire/IEEE 1394 Considered Harmful to Physical Security</ref>
      <ref source="MISC" url="http://md.hudora.de/presentations/firewire/2005-firewire-cansecwest.pdf">http://md.hudora.de/presentations/firewire/2005-firewire-cansecwest.pdf</ref>
      <ref source="MISC" url="http://pacsec.jp/advisories.html">http://pacsec.jp/advisories.html</ref>
      <ref source="MISC" url="http://storm.net.nz/projects/16">http://storm.net.nz/projects/16</ref>
      <ref source="MISC" url="http://storm.net.nz/static/files/ab_firewire_rux2k6-final.pdf">http://storm.net.nz/static/files/ab_firewire_rux2k6-final.pdf</ref>
      <ref source="MISC" url="http://www.sec-consult.com/fileadmin/Whitepapers/Vista_Physical_Attacks.pdf">http://www.sec-consult.com/fileadmin/Whitepapers/Vista_Physical_Attacks.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489163/100/0/threaded">20080305 Firewire Attack on Windows Vista</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489175/100/0/threaded">20080305 Re: Firewire Attack on Windows Vista</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489189/100/0/threaded">20080305 RE: Firewire Attack on Windows Vista</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489212/100/0/threaded">20080306 Re: Firewire Attack on Windows Vista</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489257/100/0/threaded">20080306 RE: Firewire Attack on Windows Vista</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489269/100/0/threaded">20080307 Re: Firewire Attack on Windows Vista</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489295/100/0/threaded">20080308 Re: [Full-disclosure] Firewire Attack on Windows Vista</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489296/100/0/threaded">20080308 RE: [Full-disclosure] Firewire Attack on Windows Vista</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489322/100/0/threaded">20080309 Re: [Full-disclosure] Firewire Attack on Windows Vista</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489330/100/0/threaded">20080310 RE: [Full-disclosure] Firewire Attack on Windows Vista</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489335/100/0/threaded">20080309 Re: Firewire Attack on Windows Vista</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489342/100/0/threaded">20080310 Re: [Full-disclosure] Firewire Attack on Windows Vista</ref>
      <ref source="MISC" url="http://www.theage.com.au/news/security/hack-into-a-windows-pc-no-password-needed/2008/03/04/1204402423638.html">http://www.theage.com.au/news/security/hack-into-a-windows-pc-no-password-needed/2008/03/04/1204402423638.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18041">firewire-ieee1394-interface-installed(18041)</ref>
    </refs>
    <vuln_soft>
      <prod name="firewire_ieee" vendor="ieee">
        <vers num="1394"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1039" seq="2004-1039" published="2005-01-11" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The NFS mountd service on SCO UnixWare 7.1.1, 7.1.3, 7.1.4, and 7.0.1, and possibly other versions, when run from inetd, allows remote attackers to cause a denial of service (memory exhaustion) via a series of requests, which causes inetd to launch a separate process for each request.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.1/SCOSA-2005.1.txt" adv="1" patch="1">SCOSA-2005.1</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/386814" adv="1" patch="1">20050111 [NILESA-20050101]: Denial of Service vulnerability due to the mountd bug</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12225">12225</ref>
    </refs>
    <vuln_soft>
      <prod name="openserver" vendor="sco">
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
      </prod>
      <prod name="unixware" vendor="sco">
        <vers num="7.1.1"/>
        <vers num="7.1.3"/>
        <vers num="7.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1043" seq="2004-1043" published="2004-12-31" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Internet Explorer 6.0 on Windows XP SP2 allows remote attackers to execute arbitrary code by using the "Related Topics" command in the Help ActiveX Control (hhctrl.ocx) to open a Help popup window containing the PCHealth tools.htm file in the local zone and injecting Javascript to be executed, as demonstrated using "writehta.txt" and the ADODB recordset, which saves a .HTA file to the local system, aka the "HTML Help ActiveX control Cross Domain Vulnerability."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-12/0426.html">20041225 Microsoft Internet Explorer SP2 Fully Automated Remote Compromise</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/972415" adv="1">VU#972415</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA05-012B.html" adv="1">TA05-012B</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-001">MS05-001</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18311">ie-helpactivexcontrol-save-file(18311)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1349">oval:org.mitre.oval:def:1349</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1963">oval:org.mitre.oval:def:1963</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2830">oval:org.mitre.oval:def:2830</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3496">oval:org.mitre.oval:def:3496</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="sp2:tablet_pc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1049" seq="2004-1049" published="2004-12-31" modified="2018-10-12" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382891718076&amp;w=2">20041223 Microsoft Windows LoadImage API Integer Buffer overflow</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012684">1012684</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-094.shtml">P-094</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/625856" adv="1">VU#625856</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12095">12095</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA05-012A.html" adv="1">TA05-012A</ref>
      <ref source="MISC" url="http://www.xfocus.net/flashsky/icoExp/index.html">http://www.xfocus.net/flashsky/icoExp/index.html</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002">MS05-002</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18668">win-loadimage-bo(18668)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2956">oval:org.mitre.oval:def:2956</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3097">oval:org.mitre.oval:def:3097</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3220">oval:org.mitre.oval:def:3220</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3355">oval:org.mitre.oval:def:3355</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4671">oval:org.mitre.oval:def:4671</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4::fr"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold"/>
        <vers num="" edition="sp1:tablet_pc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1050" seq="2004-1050" published="2004-12-31" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Internet Explorer 6 allows remote attackers to execute arbitrary code via long (1) SRC or (2) NAME attributes in IFRAME, FRAME, and EMBED elements, as originally discovered using the mangleme utility, aka "the IFRAME vulnerability" or the "HTML Elements Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/028009.html">20041023 python does mangleme (with IE bugs!)</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/028035.html">20041025 python does mangleme (with IE bugs!)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109942758911846&amp;w=2">20041102 MSIE &lt;IFRAME> and &lt;FRAME> tag NAME property bufferoverflow PoC</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/842160" adv="1">VU#842160</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/379261">20041024 python does mangleme (with IE bugs!)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11515">11515</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-315A.html">TA04-315A</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-336A.html">TA04-336A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-040">MS04-040</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17889">ie-iframe-src-name-bo(17889)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1294">oval:org.mitre.oval:def:1294</ref>
    </refs>
    <vuln_soft>
      <prod name="ip600_media_servers" vendor="avaya">
        <vers num="r6"/>
        <vers num="r7"/>
        <vers num="r8"/>
        <vers num="r9"/>
        <vers num="r10"/>
        <vers num="r11"/>
        <vers num="r12"/>
      </prod>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp1"/>
      </prod>
      <prod name="definity_one_media_server" vendor="avaya">
        <vers num="r6"/>
        <vers num="r7"/>
        <vers num="r8"/>
        <vers num="r9"/>
        <vers num="r10"/>
        <vers num="r11"/>
        <vers num="r12"/>
      </prod>
      <prod name="s3400" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="s8100" vendor="avaya">
        <vers num="r6"/>
        <vers num="r7"/>
        <vers num="r8"/>
        <vers num="r9"/>
        <vers num="r10"/>
        <vers num="r11"/>
        <vers num="r12"/>
      </prod>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="s3400"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1051" seq="2004-1051" published="2005-03-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/May/msg00001.html">APPLE-SA-2005-05-03</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110028877431192&amp;w=2">20041112 Sudo version 1.6.8p2 now available (fwd)</ref>
      <ref source="OPENPKG" url="http://marc.info/?l=bugtraq&amp;m=110598298225675&amp;w=2">OpenPKG-SA-2005.002</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-596">DSA-596</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:133">MDKSA-2004:133</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11668" adv="1" patch="1">11668</ref>
      <ref source="CONFIRM" url="http://www.sudo.ws/sudo/alerts/bash_functions.html">http://www.sudo.ws/sudo/alerts/bash_functions.html</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0061/">2004-0061</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18055">sudo-bash-command-execution(18055)</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-28-1/">USN-28-1</ref>
    </refs>
    <vuln_soft>
      <prod name="mandrake_multi_network_firewall" vendor="mandrakesoft">
        <vers num="8.2"/>
      </prod>
      <prod name="sudo" vendor="todd_miller">
        <vers num="1.5.6"/>
        <vers num="1.5.7"/>
        <vers num="1.5.8"/>
        <vers num="1.5.9"/>
        <vers num="1.6"/>
        <vers num="1.6.1"/>
        <vers num="1.6.2"/>
        <vers num="1.6.3"/>
        <vers num="1.6.3_p1"/>
        <vers num="1.6.3_p2"/>
        <vers num="1.6.3_p3"/>
        <vers num="1.6.3_p4"/>
        <vers num="1.6.3_p5"/>
        <vers num="1.6.3_p6"/>
        <vers num="1.6.3_p7"/>
        <vers num="1.6.4"/>
        <vers num="1.6.4_p1"/>
        <vers num="1.6.4_p2"/>
        <vers num="1.6.5"/>
        <vers num="1.6.5_p1"/>
        <vers num="1.6.5_p2"/>
        <vers num="1.6.6"/>
        <vers num="1.6.7"/>
        <vers num="1.6.8"/>
        <vers num="1.6.8_p1"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1052" seq="2004-1052" published="2005-03-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the getnickuserhost function in BNC 2.8.9, and possibly other versions, allows remote IRC servers to execute arbitrary code via an IRC server response that contains many (1) ! (exclamation) or (2) @ (at sign) characters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110011817627839&amp;w=2">20041110 BNC 2.8.9 remote buffer overflow</ref>
      <ref source="MISC" url="http://security.lss.hr/en/index.php?page=details&amp;ID=LSS-2004-11-03">http://security.lss.hr/en/index.php?page=details&amp;ID=LSS-2004-11-03</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-595">DSA-595</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11647" adv="1" patch="1">11647</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18013">bnc-irc-getnickuserhost-bo(18013)</ref>
    </refs>
    <vuln_soft>
      <prod name="bnc" vendor="bnc">
        <vers num="2.2.4"/>
        <vers num="2.4.6"/>
        <vers num="2.4.8"/>
        <vers num="2.6"/>
        <vers num="2.6.2"/>
        <vers num="2.6.4"/>
        <vers num="2.8.8"/>
        <vers num="2.8.9"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1053" seq="2004-1053" published="2005-03-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in fetch on FreeBSD 4.1 through 5.3 allows remote malicious servers to execute arbitrary code via certain HTTP headers in an HTTP response, which lead to a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:16.fetch.asc">FreeBSD-SA-04:16</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11702" adv="1" patch="1">11702</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18160">fetch-http-header-bo(18160)</ref>
    </refs>
    <vuln_soft>
      <prod name="fetch" vendor="freebsd">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1054" seq="2004-1054" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Untrusted execution path vulnerability in invscout in IBM AIX 5.1.0, 5.2.0, and 5.3.0 allows local users to gain privileges by modifying the PATH environment variable to point to a malicious "uname" program, which is executed from lsvpd after lsvpd has been invoked by invscout.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=171&amp;type=vulnerabilities" adv="1">20041220 IBM AIX invscout Local Command Execution Vulnerability</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IY64820&amp;apar=only">IY64820</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IY64852&amp;apar=only">IY64852</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IY64976&amp;apar=only">IY64976</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18619">aix-invscout-gain-privileges(18619)</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.1"/>
        <vers num="5.1l"/>
        <vers num="5.2"/>
        <vers num="5.2.2"/>
        <vers num="5.2_l"/>
        <vers num="5.3"/>
        <vers num="5.3_l"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1055" seq="2004-1055" published="2005-03-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 2.6.0-pl2 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the PmaAbsoluteUri parameter, (2) the zero_rows parameter in read_dump.php, (3) the confirm form, or (4) an error message generated by the internal phpMyAdmin parser.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.netvigilance.com/html/advisory0005.htm" adv="1">http://www.netvigilance.com/html/advisory0005.htm</ref>
      <ref source="CONFIRM" url="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-3">http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-3</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18158">phpmyadmin-multiple-xss(18158)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmyadmin" vendor="phpmyadmin">
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.5_pl1"/>
        <vers num="2.5.5_rc1"/>
        <vers num="2.5.5_rc2"/>
        <vers num="2.5.6_rc1"/>
        <vers num="2.5.7"/>
        <vers num="2.5.7_pl1"/>
        <vers num="2.6.0_pl1"/>
        <vers num="2.6.0_pl2"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4" edition="rc1"/>
        <vers num="1.4" edition="rc2"/>
        <vers num="1.4" edition="rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1056" seq="2004-1056" published="2005-01-10" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-092.html">RHSA-2005:092</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-529.html">RHSA-2005:529</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-551.html">RHSA-2005:551</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-663.html">RHSA-2005:663</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2005/1878">ADV-2005-1878</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15972">linux-i810-dma-dos(15972)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795">oval:org.mitre.oval:def:9795</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-38-1/">USN-38-1</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1057" seq="2004-1057" published="2005-01-21" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.kernel.org/pub/linux/kernel/people/andrea/kernels/v2.4/2.4.23aa3/00_VM_IO-4">http://www.kernel.org/pub/linux/kernel/people/andrea/kernels/v2.4/2.4.23aa3/00_VM_IO-4</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-016.html" adv="1" patch="1">RHSA-2005:016</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-017.html">RHSA-2005:017</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2006-0140.html">RHSA-2006:0140</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12338">12338</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=137821" adv="1" patch="1">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=137821</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19275">linux-kernel-vmio-dos(19275)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11474">oval:org.mitre.oval:def:11474</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.0.9.9"/>
        <vers num="2.0.10"/>
        <vers num="2.0.11"/>
        <vers num="2.0.12"/>
        <vers num="2.0.13"/>
        <vers num="2.0.14"/>
        <vers num="2.0.15"/>
        <vers num="2.0.16"/>
        <vers num="2.0.17"/>
        <vers num="2.0.18"/>
        <vers num="2.0.19"/>
        <vers num="2.0.20"/>
        <vers num="2.0.21"/>
        <vers num="2.0.22"/>
        <vers num="2.0.23"/>
        <vers num="2.0.24"/>
        <vers num="2.0.25"/>
        <vers num="2.0.26"/>
        <vers num="2.0.27"/>
        <vers num="2.0.28"/>
        <vers num="2.0.29"/>
        <vers num="2.0.30"/>
        <vers num="2.0.31"/>
        <vers num="2.0.32"/>
        <vers num="2.0.33"/>
        <vers num="2.0.34"/>
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.1"/>
        <vers num="2.1.89"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
        <vers num="2.2.9"/>
        <vers num="2.2.10"/>
        <vers num="2.2.11"/>
        <vers num="2.2.12"/>
        <vers num="2.2.13"/>
        <vers num="2.2.14"/>
        <vers num="2.2.15" edition="pre16"/>
        <vers num="2.2.15_pre20"/>
        <vers num="2.2.16" edition="pre6"/>
        <vers num="2.2.17"/>
        <vers num="2.2.18"/>
        <vers num="2.2.19"/>
        <vers num="2.2.20"/>
        <vers num="2.2.21"/>
        <vers num="2.2.22"/>
        <vers num="2.2.23"/>
        <vers num="2.2.24"/>
        <vers num="2.2.25"/>
        <vers num="2.2.27" edition="rc2"/>
        <vers num="2.3.0"/>
        <vers num="2.3.99" edition="pre1"/>
        <vers num="2.3.99" edition="pre2"/>
        <vers num="2.3.99" edition="pre3"/>
        <vers num="2.3.99" edition="pre4"/>
        <vers num="2.3.99" edition="pre5"/>
        <vers num="2.3.99" edition="pre6"/>
        <vers num="2.3.99" edition="pre7"/>
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" prev="1" edition="pre1"/>
        <vers num="2.4.19" prev="1" edition="pre2"/>
        <vers num="2.4.19" prev="1" edition="pre3"/>
        <vers num="2.4.19" prev="1" edition="pre4"/>
        <vers num="2.4.19" prev="1" edition="pre5"/>
        <vers num="2.4.19" prev="1" edition="pre6"/>
        <vers num="2.6.20.1"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
        <vers num="4.0" edition=":advanced_server"/>
        <vers num="4.0" edition=":enterprise_server"/>
        <vers num="4.0" edition=":workstation"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1058" seq="2004-1058" published="2005-01-10" modified="2018-10-03" severity="Low" CVSS_version="2.0" CVSS_score="1.2" CVSS_base_score="1.2" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U">20060402-01-U</ref>
      <ref source="SUSE" url="http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html">SUSE-SA:2006:012</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1018">DSA-1018</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml">GLSA-200408-24</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-293.html">RHSA-2005:293</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2006-0190.html">RHSA-2006:0190</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2006-0191.html">RHSA-2006:0191</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11052">11052</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11937" adv="1" patch="1">11937</ref>
      <ref source="FEDORA" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532">FLSA:152532</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17151">linux-spawning-race-condition(17151)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427">oval:org.mitre.oval:def:10427</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/38-1/">USN-38-1</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1059" seq="2004-1059" published="2004-12-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in mnoGoSearch 3.2.26 and earlier allow remote attackers to inject arbitrary HTML and web script via the (1) next and (2) prev result search pages, and the (3) extended and (4) simple search forms.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030222.html" adv="1" patch="1">20041223 Cross-Site Scripting - an industry-wide problem</ref>
      <ref source="MISC" url="http://www.mikx.de/index.php?p=6" adv="1" patch="1">http://www.mikx.de/index.php?p=6</ref>
      <ref source="CONFIRM" url="http://www.mnogosearch.org/history.html" adv="1" patch="1">http://www.mnogosearch.org/history.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11895" adv="1" patch="1">11895</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18434">mnogosearch-search-xss(18434)</ref>
    </refs>
    <vuln_soft>
      <prod name="mnogosearch" vendor="mnogosearch">
        <vers num="3.1.19"/>
        <vers num="3.1.20"/>
        <vers num="3.2.10"/>
        <vers num="3.2.13"/>
        <vers num="3.2.14"/>
        <vers num="3.2.15"/>
        <vers num="3.2.16"/>
        <vers num="3.2.17"/>
        <vers num="3.2.18"/>
        <vers num="3.2.19"/>
        <vers num="3.2.20"/>
        <vers num="3.2.21"/>
        <vers num="3.2.22"/>
        <vers num="3.2.23"/>
        <vers num="3.2.24"/>
        <vers num="3.2.25"/>
        <vers num="3.2.26"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1060" seq="2004-1060" published="2004-04-12" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple TCP/IP and ICMP implementations, when using Path MTU (PMTU) discovery (PMTUD), allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via forged ICMP ("Fragmentation Needed and Don't Fragment was Set") packets with a low next-hop MTU value, aka the "Path MTU discovery attack."  NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability.  While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt">SCOSA-2006.4</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=112861397904255&amp;w=2">SSRT4743</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/19">19</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/57">57</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml" adv="1">20050412 Crafted ICMP Messages Can Cause Denial of Service</ref>
      <ref source="MISC" url="http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html" adv="1">http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html</ref>
      <ref source="HP" url="http://www.securityfocus.com/archive/1/418882/100/0/threaded">HPSBUX01164</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/13124">13124</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en" adv="1">http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019">MS05-019</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A181">oval:org.mitre.oval:def:181</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A196">oval:org.mitre.oval:def:196</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2188">oval:org.mitre.oval:def:2188</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3826">oval:org.mitre.oval:def:3826</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A405">oval:org.mitre.oval:def:405</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5386">oval:org.mitre.oval:def:5386</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A651">oval:org.mitre.oval:def:651</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A780">oval:org.mitre.oval:def:780</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A899">oval:org.mitre.oval:def:899</ref>
    </refs>
    <vuln_soft>
      <prod name="icmp" vendor="icmp">
        <vers num=""/>
      </prod>
      <prod name="tcp" vendor="tcp">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1061" seq="2004-1061" published="2005-01-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Bugzilla before 2.18, including 2.16.x before 2.16.11, allows remote attackers to inject arbitrary HTML and web script via forced error messages, as demonstrated using the action parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/index.php?id=a&amp;anuncio=001040">CLSA-2005:1040</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030222.html" adv="1">20041223 Cross-Site Scripting - an industry-wide problem</ref>
      <ref source="MISC" url="http://www.mikx.de/index.php?p=6" adv="1">http://www.mikx.de/index.php?p=6</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12154">12154</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=272620">https://bugzilla.mozilla.org/show_bug.cgi?id=272620</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18728">bugzilla-xss(18728)</ref>
    </refs>
    <vuln_soft>
      <prod name="bugzilla" vendor="mozilla">
        <vers num="2.16.1"/>
        <vers num="2.16.2"/>
        <vers num="2.16.3"/>
        <vers num="2.16.4"/>
        <vers num="2.16.5"/>
        <vers num="2.16.6"/>
        <vers num="2.16.7"/>
        <vers num="2.16.8"/>
        <vers num="2.16.9"/>
        <vers num="2.16.10"/>
        <vers num="2.16.11"/>
        <vers num="2.17"/>
        <vers num="2.17.1"/>
        <vers num="2.17.3"/>
        <vers num="2.17.4"/>
        <vers num="2.17.5"/>
        <vers num="2.17.6"/>
        <vers num="2.17.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1062" seq="2004-1062" published="2004-12-28" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in ViewCVS 0.9.2 allow remote attackers to inject arbitrary HTML and web script via certain error messages.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030222.html" adv="1">20041223 Cross-Site Scripting - an industry-wide problem</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200412-26.xml" adv="1" patch="1">GLSA-200412-26</ref>
      <ref source="MISC" url="http://www.mikx.de/index.php?p=6" adv="1">http://www.mikx.de/index.php?p=6</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_01_sr.html">SUSE-SR:2005:001</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18718">viewcvs-xss(18718)</ref>
    </refs>
    <vuln_soft>
      <prod name="viewcvs" vendor="viewcvs">
        <vers num="0.9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1063" seq="2004-1063" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters in the current directory name.  NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute.  This candidate may change significantly in the future as a result of further discussion.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000915">CLA-2005:915</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-14.xml">GLSA-200412-14</ref>
      <ref source="MISC" url="http://www.hardened-php.net/advisories/012004.txt">http://www.hardened-php.net/advisories/012004.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:151">MDKSA-2004:151</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:072">MDKSA-2005:072</ref>
      <ref source="CONFIRM" url="http://www.php.net/release_4_3_10.php">http://www.php.net/release_4_3_10.php</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/9028">HPSBMA01212</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/384545">20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11964">11964</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18511">php-safemodeexecdir-restriction-bypass(18511)</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-99-1/">USN-99-1</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1064" seq="2004-1064" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode.  NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute.  This candidate may change significantly in the future as a result of further discussion.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000915">CLA-2005:915</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-14.xml">GLSA-200412-14</ref>
      <ref source="MISC" url="http://www.hardened-php.net/advisories/012004.txt">http://www.hardened-php.net/advisories/012004.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:151">MDKSA-2004:151</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:072">MDKSA-2005:072</ref>
      <ref source="CONFIRM" url="http://www.php.net/release_4_3_10.php">http://www.php.net/release_4_3_10.php</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/9028">HPSBMA01212</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/384545">20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11964">11964</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18512">php-realpath-safemode-bypass(18512)</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-99-1/">USN-99-1</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-99-2/">USN-99-2</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1065" seq="2004-1065" published="2005-01-10" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="OPENPKG" url="http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html">OpenPKG-SA-2004.053</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:151">MDKSA-2004:151</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html">SUSE-SA:2005:002</ref>
      <ref source="CONFIRM" url="http://www.php.net/release_4_3_10.php">http://www.php.net/release_4_3_10.php</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-687.html" adv="1" patch="1">RHSA-2004:687</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-032.html">RHSA-2005:032</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/9028">HPSBMA01212</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2344">FLSA:2344</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18517">php-exifreaddata-bo(18517)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877">oval:org.mitre.oval:def:10877</ref>
    </refs>
    <vuln_soft>
      <prod name="openpkg" vendor="openpkg">
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="current"/>
      </prod>
      <prod name="php" vendor="php">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.0.7"/>
        <vers num="3.0.8"/>
        <vers num="3.0.9"/>
        <vers num="3.0.10"/>
        <vers num="3.0.11"/>
        <vers num="3.0.12"/>
        <vers num="3.0.13"/>
        <vers num="3.0.14"/>
        <vers num="3.0.15"/>
        <vers num="3.0.16"/>
        <vers num="3.0.17"/>
        <vers num="3.0.18"/>
        <vers num="4.0"/>
        <vers num="4.0.1" edition="patch1"/>
        <vers num="4.0.1" edition="patch2"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3" edition="patch1"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7" edition="rc1"/>
        <vers num="4.0.7" edition="rc2"/>
        <vers num="4.0.7" edition="rc3"/>
        <vers num="4.1.0"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.2" edition=":dev"/>
        <vers num="4.2.0"/>
        <vers num="4.2.1"/>
        <vers num="4.2.2"/>
        <vers num="4.2.3"/>
        <vers num="4.3.0"/>
        <vers num="4.3.1"/>
        <vers num="4.3.2"/>
        <vers num="4.3.3"/>
        <vers num="4.3.4"/>
        <vers num="4.3.5"/>
        <vers num="4.3.6"/>
        <vers num="4.3.7"/>
        <vers num="4.3.8"/>
        <vers num="4.3.9"/>
        <vers num="5.0" edition="rc1"/>
        <vers num="5.0" edition="rc2"/>
        <vers num="5.0" edition="rc3"/>
        <vers num="5.0.0"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1066" seq="2004-1066" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:P)">
    <desc>
      <descript source="cve">The cmdline pseudofiles in (1) procfs on FreeBSD 4.8 through 5.3, and (2) linprocfs on FreeBSD 5.x through 5.3, do not properly validate a process argument vector, which allows local users to cause a denial of service (panic) or read portions of kernel memory.  NOTE: this candidate might be SPLIT into 2 separate items in the future.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:17.procfs.asc">FreeBSD-SA-04:17</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18321">freebsd-profs-linprocfs-info-disclosure(18321)</ref>
    </refs>
    <vuln_soft>
      <prod name="freebsd" vendor="freebsd">
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.1.1"/>
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.4"/>
        <vers num="4.5"/>
        <vers num="4.6"/>
        <vers num="4.7"/>
        <vers num="4.8" edition="releng"/>
        <vers num="4.9"/>
        <vers num="4.10" edition="release"/>
        <vers num="4.10" edition="releng"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
        <vers num="5.2.1" edition="release"/>
        <vers num="5.2.1" edition="releng"/>
        <vers num="5.3" edition="release"/>
        <vers num="5.3" edition="stable"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1067" seq="2004-1067" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://asg.web.cmu.edu/cyrus/download/imapd/changes.html">http://asg.web.cmu.edu/cyrus/download/imapd/changes.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11738" adv="1" patch="1">11738</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18333">cyrus-mysaslcanonuser-offbyone-bo(18333)</ref>
      <ref source="UBUNTU" url="https://www.ubuntu.com/usn/usn-37-1/">USN-37-1</ref>
    </refs>
    <vuln_soft>
      <prod name="cyrus_imap_server" vendor="carnegie_mellon_university">
        <vers num="1.4"/>
        <vers num="1.5.19"/>
        <vers num="2.0.12"/>
        <vers num="2.0.16"/>
        <vers num="2.1.7"/>
        <vers num="2.1.9"/>
        <vers num="2.1.10"/>
        <vers num="2.1.16"/>
        <vers num="2.2.0_alpha"/>
        <vers num="2.2.1_beta"/>
        <vers num="2.2.2_beta"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
        <vers num="2.2.9"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1068" seq="2004-1068" published="2005-01-10" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.2" CVSS_base_score="6.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U">20060402-01-U</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110306397320336&amp;w=2">20041214 [USN-38-1] Linux kernel vulnerabilities</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_44_kernel.html">SUSE-SA:2004:044</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-504.html">RHSA-2004:504</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-505.html">RHSA-2004:505</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-537.html">RHSA-2004:537</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/381689">20041119 Addendum, recent Linux &lt;= 2.4.27 vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11715" adv="1" patch="1">11715</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18230">linux-afunix-race-condition(18230)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384">oval:org.mitre.oval:def:11384</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1069" seq="2004-1069" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="1.2" CVSS_base_score="1.2" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Race condition in SELinux 2.6.x through 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110306397320336&amp;w=2">20041214 [USN-38-1] Linux kernel vulnerabilities</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=110045613004761">[linux-kernel] 20041114 [PATCH] linux 2.9.10-rc1: Fix oops in unix_dgram_sendmsg when using</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18312">linux-sockdgramsendmsg-race-condition(18312)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1070" seq="2004-1070" published="2005-01-10" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U">20060402-01-U</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="MISC" url="http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt">http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-504.html">RHSA-2004:504</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-505.html">RHSA-2004:505</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-549.html">RHSA-2004:549</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11646">11646</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18025">linux-elf-setuid-gain-privileges(18025)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9450">oval:org.mitre.oval:def:9450</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1071" seq="2004-1071" published="2005-01-10" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U">20060402-01-U</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="MISC" url="http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt">http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-504.html">RHSA-2004:504</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-505.html">RHSA-2004:505</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-537.html" adv="1" patch="1">RHSA-2004:537</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11646">11646</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18025">linux-elf-setuid-gain-privileges(18025)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9917">oval:org.mitre.oval:def:9917</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1072" seq="2004-1072" published="2005-01-10" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U">20060402-01-U</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="MISC" url="http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt">http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-504.html">RHSA-2004:504</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-505.html">RHSA-2004:505</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-537.html" adv="1" patch="1">RHSA-2004:537</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-275.html">RHSA-2005:275</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11646">11646</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18025">linux-elf-setuid-gain-privileges(18025)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11195">oval:org.mitre.oval:def:11195</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1073" seq="2004-1073" published="2005-01-10" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="MISC" url="http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt">http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-504.html">RHSA-2004:504</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-505.html">RHSA-2004:505</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-549.html" adv="1" patch="1">RHSA-2004:549</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-293.html">RHSA-2005:293</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2006-0190.html">RHSA-2006:0190</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2006-0191.html">RHSA-2006:0191</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11646">11646</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18025">linux-elf-setuid-gain-privileges(18025)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11503">oval:org.mitre.oval:def:11503</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="1.5"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1074" seq="2004-1074" published="2005-01-10" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The binfmt functionality in the Linux kernel, when "memory overcommit" is enabled, allows local users to cause a denial of service (kernel oops) via a malformed a.out binary.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/index.php?id=a&amp;anuncio=000930">CLA-2005:930</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110322596918807&amp;w=2">20041216 [USN-39-1] Linux amd64 kernel vulnerability</ref>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=110021173607372&amp;w=2">[linux-kernel] 20041111 a.out issue</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11754" adv="1" patch="1">11754</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2005/0001/">2005-0001</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18290">linux-aout-binary-dos(18290)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9751">oval:org.mitre.oval:def:9751</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1075" seq="2004-1075" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in standard_error_message.dtml for Zwiki after 0.10.0rc1 to 0.36.2 allows remote attackers to inject arbitrary HTML and web script via a malformed URL, which is not properly cleansed when generating an error message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110138568212036&amp;w=2">20041124 STG Security Advisory: [SSA-20041122-12] Zwiki XSS vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110149122529761&amp;w=2">20041126 Re: STG Security Advisory: [SSA-20041122-12] Zwiki XSS vulnerability</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-23.xml">GLSA-200412-23</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11745" patch="1">11745</ref>
      <ref source="CONFIRM" url="http://zwiki.org/925ZwikiXSSVulnerability">http://zwiki.org/925ZwikiXSSVulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18237">zwiki-link-xss(18237)</ref>
    </refs>
    <vuln_soft>
      <prod name="zwiki" vendor="zwiki">
        <vers num="0.10_rc1"/>
        <vers num="0.36.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1076" seq="2004-1076" published="2005-01-10" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the RtConfigLoad function in rt-config.c for Atari800 before 1.3.4 allow local users to execute arbitrary code via large values in the configuration file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/atari800/atari800/DOC/ChangeLog?view=markup">http://cvs.sourceforge.net/viewcvs.py/atari800/atari800/DOC/ChangeLog?view=markup</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110142899319841&amp;w=2">20041125 Atari800 - local root.</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110149441815270&amp;w=2">20041126 Re: Atari800 - local root. (fwd)</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-609">DSA-609</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11756" adv="1" patch="1">11756</ref>
    </refs>
    <vuln_soft>
      <prod name="atari800" vendor="atari800">
        <vers num="0.5.4"/>
        <vers num="0.6"/>
        <vers num="0.6.2"/>
        <vers num="0.7"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.6"/>
        <vers num="0.8.7"/>
        <vers num="0.8.8"/>
        <vers num="0.8.9"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.9a"/>
        <vers num="0.9.9b"/>
        <vers num="0.9.9c"/>
        <vers num="0.9.9d"/>
        <vers num="0.9.9e"/>
        <vers num="0.9.9f"/>
        <vers num="0.9.9g"/>
        <vers num="0.9.9h"/>
        <vers num="0.9.9i"/>
        <vers num="0.9.9j"/>
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.1_pre0"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2_pre0"/>
        <vers num="1.3"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1077" seq="2004-1077" published="2004-04-26" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Citrix Program Neighborhood Agent for Win32 8.00.24737 and earlier and MetaFrame Presentation Server client for WinCE before 8.33 allows remote servers to create arbitrary shortcuts on the client via a full UNC path in the AppInStartmenu directive.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.citrix.com/kb/entry.jspa?externalID=CTX105650" adv="1">http://support.citrix.com/kb/entry.jspa?externalID=CTX105650</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=237&amp;type=vulnerabilities" adv="1" patch="1">20050426 Citrix Program Neighborhood Agent Arbitrary Shortcut Creation Vulnerability</ref>
    </refs>
    <vuln_soft>
      <prod name="metaframe_client" vendor="citrix">
        <vers num="8.0" edition=":win-ce"/>
      </prod>
      <prod name="program_neighborhood_agent" vendor="citrix">
        <vers num="8.0" edition=":win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1078" seq="2004-1078" published="2004-04-26" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the client for Citrix Program Neighborhood Agent for Win32 8.00.24737 and earlier and Citrix MetaFrame Presentation Server client for WinCE before 8.33 allows remote attackers to execute arbitrary code via a long cached icon filename in the InName XML element.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.citrix.com/kb/entry.jspa?externalID=CTX105650" adv="1" patch="1">http://support.citrix.com/kb/entry.jspa?externalID=CTX105650</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=238&amp;type=vulnerabilities" adv="1" patch="1">20050426 Citrix Program Neighborhood Agent Buffer Overflow</ref>
    </refs>
    <vuln_soft>
      <prod name="metaframe_client" vendor="citrix">
        <vers num="8.0" edition=":win-ce"/>
      </prod>
      <prod name="program_neighborhood_agent" vendor="citrix">
        <vers num="8.0" edition=":win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1079" seq="2004-1079" published="2005-01-10" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in (1) ncplogin and (2) ncpmap in nwclient.c for ncpfs 2.2.4, and possibly other versions, may allow local users to gain privileges via a long -T option.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029563.html">20041129 ncpfs buffer overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110175523207437&amp;w=2">20041129 ncpfs buffer overflow</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-09.xml">GLSA-200412-09</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:028">MDKSA-2005:028</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/433927/100/0/threaded">FLSA:152904</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11945" adv="1" patch="1">11945</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18283">ncpfs-nwclientc-bo(18283)</ref>
    </refs>
    <vuln_soft>
      <prod name="ncpfs" vendor="ncpfs">
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1080" seq="2004-1080" published="2005-01-10" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110150370506704&amp;w=2">20041126 Immunity, Inc Advisor</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012516">1012516</ref>
      <ref source="MSKB" url="http://support.microsoft.com/kb/890710">890710</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-054.shtml">P-054</ref>
      <ref source="MISC" url="http://www.immunitysec.com/downloads/instantanea.pdf">http://www.immunitysec.com/downloads/instantanea.pdf</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/145134" adv="1" patch="1">VU#145134</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11763" adv="1" patch="1">11763</ref>
      <ref source="ISS" url="http://xforce.iss.net/xforce/alerts/id/184">20041129 Microsoft WINS Server Vulnerability</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-045">MS04-045</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18259">wins-memory-pointer-hijack(18259)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1549">oval:org.mitre.oval:def:1549</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2541">oval:org.mitre.oval:def:2541</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2734">oval:org.mitre.oval:def:2734</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3677">oval:org.mitre.oval:def:3677</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4372">oval:org.mitre.oval:def:4372</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4831">oval:org.mitre.oval:def:4831</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="2000" edition=":small_business_server"/>
        <vers num="2003" edition=":small_business_server"/>
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise_64-bit"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="web"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition=":enterprise_server"/>
        <vers num="4.0" edition=":server"/>
        <vers num="4.0" edition=":terminal_server"/>
        <vers num="4.0" edition="sp1:enterprise_server"/>
        <vers num="4.0" edition="sp1:server"/>
        <vers num="4.0" edition="sp1:terminal_server"/>
        <vers num="4.0" edition="sp2:enterprise_server"/>
        <vers num="4.0" edition="sp2:server"/>
        <vers num="4.0" edition="sp2:terminal_server"/>
        <vers num="4.0" edition="sp3:enterprise_server"/>
        <vers num="4.0" edition="sp3:server"/>
        <vers num="4.0" edition="sp3:terminal_server"/>
        <vers num="4.0" edition="sp4:enterprise_server"/>
        <vers num="4.0" edition="sp4:server"/>
        <vers num="4.0" edition="sp4:terminal_server"/>
        <vers num="4.0" edition="sp5:enterprise_server"/>
        <vers num="4.0" edition="sp5:server"/>
        <vers num="4.0" edition="sp5:terminal_server"/>
        <vers num="4.0" edition="sp6:enterprise_server"/>
        <vers num="4.0" edition="sp6:server"/>
        <vers num="4.0" edition="sp6:terminal_server"/>
        <vers num="4.0" edition="sp6a:enterprise_server"/>
        <vers num="4.0" edition="sp6a:server"/>
        <vers num="4.0" edition="sp6a:terminal_server"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1081" seq="2004-1081" published="2004-12-02" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Application Framework (AppKit) for Apple Mac OS X 10.2.8 and 10.3.6 does not properly restrict access to a secure text input field, which allows local users to read keyboard input from other applications within the same window session.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html" adv="1" patch="1">APPLE-SA-2004-12-02</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-049.shtml" adv="1" patch="1">P-049</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11802" adv="1" patch="1">11802</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18350">macos-appkit-obtain-info(18350)</ref>
    </refs>
    <vuln_soft>
      <prod name="darwin_streaming_server" vendor="apple">
        <vers num="4.1.3"/>
        <vers num="5.0.1"/>
      </prod>
      <prod name="quicktime_streaming_server" vendor="apple">
        <vers num="4.1.1"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1082" seq="2004-1082" published="2004-02-03" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">mod_digest_apple for Apache 1.3.31 and 1.3.32 on Mac OS X Server does not properly verify the nonce of a client response, which allows remote attackers to replay credentials.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html" adv="1" patch="1">APPLE-SA-2004-12-02</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-049.shtml" adv="1" patch="1">P-049</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9571" adv="1" patch="1">9571</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Dec/1012414.html" adv="1" patch="1">1012414</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18347">macos-moddigest-response-replay(18347)</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.6"/>
        <vers num="1.3.7" edition=":dev"/>
        <vers num="1.3.9"/>
        <vers num="1.3.11"/>
        <vers num="1.3.12"/>
        <vers num="1.3.14"/>
        <vers num="1.3.17"/>
        <vers num="1.3.18"/>
        <vers num="1.3.19"/>
        <vers num="1.3.20"/>
        <vers num="1.3.22"/>
        <vers num="1.3.23"/>
        <vers num="1.3.24"/>
        <vers num="1.3.25"/>
        <vers num="1.3.26"/>
        <vers num="1.3.27"/>
        <vers num="1.3.28"/>
        <vers num="1.3.29"/>
      </prod>
      <prod name="apache_mod_digest_apple" vendor="apple">
        <vers num=""/>
      </prod>
      <prod name="communication_manager" vendor="avaya">
        <vers num="1.1"/>
        <vers num="1.3.1"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
      </prod>
      <prod name="intuity_audix_lx" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="mn100" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="network_routing" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="virtualvault" vendor="hp">
        <vers num="4.5"/>
        <vers num="4.6"/>
        <vers num="4.7"/>
      </prod>
      <prod name="webproxy" vendor="hp">
        <vers num="a.02.00"/>
        <vers num="a.02.10"/>
      </prod>
      <prod name="http_server" vendor="ibm">
        <vers num="1.3.19"/>
      </prod>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="1.1"/>
        <vers num="2.0"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4"/>
        <vers num="3.5"/>
        <vers num="current"/>
      </prod>
      <prod name="openserver" vendor="sco">
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
      </prod>
      <prod name="solaris" vendor="sun">
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1083" seq="2004-1083" published="2004-12-03" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Apache for Apple Mac OS X 10.2.8 and 10.3.6 restricts access to files in a case sensitive manner, but the Apple HFS+ filesystem accesses files in a case insensitive manner, which allows remote attackers to read .DS_Store files and files beginning with ".ht" using alternate capitalization.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html" adv="1" patch="1">APPLE-SA-2004-12-02</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html">APPLE-SA-2005-08-17</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html">APPLE-SA-2005-08-15</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-049.shtml" adv="1" patch="1">P-049</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11802">11802</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18348">apache-hfs-file-disclosure(18348)</ref>
    </refs>
    <vuln_soft>
      <prod name="darwin_streaming_server" vendor="apple">
        <vers num="4.1.3"/>
        <vers num="5.0.1"/>
      </prod>
      <prod name="quicktime_streaming_server" vendor="apple">
        <vers num="4.1.1"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1084" seq="2004-1084" published="2004-12-02" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Apache for Apple Mac OS X 10.2.8 and 10.3.6 allows remote attackers to read files and resource fork content via HTTP requests to certain special file names related to multiple data streams in HFS+, which bypass Apache file handles.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html" adv="1" patch="1">APPLE-SA-2004-12-02</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html">APPLE-SA-2005-08-17</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html">APPLE-SA-2005-08-15</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-049.shtml" adv="1" patch="1">P-049</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11802">11802</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18349">apache-hfs-obtain-info(18349)</ref>
    </refs>
    <vuln_soft>
      <prod name="darwin_streaming_server" vendor="apple">
        <vers num="4.1.3"/>
        <vers num="5.0.1"/>
      </prod>
      <prod name="quicktime_streaming_server" vendor="apple">
        <vers num="4.1.1"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1085" seq="2004-1085" published="2004-12-02" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Human Interface Toolbox (HIToolBox) for Apple Mac 0S X 10.3.6 allows local users to exit applications via the force-quit key combination, even when the system is running in kiosk mode.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html" adv="1" patch="1">APPLE-SA-2004-12-02</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-049.shtml" adv="1" patch="1">P-049</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11802">11802</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18352">macos-hitoolbox-kiosk-dos(18352)</ref>
    </refs>
    <vuln_soft>
      <prod name="darwin_streaming_server" vendor="apple">
        <vers num="4.1.3"/>
        <vers num="5.0.1"/>
      </prod>
      <prod name="quicktime_streaming_server" vendor="apple">
        <vers num="4.1.1"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1086" seq="2004-1086" published="2004-12-02" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in PSNormalizer for Apple Mac OS X 10.3.6 allows remote attackers to execute arbitrary code via a crafted PostScript input file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html" adv="1" patch="1">APPLE-SA-2004-12-02</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-049.shtml" adv="1" patch="1">P-049</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11802">11802</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18354">macos-psnormalizer-bo(18354)</ref>
    </refs>
    <vuln_soft>
      <prod name="darwin_streaming_server" vendor="apple">
        <vers num="4.1.3"/>
        <vers num="5.0.1"/>
      </prod>
      <prod name="quicktime_streaming_server" vendor="apple">
        <vers num="4.1.1"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1087" seq="2004-1087" published="2004-12-02" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Terminal for Apple Mac OS X 10.3.6 may indicate that "Secure Keyboard Entry" is enabled even when it is not, which could result in a false sense of security for the user.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html" adv="1" patch="1">APPLE-SA-2004-12-02</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-049.shtml" adv="1" patch="1">P-049</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11802">11802</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18355">macos-terminal-secure-improper(18355)</ref>
    </refs>
    <vuln_soft>
      <prod name="darwin_streaming_server" vendor="apple">
        <vers num="4.1.3"/>
        <vers num="5.0.1"/>
      </prod>
      <prod name="quicktime_streaming_server" vendor="apple">
        <vers num="4.1.1"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1088" seq="2004-1088" published="2004-12-02" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Postfix server for Apple Mac OS X 10.3.6, when using CRAM-MD5, allows remote attackers to send mail without authentication by replaying authentication information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html" adv="1" patch="1">APPLE-SA-2004-12-02</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-049.shtml" adv="1" patch="1">P-049</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11802">11802</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18353">postfix-crammd5-auth-replay(18353)</ref>
    </refs>
    <vuln_soft>
      <prod name="darwin_streaming_server" vendor="apple">
        <vers num="4.1.3"/>
        <vers num="5.0.1"/>
      </prod>
      <prod name="quicktime_streaming_server" vendor="apple">
        <vers num="4.1.1"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1089" seq="2004-1089" published="2004-12-02" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Apple Mac OS X 10.3.6 server, when using Kerberos authentication and Cyrus IMAP allows local users to access mailboxes of other users.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html" adv="1" patch="1">APPLE-SA-2004-12-02</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-049.shtml" adv="1" patch="1">P-049</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11802">11802</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18351">cyrus-kerberos-gain-access(18351)</ref>
    </refs>
    <vuln_soft>
      <prod name="darwin_streaming_server" vendor="apple">
        <vers num="4.1.3"/>
        <vers num="5.0.1"/>
      </prod>
      <prod name="quicktime_streaming_server" vendor="apple">
        <vers num="4.1.1"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1090" seq="2004-1090" published="2005-04-14" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service via "a corrupt section header."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-639" adv="1" patch="1">DSA-639</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-512.html">RHSA-2005:512</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18907">midnight-commander-section-dos(18907)</ref>
    </refs>
    <vuln_soft>
      <prod name="midnight_commander" vendor="midnight_commander">
        <vers num="4.5.40"/>
        <vers num="4.5.41"/>
        <vers num="4.5.42"/>
        <vers num="4.5.43"/>
        <vers num="4.5.44"/>
        <vers num="4.5.45"/>
        <vers num="4.5.46"/>
        <vers num="4.5.47"/>
        <vers num="4.5.48"/>
        <vers num="4.5.49"/>
        <vers num="4.5.50"/>
        <vers num="4.5.51"/>
        <vers num="4.5.52"/>
        <vers num="4.5.54"/>
        <vers num="4.5.55"/>
        <vers num="4.6"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="turbolinux_workstation" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1091" seq="2004-1091" published="2005-04-14" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service by triggering a null dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-639" adv="1" patch="1">DSA-639</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-512.html">RHSA-2005:512</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18908">midnight-commander-find-dos(18908)</ref>
    </refs>
    <vuln_soft>
      <prod name="midnight_commander" vendor="midnight_commander">
        <vers num="4.5.40"/>
        <vers num="4.5.41"/>
        <vers num="4.5.42"/>
        <vers num="4.5.43"/>
        <vers num="4.5.44"/>
        <vers num="4.5.45"/>
        <vers num="4.5.46"/>
        <vers num="4.5.47"/>
        <vers num="4.5.48"/>
        <vers num="4.5.49"/>
        <vers num="4.5.50"/>
        <vers num="4.5.51"/>
        <vers num="4.5.52"/>
        <vers num="4.5.54"/>
        <vers num="4.5.55"/>
        <vers num="4.6"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="turbolinux_workstation" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1092" seq="2004-1092" published="2005-04-14" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service by causing mc to free unallocated memory.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-639" adv="1" patch="1">DSA-639</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-24.xml">GLSA-200502-24</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18904">midnight-commander-memory-allocation(18904)</ref>
    </refs>
    <vuln_soft>
      <prod name="midnight_commander" vendor="midnight_commander">
        <vers num="4.5.40"/>
        <vers num="4.5.41"/>
        <vers num="4.5.42"/>
        <vers num="4.5.43"/>
        <vers num="4.5.44"/>
        <vers num="4.5.45"/>
        <vers num="4.5.46"/>
        <vers num="4.5.47"/>
        <vers num="4.5.48"/>
        <vers num="4.5.49"/>
        <vers num="4.5.50"/>
        <vers num="4.5.51"/>
        <vers num="4.5.52"/>
        <vers num="4.5.54"/>
        <vers num="4.5.55"/>
        <vers num="4.6"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="turbolinux_workstation" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1093" seq="2004-1093" published="2005-04-14" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service via "use of already freed memory."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-639" adv="1" patch="1">DSA-639</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-512.html">RHSA-2005:512</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18905">midnight-commander-key-dos(18905)</ref>
    </refs>
    <vuln_soft>
      <prod name="midnight_commander" vendor="midnight_commander">
        <vers num="4.5.40"/>
        <vers num="4.5.41"/>
        <vers num="4.5.42"/>
        <vers num="4.5.43"/>
        <vers num="4.5.44"/>
        <vers num="4.5.45"/>
        <vers num="4.5.46"/>
        <vers num="4.5.47"/>
        <vers num="4.5.48"/>
        <vers num="4.5.49"/>
        <vers num="4.5.50"/>
        <vers num="4.5.51"/>
        <vers num="4.5.52"/>
        <vers num="4.5.54"/>
        <vers num="4.5.55"/>
        <vers num="4.6"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="turbolinux_workstation" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1094" seq="2004-1094" published="2005-01-10" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in InnerMedia DynaZip DUNZIP32.dll file version 5.00.03 and earlier allows remote attackers to execute arbitrary code via a ZIP file containing a file with a long filename, as demonstrated using (1) a .rjs (skin) file in RealPlayer 10 through RealPlayer 10.5 (6.0.12.1053), RealOne Player 1 and 2, (2) the Restore Backup function in CheckMark Software Payroll 2004/2005 3.9.6 and earlier, (3) CheckMark MultiLedger before 7.0.2, (4) dtSearch 6.x and 7.x, (5) mcupdmgr.exe and mghtml.exe in McAfee VirusScan 10 Build 10.0.21 and earlier, (6) IBM Lotus Notes before 6.5.5, and other products.  NOTE: it is unclear whether this is the same vulnerability as CVE-2004-0575, although the data manipulations are the same.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-10/1044.html">20041027 EEYE: RealPlayer Zipped Skin File Buffer Overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109894226007607&amp;w=2">20041027 High Risk Vulnerability in RealPlayer</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/296">296</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/653">653</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011944">1011944</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012297">1012297</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1016817">1016817</ref>
      <ref source="CONFIRM" url="http://service.real.com/help/faq/security/041026_player/EN/">http://service.real.com/help/faq/security/041026_player/EN/</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/582498" adv="1">VU#582498</ref>
      <ref source="MISC" url="http://www.networksecurity.fi/advisories/dtsearch.html" adv="1">http://www.networksecurity.fi/advisories/dtsearch.html</ref>
      <ref source="MISC" url="http://www.networksecurity.fi/advisories/lotus-notes.html">http://www.networksecurity.fi/advisories/lotus-notes.html</ref>
      <ref source="MISC" url="http://www.networksecurity.fi/advisories/mcafee-virusscan.html">http://www.networksecurity.fi/advisories/mcafee-virusscan.html</ref>
      <ref source="MISC" url="http://www.networksecurity.fi/advisories/multiledger.html">http://www.networksecurity.fi/advisories/multiledger.html</ref>
      <ref source="MISC" url="http://www.networksecurity.fi/advisories/payroll.html">http://www.networksecurity.fi/advisories/payroll.html</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/6Z00W00EAM.html">http://www.securiteam.com/windowsntfocus/6Z00W00EAM.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/420274/100/0/threaded">20051223 dtSearch DUNZIP32.dll Buffer Overflow Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/429361/100/0/threaded">20060330 McAfee VirusScan DUNZIP32.dll Buffer Overflow Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/445369/100/0/threaded">20060906 IBM Lotus Notes DUNZIP32.dll Buffer Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11555" adv="1">11555</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2005/2057">ADV-2005-2057</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/1176">ADV-2006-1176</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17879">realplayer-dunzip32-bo(17879)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/22737">payroll-dunzip32-bo(22737)</ref>
    </refs>
    <vuln_soft>
      <prod name="checkmark_payroll" vendor="checkmark">
        <vers num="3.7.5"/>
        <vers num="3.9.1"/>
        <vers num="3.9.2"/>
        <vers num="3.9.3"/>
        <vers num="3.9.4"/>
        <vers num="3.9.5"/>
        <vers num="3.9.6" prev="1"/>
      </prod>
      <prod name="multiledger" vendor="checkmark">
        <vers num="6.0.3"/>
        <vers num="6.0.5"/>
        <vers num="7.0.0"/>
        <vers num="7.0.1" prev="1"/>
      </prod>
      <prod name="dynazip_library" vendor="innermedia">
        <vers num="5.00.00"/>
        <vers num="5.00.01"/>
        <vers num="5.00.02"/>
        <vers num="5.00.03"/>
      </prod>
      <prod name="realone_player" vendor="realnetworks">
        <vers num="1.0"/>
        <vers num="2.0"/>
      </prod>
      <prod name="realplayer" vendor="realnetworks">
        <vers num="10.0"/>
        <vers num="10.0_6.0.12.690"/>
        <vers num="10.0_beta"/>
        <vers num="10.5"/>
        <vers num="10.5_6.0.12.1016_beta"/>
        <vers num="10.5_6.0.12.1040"/>
        <vers num="10.5_6.0.12.1053"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1095" seq="2004-1095" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple integer overflows in (1) readbmp.c, (2) readgif.c, (3) readgif.c, (4) readmrf.c, (5) readpcx.c, (6) readpng.c,(7) readpnm.c, (8) readprf.c, (9) readtiff.c, (10) readxbm.c, (11) readxpm.c in zgv 5.8 allow remote attackers to execute arbitrary code via certain image headers that cause calculations to be overflowed and small buffers to be allocated, leading to buffer overflows.  NOTE: CVE-2004-0994 and CVE-2004-1095 identify sets of bugs that only partially overlap, despite having the same developer.  Therefore, they should be regarded as distinct.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109886210702781&amp;w=2">20041026 zgv image viewing heap overflows</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109898111915661&amp;w=2">20041028 Re: zgv image viewing heap overflows</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-12.xml">GLSA-200411-12</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11556" adv="1" patch="1">11556</ref>
      <ref source="CONFIRM" url="http://www.svgalib.org/rus/zgv/">http://www.svgalib.org/rus/zgv/</ref>
      <ref source="CONFIRM" url="http://www.svgalib.org/rus/zgv/zgv-5.8-integer-overflow-fix.diff">http://www.svgalib.org/rus/zgv/zgv-5.8-integer-overflow-fix.diff</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17871">zgv-image-header-bo(17871)</ref>
    </refs>
    <vuln_soft>
      <prod name="xzgv_image_viewer" vendor="zgv">
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
      </prod>
      <prod name="zgv_image_viewer" vendor="zgv">
        <vers num="5.5"/>
        <vers num="5.6"/>
        <vers num="5.7"/>
        <vers num="5.8"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1096" seq="2004-1096" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-31.xml" adv="1" patch="1">GLSA-200410-31</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=153&amp;type=vulnerabilities&amp;flashstatus=true" adv="1">20041018 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/492545">VU#492545</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:118">MDKSA-2004:118</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11448" adv="1" patch="1">11448</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17761">antivirus-zip-protection-bypass(17761)</ref>
    </refs>
    <vuln_soft>
      <prod name="brightstor_arcserve_backup" vendor="ca">
        <vers num="11.1"/>
      </prod>
      <prod name="etrust_antivirus" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.0_sp2"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_antivirus_gateway" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
      <prod name="etrust_ez_antivirus" vendor="ca">
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.3"/>
      </prod>
      <prod name="etrust_ez_armor" vendor="ca">
        <vers num="2.0"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
      <prod name="etrust_intrusion_detection" vendor="ca">
        <vers num="1.4.1.13"/>
        <vers num="1.4.5"/>
        <vers num="1.5"/>
      </prod>
      <prod name="etrust_secure_content_manager" vendor="ca">
        <vers num="1.0" edition="sp1"/>
        <vers num="1.1"/>
      </prod>
      <prod name="inoculateit" vendor="ca">
        <vers num="6.0"/>
      </prod>
      <prod name="nod32_antivirus" vendor="eset_software">
        <vers num="1.0.11"/>
        <vers num="1.0.12"/>
        <vers num="1.0.13"/>
      </prod>
      <prod name="kaspersky_anti-virus" vendor="kaspersky_lab">
        <vers num="3.0"/>
        <vers num="4.0"/>
        <vers num="5.0"/>
      </prod>
      <prod name="antivirus_engine" vendor="mcafee">
        <vers num="4.3.20"/>
      </prod>
      <prod name="rav_antivirus_desktop" vendor="rav_antivirus">
        <vers num="8.6"/>
      </prod>
      <prod name="rav_antivirus_for_file_servers" vendor="rav_antivirus">
        <vers num="1.0"/>
      </prod>
      <prod name="rav_antivirus_for_mail_servers" vendor="rav_antivirus">
        <vers num="8.4.2"/>
      </prod>
      <prod name="sophos_anti-virus" vendor="sophos">
        <vers num="3.4.6"/>
        <vers num="3.78"/>
        <vers num="3.78d"/>
        <vers num="3.79"/>
        <vers num="3.80"/>
        <vers num="3.81"/>
        <vers num="3.82"/>
        <vers num="3.83"/>
        <vers num="3.84"/>
        <vers num="3.85"/>
        <vers num="3.86"/>
      </prod>
      <prod name="sophos_puremessage_anti-virus" vendor="sophos">
        <vers num="4.6"/>
      </prod>
      <prod name="sophos_small_business_suite" vendor="sophos">
        <vers num="1.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1097" seq="2004-1097" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the cherokee_logger_ncsa_write_string function in Cherokee 0.4.17 and earlier, when authenticating via auth_pam, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via format string specifiers in the URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.gentoo.org/show_bug.cgi?id=67667">http://bugs.gentoo.org/show_bug.cgi?id=67667</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-02.xml" adv="1" patch="1">GLSA-200411-02</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11574" adv="1" patch="1">11574</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17934">cherokee-format-string(17934)</ref>
    </refs>
    <vuln_soft>
      <prod name="cherokee_httpd" vendor="cherokee">
        <vers num="0.1"/>
        <vers num="0.1.5"/>
        <vers num="0.1.6"/>
        <vers num="0.2"/>
        <vers num="0.2.5"/>
        <vers num="0.2.6"/>
        <vers num="0.2.7"/>
        <vers num="0.4.6"/>
        <vers num="0.4.7"/>
        <vers num="0.4.8"/>
        <vers num="0.4.17"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1098" seq="2004-1098" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">MIMEDefang in MIME-tools 5.414 allows remote attackers to bypass virus scanning capabilities via an e-mail attachment with a virus that contains an empty boundary string in the Content-Type header.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.roaringpenguin.com/pipermail/mimedefang/2004-October/024959.html">20041026 [Mimedefang] SECURITY: Patch for MIME-tools</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-06.xml" adv="1" patch="1">GLSA-200411-06</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:123">MDKSA-2004:123</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11563" adv="1" patch="1">11563</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17940">mimetools-boundary-virus-bypass(17940)</ref>
    </refs>
    <vuln_soft>
      <prod name="mimedefang" vendor="roaring_penguin">
        <vers num="2.4"/>
        <vers num="2.14"/>
        <vers num="2.20"/>
        <vers num="2.21"/>
        <vers num="2.38"/>
        <vers num="2.39"/>
        <vers num="2.41"/>
        <vers num="2.42"/>
        <vers num="2.43"/>
        <vers num="2.44"/>
        <vers num="2.45"/>
        <vers num="4.46"/>
        <vers num="4.47"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1099" seq="2004-1099" published="2005-01-10" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-028.shtml" adv="1" patch="1">P-028</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20041102-acs-eap-tls.shtml" adv="1">20041102 Vulnerability in Cisco Secure Access Control Server EAP-TLS Authentication</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11577" adv="1" patch="1">11577</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17936">ciscosecure-eaptls-auth-bypass(17936)</ref>
    </refs>
    <vuln_soft>
      <prod name="secure_access_control_server" vendor="cisco">
        <vers num="3.3(1)"/>
        <vers num="3.3.1"/>
      </prod>
      <prod name="secure_acs_solution_engine" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1100" seq="2004-1100" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in mailpost.exe in MailPost 5.1.1sv, and possibly earlier versions, when debug mode is enabled, allows remote attackers to execute arbitrary web script or HTML via the append parameter.</descript>
    </desc>
    <sols>
      <sol source="nvd">Successful exploitation requires that debug mode is enabled.</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/107998">VU#107998</ref>
      <ref source="MISC" url="http://www.procheckup.com/security_info/vuln_pr0410.html">http://www.procheckup.com/security_info/vuln_pr0410.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11596">11596</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17953">mailpost-append-xss(17953)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailpost" vendor="tips">
        <vers num="5.1.1sv"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1101" seq="2004-1101" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:P)">
    <desc>
      <descript source="cve">mailpost.exe in MailPost 5.1.1sv, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash), leak sensitive pathname information in the resulting error message, and execute a cross-site scripting (XSS) attack via an HTTP request that contains a / (backslash) and arbitrary webscript before the requested file, which leaks the pathname and does not quote the script in the resulting Visual Basic error message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/596046" adv="1">VU#596046</ref>
      <ref source="MISC" url="http://www.procheckup.com/security_info/vuln_pr0411.html">http://www.procheckup.com/security_info/vuln_pr0411.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11598" adv="1">11598</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17951">mailpost-slash-xss(17951)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailpost" vendor="tips">
        <vers num="5.1.1_sv"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1102" seq="2004-1102" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">MailPost 5.1.1sv, and possibly earlier versions, displays a different error message depending on whether the requested file exists or not, which allows remote attackers to gain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/306086" adv="1">VU#306086</ref>
      <ref source="MISC" url="http://www.procheckup.com/security_info/vuln_pr0408.html">http://www.procheckup.com/security_info/vuln_pr0408.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11599" adv="1">11599</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17954">mailpost-get-info-disclosure(17954)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailpost" vendor="tips">
        <vers num="5.1.1_sv"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1103" seq="2004-1103" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">MailPost 5.1.1sv, and possibly earlier versions, when debug mode is enabled, allows remote attackers to gain sensitive information via the debug parameter, which reveals information such as the path to the web root and the web server version.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/858726" adv="1">VU#858726</ref>
      <ref source="MISC" url="http://www.procheckup.com/security_info/vuln_pr0409.html">http://www.procheckup.com/security_info/vuln_pr0409.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11595" adv="1">11595</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17952">mailpost-information-disclosure(17952)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailpost" vendor="tips">
        <vers num="5.1.1_sv"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1104" seq="2004-1104" published="2004-12-31" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 6.0 SP2 allows remote attackers to spoof a legitimate URL in the status bar and conduct a phishing attack via a web page that contains a BASE element that points to the legitimate site, followed by an anchor (a) element with an empty "href" attribute, and a FORM whose action points to a malicious URL, and an INPUT submit element that is modified to look like a legitimate URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/702086" adv="1">VU#702086</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/379903">20041030 Re: New URL spoofing bug in Microsoft Internet Explorer</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/425386/100/0/threaded">20060218 Re: Internet Explorer Phishing mouseover issue</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/425883/100/0/threaded">20060223 Re: Internet Explorer Phishing mouseover issue</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11565" adv="1">11565</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17938">ie-ahref-status-spoofing(17938)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1105" seq="2004-1105" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Nortel Networks Contivity VPN Client displays a different error message depending on whether the username is valid or invalid, which could allow remote attackers to gain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-11/0291.html" adv="1">20041110 Nortel Networks Contivity VPN Client information leakage vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/830214" adv="1">VU#830214</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/CRDY-626N7F">http://www.kb.cert.org/vuls/id/CRDY-626N7F</ref>
      <ref source="MISC" url="http://www.nii.co.in/vuln/contivity.html">http://www.nii.co.in/vuln/contivity.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11623" adv="1" patch="1">11623</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17988">nortel-contivity-info-disclosure(17988)</ref>
    </refs>
    <vuln_soft>
      <prod name="contivity" vendor="nortel">
        <vers num="4.91"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1106" seq="2004-1106" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Gallery 1.4.4-pl3 and earlier allows remote attackers to execute arbitrary web script or HTML via "specially formed URLs," possibly via the include parameter in index.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://g3cko.info/gallery2-4.patch">http://g3cko.info/gallery2-4.patch</ref>
      <ref source="CONFIRM" url="http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=142&amp;mode=thread&amp;order=0&amp;thold=0">http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=142&amp;mode=thread&amp;order=0&amp;thold=0</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-642" patch="1">DSA-642</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-10.xml" adv="1" patch="1">GLSA-200411-10</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11602" adv="1" patch="1">11602</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17948">gallery-script-xss(17948)</ref>
    </refs>
    <vuln_soft>
      <prod name="gallery" vendor="gallery_project">
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3_pl1"/>
        <vers num="1.4.3_pl2"/>
        <vers num="1.4_pl1"/>
        <vers num="1.4_pl2"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1107" seq="2004-1107" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">dispatch-conf in Portage 2.0.51-r2 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=69147">http://bugs.gentoo.org/show_bug.cgi?id=69147</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-13.xml" adv="1" patch="1">GLSA-200411-13</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11616" adv="1" patch="1">11616</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17986">portage-dispatchconf-symlink(17986)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1108" seq="2004-1108" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">qpkg in Gentoolkit 0.2.0_pre10 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary directory.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=68846">http://bugs.gentoo.org/show_bug.cgi?id=68846</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-13.xml" adv="1" patch="1">GLSA-200411-13</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11617" adv="1" patch="1">11617</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17968">gentoolkit-symlink(17968)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1109" seq="2004-1109" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The FWDRV.SYS driver in Kerio Personal Firewall 4.1.1 and earlier allows remote attackers to cause a denial of service (CPU consumption and system freeze from infinite loop) via a (1) TCP, (2) UDP, or (3) ICMP packet with a zero length IP Option field.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="EEYE" url="http://www.eeye.com/html/research/advisories/AD20041109.html">AD20041109</ref>
      <ref source="CONFIRM" url="http://www.kerio.com/security_advisory.html" adv="1">http://www.kerio.com/security_advisory.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11639" adv="1" patch="1">11639</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17992">kerio-pf-packet-dos(17992)</ref>
    </refs>
    <vuln_soft>
      <prod name="personal_firewall" vendor="kerio">
        <vers num="4.0.6"/>
        <vers num="4.0.7"/>
        <vers num="4.0.8"/>
        <vers num="4.0.9"/>
        <vers num="4.0.10"/>
        <vers num="4.0.16"/>
        <vers num="4.1"/>
        <vers num="4.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1110" seq="2004-1110" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The mtink status monitor before 1.0.5 for Epson printers allows local users to overwrite arbitrary files via a symlink attack on the epson temporary file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=70310">http://bugs.gentoo.org/show_bug.cgi?id=70310</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-17.xml" adv="1" patch="1">GLSA-200411-17</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11640" adv="1" patch="1">11640</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18011">mtink-tmp-file-symlink(18011)</ref>
    </refs>
    <vuln_soft>
      <prod name="mtink" vendor="jean-jacques_sarton">
        <vers num="0.9.32"/>
        <vers num="0.9.33"/>
        <vers num="0.9.52"/>
        <vers num="0.9.53"/>
        <vers num="1.0.4"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1111" seq="2004-1111" published="2005-01-10" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Cisco IOS 2.2(18)EW, 12.2(18)EWA, 12.2(14)SZ, 12.2(18)S, 12.2(18)SE, 12.2(18)SV, 12.2(18)SW, and other versions without the "no service dhcp" command, keep undeliverable DHCP packets in the queue instead of dropping them, which allows remote attackers to cause a denial of service (dropped traffic) via multiple undeliverable DHCP packets that exceed the input queue size.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-034.shtml">P-034</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20041110-dhcp.shtml">20041110 Cisco Security Advisory: Cisco IOS DHCP Blocked Interface Denial-of-Service</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/630104" adv="1">VU#630104</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-316A.html">TA04-316A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18021">cisco-ios-dhcp-dos(18021)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5632">oval:org.mitre.oval:def:5632</ref>
    </refs>
    <vuln_soft>
      <prod name="7200_router" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="7300_router" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="7500_router" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="7600_router" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="catalyst_7600" vendor="cisco">
        <vers num="" edition=":sup720_msfc3"/>
      </prod>
      <prod name="multiservice_platform_2650" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="multiservice_platform_2650xm" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="multiservice_platform_2651" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="multiservice_platform_2651xm" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="ios" vendor="cisco">
        <vers num="12.2(14)sz"/>
        <vers num="12.2(18)ew"/>
        <vers num="12.2(18)ewa"/>
        <vers num="12.2(18)s"/>
        <vers num="12.2(18)se"/>
        <vers num="12.2(18)sv"/>
        <vers num="12.2(18)sw"/>
        <vers num="12.2(20)ew"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1112" seq="2004-1112" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The buffer overflow trigger in Cisco Security Agent (CSA) before 4.0.3 build 728 waits five minutes for a user response before terminating the process, which could allow remote attackers to bypass the buffer overflow protection by sending additional buffer overflow attacks within the five minute timeout period.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-036.shtml" adv="1">P-036</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20041111-csa.shtml" adv="1">20041111 Crafted Timed Attack Evades Cisco Security Agent Protections</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11659" adv="1">11659</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18037">csa-buffer-protection-bypass(18037)</ref>
    </refs>
    <vuln_soft>
      <prod name="security_agent" vendor="cisco">
        <vers num="3"/>
        <vers num="4.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
      </prod>
      <prod name="stormwatch" vendor="okena">
        <vers num="3.x"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1113" seq="2004-1113" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in SQLgrey Postfix greylisting service before 1.2.0 allows remote attackers to execute arbitrary SQL commands via the (1) sender or (2) recipient e-mail addresses.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=281256">http://sourceforge.net/project/shownotes.php?release_id=281256</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11633" adv="1" patch="1">11633</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0058/" adv="1" patch="1">2004-0058</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17998">sqlgrey-postfix-sql-injection(17998)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1114" seq="2004-1114" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the handling of command line arguments in Skype 1.0.x.94 through 1.0.x.98 allows remote attackers to execute arbitrary code via a callto:// URL with a long non-existent username, a different vulnerability than CVE-2004-1777.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028852.html">20041116 Skype callto:// BoF technical details</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110062240706017&amp;w=2">20041116 Skype callto:// BoF technical details</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110067029422696&amp;w=2">20041115 Re: Skype callto:// BoF technical details</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11682" adv="1" patch="1">11682</ref>
      <ref source="CONFIRM" url="http://www.skype.com/products/skype/windows/changelog.html">http://www.skype.com/products/skype/windows/changelog.html</ref>
      <ref source="CONFIRM" url="http://www.skype.com/security/ssa-2004-02.html">http://www.skype.com/security/ssa-2004-02.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18063">skype-callto-uri-bo(18063)</ref>
    </refs>
    <vuln_soft>
      <prod name="skype" vendor="skype_technologies">
        <vers num="1.0.0.9"/>
        <vers num="1.0.0.10"/>
        <vers num="1.0.0.18"/>
        <vers num="1.0.0.29"/>
        <vers num="1.0.0.94"/>
        <vers num="1.0.0.97"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1115" seq="2004-1115" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The init scripts in Search for Extraterrestrial Intelligence (SETI) project 3.08-r3 and earlier execute user-owned programs with root privileges, which allows local users to gain privileges by modifying the programs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-26.xml" adv="1" patch="1">GLSA-200411-26</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18149">seti@home-gain-privileges(18149)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1116" seq="2004-1116" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The init scripts in Great Internet Mersenne Prime Search (GIMPS) 23.9 and earlier execute user-owned programs with root privileges, which allows local users to gain privileges by modifying the programs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-26.xml" adv="1" patch="1">GLSA-200411-26</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18149">seti@home-gain-privileges(18149)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1117" seq="2004-1117" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The init scripts in ChessBrain 20407 and earlier execute user-owned programs with root privileges, which allows local users to gain privileges by modifying the programs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-26.xml" adv="1" patch="1">GLSA-200411-26</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18149">seti@home-gain-privileges(18149)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1118" seq="2004-1118" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the WodFtpDLX.ocx (WeOnlyDo!) ActiveX component before 2.3.2.97, as used by CoffeeCup Direct FTP 6.2.0.62 and CoffeeCup Free FTP 3.0.0.10, and possibly other applications, allows remote attackers to execute arbitrary code via a long filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029243.html">20041122 WeOnlyDo! COM Ftp DELUXE ActiveX Control Buffer Overflow Vulnerability</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029244.html">20041122 CoffeeCup FTP Clients Buffer Overflow Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110114233323417&amp;w=2">20041122 WeOnlyDo! COM Ftp DELUXE ActiveX Control Buffer Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11721" adv="1">11721</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18190">wodftpdlx-long-filename-bo(18190)</ref>
    </refs>
    <vuln_soft>
      <prod name="wodftpdlx_activex_component" vendor="weonlydo">
        <vers num="2.1.1_8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1119" seq="2004-1119" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in IN_CDDA.dll in Winamp 5.05, and possibly other versions including 5.06, allows remote attackers to execute arbitrary code via a certain .m3u playlist file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-11/0369.html">20041126 Re: Winamp - Buffer Overflow In IN_CDDA.dll [Unpatched</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110123330404482&amp;w=2">20041123 Winamp - Buffer Overflow In IN_CDDA.dll</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110146036300803&amp;w=2">20041124 Winamp - Buffer Overflow In IN_CDDA.dll [Unpatched]</ref>
      <ref source="NTBUGTRAQ" url="http://marc.info/?l=ntbugtraq&amp;m=110126352412395&amp;w=2">20041123 Winamp - Buffer Overflow In IN_CDDA.dll</ref>
      <ref source="NTBUGTRAQ" url="http://marc.info/?l=ntbugtraq&amp;m=110135574326217&amp;w=2">20041124 Winamp - Buffer Overflow In IN_CDDA.dll [Unpatched]</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/986504">VU#986504</ref>
      <ref source="MISC" url="http://www.security-assessment.com/Papers/Winamp_IN_CDDA_Buffer_Overflow.pdf">http://www.security-assessment.com/Papers/Winamp_IN_CDDA_Buffer_Overflow.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11730" adv="1" patch="1">11730</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18197">winamp-incddadll-bo(18197)</ref>
    </refs>
    <vuln_soft>
      <prod name="winamp" vendor="nullsoft">
        <vers num="5.01"/>
        <vers num="5.02"/>
        <vers num="5.03"/>
        <vers num="5.04"/>
        <vers num="5.05"/>
        <vers num="5.06"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1120" seq="2004-1120" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in (1) http.c, (2) http-retr.c, (3) main.c and other code that handles network protocols in ProZilla 1.3.6-r2 and earlier allow remote servers to execute arbitrary code via a long Location header.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.gentoo.org/show_bug.cgi?id=70090">http://bugs.gentoo.org/show_bug.cgi?id=70090</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-663">DSA-663</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-31.xml" adv="1">GLSA-200411-31</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/382219">20041124 Prozilla Remote Exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11734" adv="1">11734</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18210">prozilla-bo(18210)</ref>
    </refs>
    <vuln_soft>
      <prod name="prozilla_download_accelerator" vendor="prozilla">
        <vers num="1.0.0"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
        <vers num="1.3.5.1"/>
        <vers num="1.3.5.2"/>
        <vers num="1.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1121" seq="2004-1121" published="2004-11-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Apple Safari 1.0 through 1.2.3 allows remote attackers to spoof the URL displayed in the status bar via TABLE tags.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html" adv="1" patch="1">APPLE-SA-2004-12-02</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/925430" adv="1" patch="1">VU#925430</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11573" adv="1" patch="1">11573</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17909">ie-table-status-spoofing(17909)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1122" seq="2004-1122" published="2005-01-10" modified="2008-09-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Safari 1.x to 1.2.4, and possibly other versions, allows inactive windows to launch dialog boxes, which can allow remote attackers to spoof the dialog boxes from web sites in other windows, aka the "Dialog Box Spoofing Vulnerability," a different vulnerability than CVE-2004-1314.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html">APPLE-SA-2004-12-02</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="1.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1123" seq="2004-1123" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Darwin Streaming Server 5.0.1, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash) via a DESCRIBE request with a location that contains a null byte.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=159&amp;type=vulnerabilities" adv="1" patch="1">20041203 Apple Darwin Streaming Server DESCRIBE Null Byte Denial of Service Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18357">darwin-describe-dos(18357)</ref>
    </refs>
    <vuln_soft>
      <prod name="darwin_streaming_server" vendor="apple">
        <vers num="4.1.3"/>
        <vers num="5.0.1"/>
      </prod>
      <prod name="quicktime_streaming_server" vendor="apple">
        <vers num="4.1.1"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.2"/>
        <vers num="10.2.1"/>
        <vers num="10.2.2"/>
        <vers num="10.2.3"/>
        <vers num="10.2.4"/>
        <vers num="10.2.5"/>
        <vers num="10.2.6"/>
        <vers num="10.2.7"/>
        <vers num="10.2.8"/>
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1124" seq="2004-1124" published="2004-01-14" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in chroot on SCO UnixWare 7.1.1 through 7.1.4 allows local users to escape the chroot jail and conduct unauthorized activities.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.22/SCOSA-2005.22.txt">SCOSA-2005.22</ref>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.2/SCOSA-2005.2.txt" adv="1" patch="1">SCOSA-2005.2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12300">12300</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18970">chroot-jail-security-bypass(18970)</ref>
    </refs>
    <vuln_soft>
      <prod name="openserver" vendor="sco">
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
      </prod>
      <prod name="unixware" vendor="sco">
        <vers num="7.1.1"/>
        <vers num="7.1.3"/>
        <vers num="7.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1125" seq="2004-1125" published="2005-01-10" modified="2018-10-03" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PDF file that causes the boundaries of a maskColors array to be exceeded.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl2.patch">ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl2.patch</ref>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt">SCOSA-2005.42</ref>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000921">CLA-2005:921</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030241.html">20041223 [USN-48-1] xpdf, tetex-bin vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?t=110378596500001&amp;r=1&amp;w=2">20041228 KDE Security Advisory: kpdf Buffer Overflow Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012646">1012646</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml">GLSA-200412-25</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200501-13.xml">GLSA-200501-13</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200501-17.xml">GLSA-200501-17</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=172&amp;type=vulnerabilities">20041221 Multiple Vendor xpdf PDF Viewer Buffer Overflow Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20041223-1.txt">http://www.kde.org/info/security/advisory-20041223-1.txt</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_01_sr.html">SUSE-SR:2005:001</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-013.html">RHSA-2005:013</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-018.html">RHSA-2005:018</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-026.html">RHSA-2005:026</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-034.html">RHSA-2005:034</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-053.html">RHSA-2005:053</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-057.html">RHSA-2005:057</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-066.html">RHSA-2005:066</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-354.html">RHSA-2005:354</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12070" adv="1" patch="1">12070</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2352">FLSA:2352</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2353">FLSA:2353</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18641">xpdf-gfx-doimage-bo(18641)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10830">oval:org.mitre.oval:def:10830</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/50-1/">USN-50-1</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.1.20"/>
      </prod>
      <prod name="xpdf" vendor="xpdf">
        <vers num="3.0"/>
      </prod>
      <prod name="kde" vendor="kde">
        <vers num="3.2.3"/>
        <vers num="3.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1127" seq="2004-1127" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Open Dc Hub 0.7.14 allows remote attackers, with administrator privileges, to execute arbitrary code via a long RedirectAll command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029383.html">20041124 Buffer Overflow in Open Dc Hub 0.7.14</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110144606411674&amp;w=2">20041124 Buffer Overflow in Open Dc Hub 0.7.14</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200411-37.xml">GLSA-200411-37</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11747" adv="1" patch="1">11747</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18254">open-hub-redirectall-bo(18254)</ref>
    </refs>
    <vuln_soft>
      <prod name="direct_connect_peer-to-peer_client" vendor="open_dc_hub">
        <vers num="0.7.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1128" seq="2004-1128" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in CMailCOM.dll in CMailServer 5.2 allows remote attackers to execute arbitrary code via an attachment with a long filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110137313329955&amp;w=2">20041124 [SIG^2 G-TEC] CMailServer WebMail v5.2 Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://www.security.org.sg/vuln/cmailserver52.html">http://www.security.org.sg/vuln/cmailserver52.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11742" adv="1">11742</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18276">cmailserver-cmailcomdll-bo(18276)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1129" seq="2004-1129" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in (1) fdelmail.asp, (2) addressc.asp, and possibly (3) postmail.asp and (4) fmvmail.asp in CMailServer 5.2 allow remote attackers to inject arbitrary SQL commands and delete mail metadata or e-mail addresses of contacts via the indexOfMail parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110137313329955&amp;w=2">20041124 [SIG^2 G-TEC] CMailServer WebMail v5.2 Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://www.security.org.sg/vuln/cmailserver52.html">http://www.security.org.sg/vuln/cmailserver52.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11742" adv="1">11742</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18281">cmailserver-fdelmail-addressc-sql-injection(18281)</ref>
    </refs>
    <vuln_soft>
      <prod name="cmailserver" vendor="youngzsoft">
        <vers num="5.2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1130" seq="2004-1130" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin.asp in CMailServer 5.2 allows remote attackers to execute arbitrary web script or HTML via personal information fields, such as (1) username, (2) name, or (3) comments.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product release:
YoungZSoft, CMailServer, 5.2.1</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110137313329955&amp;w=2">20041124 [SIG^2 G-TEC] CMailServer WebMail v5.2 Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://www.security.org.sg/vuln/cmailserver52.html" patch="1">http://www.security.org.sg/vuln/cmailserver52.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11742" patch="1">11742</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18280">cmailserver-adminasp-xss(18280)</ref>
    </refs>
    <vuln_soft>
      <prod name="cmailserver" vendor="youngzsoft">
        <vers num="5.2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1131" seq="2004-1131" published="2005-02-07" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the enable command for SCO OpenServer 5.0.6 and 5.0.7 allow local users to execute arbitrary code via long command line arguments.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.13/SCOSA-2005.13.txt" adv="1" patch="1">SCOSA-2005.13</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12474">12474</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19243">openserver-enable-bo(19243)</ref>
    </refs>
    <vuln_soft>
      <prod name="openserver" vendor="sco">
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1133" seq="2004-1133" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Microsoft W3Who ISAPI (w3who.dll) allow remote attackers to inject arbitrary HTML and web script via (1) HTTP headers such as "Connection" or (2) invalid parameters whose values are echoed in the resulting error message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=110234486823233&amp;w=2">20041206 Multiple vulnerabilities in w3who ISAPI DLL</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18375">w3who-http-error-xss(18375)</ref>
    </refs>
    <vuln_soft>
      <prod name="w3who.dll" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1134" seq="2004-1134" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the Microsoft W3Who ISAPI (w3who.dll) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long query string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=110234486823233&amp;w=2">20041206 Multiple vulnerabilities in w3who ISAPI DLL</ref>
      <ref source="MISC" url="http://www.exaprobe.com/labs/advisories/esa-2004-1206.html">http://www.exaprobe.com/labs/advisories/esa-2004-1206.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18377">w3who-bo(18377)</ref>
    </refs>
    <vuln_soft>
      <prod name="w3who.dll" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1135" seq="2004-1135" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in WS_FTP Server 5.03 2004.10.14 allow remote attackers to cause a denial of service (service crash) via long (1) SITE, (2) XMKD, (3) MKD, and (4) RNFR commands.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029600.html">20041129 Multiple buffer overlows in WS_FTP Server Version 5.03, 2004.10.14.</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110177654524819&amp;w=2">20041129 Multiple buffer overlows in WS_FTP Server Version 5.03, 2004.10.14.</ref>
      <ref source="MISC" url="http://www.securiteam.com/exploits/6D00L2KBPG.html">http://www.securiteam.com/exploits/6D00L2KBPG.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18296">wsftp-ftp-commands-bo(18296)</ref>
    </refs>
    <vuln_soft>
      <prod name="ws_ftp_server" vendor="ipswitch">
        <vers num="5.03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1136" seq="2004-1136" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in CuteFTP Professional 6.0, and possibly other versions, allows remote FTP servers to cause a denial of service (application crash) via large replies to FTP commands.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110182983622642&amp;w=2">20041129 CuteFTP 6.0 Professional Remote Buffer Overflow Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18309">cuteftp-reply-bo(18309)</ref>
    </refs>
    <vuln_soft>
      <prod name="cuteftp" vendor="globalscape">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1137" seq="2004-1137" published="2005-01-10" modified="2018-05-02" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/index.php?id=a&amp;anuncio=000930">CLA-2005:930</ref>
      <ref source="MISC" url="http://isec.pl/vulnerabilities/isec-0018-igmp.txt">http://isec.pl/vulnerabilities/isec-0018-igmp.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110306397320336&amp;w=2">20041214 [USN-38-1] Linux kernel vulnerabilities</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_44_kernel.html">SUSE-SA:2004:044</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-092.html">RHSA-2005:092</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18481">linux-ipmcsource-code-execution(18481)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18482">linux-igmpmarksources-dos(18482)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144">oval:org.mitre.oval:def:11144</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.4.28"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1138" seq="2004-1138" published="2005-01-10" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) keymap, (8) patchmode, or (9) langmenu.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="OPENPKG" url="http://marc.info/?l=bugtraq&amp;m=110313588125609&amp;w=2">OpenPKG-SA-2004.052</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-10.xml" adv="1" patch="1">GLSA-200412-10</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-010.html">RHSA-2005:010</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-036.html">RHSA-2005:036</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2343">FLSA:2343</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18503">vim-modeline-gain-privileges(18503)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9571">oval:org.mitre.oval:def:9571</ref>
    </refs>
    <vuln_soft>
      <prod name="vim" vendor="vim_development_group">
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="5.4"/>
        <vers num="5.5"/>
        <vers num="5.6"/>
        <vers num="5.7"/>
        <vers num="5.8"/>
        <vers num="6.0"/>
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.3.011"/>
        <vers num="6.3.025"/>
        <vers num="6.3.030"/>
        <vers num="6.3.044"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1139" seq="2004-1139" published="2004-12-15" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7 allows remote attackers to cause a denial of service (application crash).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000916" adv="1">CLA-2005:916</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-061.shtml" adv="1" patch="1">P-061</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00016.html" adv="1" patch="1">http://www.ethereal.com/appnotes/enpa-sa-00016.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-15.xml" adv="1" patch="1">GLSA-200412-15</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:152">MDKSA-2004:152</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html">FLSA-2006:152922</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-037.html" adv="1" patch="1">RHSA-2005:037</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11943" adv="1" patch="1">11943</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18484">ethereal-dicom-dos(18484)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11319">oval:org.mitre.oval:def:11319</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.10"/>
        <vers num="0.9.11"/>
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.10.3"/>
        <vers num="0.10.4"/>
        <vers num="0.10.5"/>
        <vers num="0.10.6"/>
        <vers num="0.10.7"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="3.0"/>
      </prod>
      <prod name="alt_linux" vendor="altlinux">
        <vers num="2.3" edition=":compact"/>
        <vers num="2.3" edition=":junior"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1140" seq="2004-1140" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (application hang) and possibly fill available disk space via an invalid RTP timestamp.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000916">CLA-2005:916</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-061.shtml" adv="1">P-061</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00016.html" adv="1">http://www.ethereal.com/appnotes/enpa-sa-00016.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-15.xml" patch="1">GLSA-200412-15</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:152">MDKSA-2004:152</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html">FLSA-2006:152922</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-037.html">RHSA-2005:037</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11943" patch="1">11943</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18485">Ethereal-rtp-dos(18485)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10484">oval:org.mitre.oval:def:10484</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.9.0"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.10"/>
        <vers num="0.9.11"/>
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
        <vers num="0.10.0"/>
        <vers num="0.10.0a"/>
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.10.3"/>
        <vers num="0.10.4"/>
        <vers num="0.10.5"/>
        <vers num="0.10.6"/>
        <vers num="0.10.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1141" seq="2004-1141" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The HTTP dissector in Ethereal 0.10.1 through 0.10.7 allows remote attackers to cause a denial of service (application crash) via a certain packet that causes the dissector to access previously-freed memory.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000916">CLA-2005:916</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-061.shtml" adv="1">P-061</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00016.html" adv="1">http://www.ethereal.com/appnotes/enpa-sa-00016.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-15.xml" patch="1">GLSA-200412-15</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:152">MDKSA-2004:152</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html">FLSA-2006:152922</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-037.html">RHSA-2005:037</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11943" patch="1">11943</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18487">ethereal-http-dissector-dos(18487)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9473">oval:org.mitre.oval:def:9473</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.10.3"/>
        <vers num="0.10.4"/>
        <vers num="0.10.5"/>
        <vers num="0.10.6"/>
        <vers num="0.10.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1142" seq="2004-1142" published="2004-12-15" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000916" adv="1">CLA-2005:916</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-061.shtml" adv="1" patch="1">P-061</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-613" adv="1" patch="1">DSA-613</ref>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00016.html" adv="1" patch="1">http://www.ethereal.com/appnotes/enpa-sa-00016.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-15.xml" adv="1" patch="1">GLSA-200412-15</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:152">MDKSA-2004:152</ref>
      <ref source="FEDORA" url="http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html">FLSA-2006:152922</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-037.html" adv="1" patch="1">RHSA-2005:037</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11943" adv="1" patch="1">11943</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18488">ethereal-smb-dos(18488)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11278">oval:org.mitre.oval:def:11278</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.10"/>
        <vers num="0.9.11"/>
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.10.3"/>
        <vers num="0.10.4"/>
        <vers num="0.10.5"/>
        <vers num="0.10.6"/>
        <vers num="0.10.7"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="3.0"/>
      </prod>
      <prod name="alt_linux" vendor="altlinux">
        <vers num="2.3" edition=":compact"/>
        <vers num="2.3" edition=":junior"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1143" seq="2004-1143" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The password generation in mailman before 2.1.5 generates only 5 million unique passwords, which makes it easier for remote attackers to guess passwords via a brute force attack.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286796" patch="1">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286796</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110549296126351&amp;w=2">20050110 [USN-59-1] mailman vulnerabilities</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_07_mailman.html">SUSE-SA:2005:007</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18857">mailman-weak-encryption(18857)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailman" vendor="gnu">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="2.0" edition="beta3"/>
        <vers num="2.0" edition="beta4"/>
        <vers num="2.0" edition="beta5"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.0.10"/>
        <vers num="2.0.11"/>
        <vers num="2.0.12"/>
        <vers num="2.0.13"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.4"/>
        <vers num="2.1b1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1144" seq="2004-1144" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in the 32bit emulation code in Linux 2.4 on AMD64 systems allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://marc.info/?l=bugtraq&amp;m=110376890429798&amp;w=2">SUSE-SA:2004:046</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-689.html">RHSA-2004:689</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18686">linux-32bit-emulation-gain-privileges(18686)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10439">oval:org.mitre.oval:def:10439</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1145" seq="2004-1145" published="2004-12-15" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110356286722875&amp;w=2">20041220 KDE Security Advisory: Konqueror Java Vulnerability</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200501-16.xml" adv="1" patch="1">GLSA-200501-16</ref>
      <ref source="MISC" url="http://www.heise.de/security/dienste/browsercheck/tests/java.shtml" adv="1">http://www.heise.de/security/dienste/browsercheck/tests/java.shtml</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/420222" adv="1" patch="1">VU#420222</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20041220-1.txt" adv="1" patch="1">http://www.kde.org/info/security/advisory-20041220-1.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:154">MDKSA-2004:154</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-065.html" adv="1" patch="1">RHSA-2005:065</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18596">konqueror-sandbox-restriction-bypass(18596)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10173">oval:org.mitre.oval:def:10173</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.10"/>
        <vers num="0.9.11"/>
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.10.3"/>
        <vers num="0.10.4"/>
        <vers num="0.10.5"/>
        <vers num="0.10.6"/>
        <vers num="0.10.7"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="3.0"/>
      </prod>
      <prod name="alt_linux" vendor="altlinux">
        <vers num="2.3" edition=":compact"/>
        <vers num="2.3" edition=":junior"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":enterprise_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
        <vers num="3.0" edition=":advanced_server"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation_server"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1146" seq="2004-1146" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in (1) main.c and (2) login.c for CVSTrac before 1.1.5 allow remote attackers to inject arbitrary HTML and web script.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030222.html">20041223 Cross-Site Scripting - an industry-wide problem</ref>
      <ref source="OPENPKG" url="http://marc.info/?l=bugtraq&amp;m=110332469631253&amp;w=2">OpenPKG-SA-2004.056</ref>
      <ref source="CONFIRM" url="http://www.cvstrac.org/cvstrac/chngview?cn=320" patch="1">http://www.cvstrac.org/cvstrac/chngview?cn=320</ref>
      <ref source="CONFIRM" url="http://www.cvstrac.org/cvstrac/chngview?cn=321" patch="1">http://www.cvstrac.org/cvstrac/chngview?cn=321</ref>
      <ref source="MISC" url="http://www.mikx.de/index.php?p=6">http://www.mikx.de/index.php?p=6</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12017" patch="1">12017</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18726">cvstrac-main-login-xss(18726)</ref>
    </refs>
    <vuln_soft>
      <prod name="cvstrac" vendor="cvstrac">
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1147" seq="2004-1147" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">phpMyAdmin 2.6.0-pl2, and other versions before 2.6.1, with external transformations enabled, allows remote attackers to execute arbitrary commands via shell metacharacters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110295781828323&amp;w=2">20041213 Multiple vulnerabilities in phpMyAdmin</ref>
      <ref source="MISC" url="http://www.exaprobe.com/labs/advisories/esa-2004-1213.html">http://www.exaprobe.com/labs/advisories/esa-2004-1213.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18441">phpmyadmin-command-execute(18441)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmyadmin" vendor="phpmyadmin">
        <vers num="2.4.0"/>
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.5_pl1"/>
        <vers num="2.5.5_rc1"/>
        <vers num="2.5.5_rc2"/>
        <vers num="2.5.6_rc1"/>
        <vers num="2.5.7"/>
        <vers num="2.5.7_pl1"/>
        <vers num="2.6.0_pl1"/>
        <vers num="2.6.0_pl2"/>
        <vers num="2.6.0_pl3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1148" seq="2004-1148" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">phpMyAdmin before 2.6.1, when configured with UploadDir functionality, allows remote attackers to read arbitrary files via the sql_localfile parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110295781828323&amp;w=2">20041213 Multiple vulnerabilities in phpMyAdmin</ref>
      <ref source="MISC" url="http://www.exaprobe.com/labs/advisories/esa-2004-1213.html">http://www.exaprobe.com/labs/advisories/esa-2004-1213.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18441">phpmyadmin-command-execute(18441)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmyadmin" vendor="phpmyadmin">
        <vers num="2.4.0"/>
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.5_pl1"/>
        <vers num="2.5.5_rc1"/>
        <vers num="2.5.5_rc2"/>
        <vers num="2.5.6_rc1"/>
        <vers num="2.5.7"/>
        <vers num="2.5.7_pl1"/>
        <vers num="2.6.0_pl1"/>
        <vers num="2.6.0_pl2"/>
        <vers num="2.6.0_pl3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1149" seq="2004-1149" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Computer Associates eTrust EZ Antivirus 7.0.0 to 7.0.4, including 7.0.1.4, installs its files with insecure permissions (ACLs), which allows local users to gain privileges by replacing critical programs with malicious ones, as demonstrated using VetMsg.exe.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://crm.my-etrust.com/login.asp?username=guest&amp;target=DOCUMENT&amp;openparameter">http://crm.my-etrust.com/login.asp?username=guest&amp;target=DOCUMENT&amp;openparameter</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=164">20041215 Computer Associates eTrust EZ Antivirus Insecure File Permission Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18502">etrust-antivirus-insecure-permissions(18502)</ref>
    </refs>
    <vuln_soft>
      <prod name="etrust_ez_antivirus" vendor="ca">
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.1.1"/>
        <vers num="7.0.1.2"/>
        <vers num="7.0.1.3"/>
        <vers num="7.0.1.4"/>
        <vers num="7.0.2"/>
        <vers num="7.0.2.1"/>
        <vers num="7.0.3"/>
        <vers num="7.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1150" seq="2004-1150" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the in_cdda.dll plugin for Winamp 5.0 through 5.08c allows attackers to execute arbitrary code via a cda:// URL with a long (1) device name or (2) sound track number, as demonstrated with a .m3u or .pls playlist file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110684140108614&amp;w=2">20050127 NSFOCUS SA2005-01 : Buffer Overflow in WinAMP in_cdda.dll CDA Device Name</ref>
      <ref source="MISC" url="http://www.nsfocus.com/english/homepage/research/0501.htm">http://www.nsfocus.com/english/homepage/research/0501.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12381">12381</ref>
      <ref source="CONFIRM" url="http://www.winamp.com/player/version_history.php">http://www.winamp.com/player/version_history.php</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18840">winamp-incdda-bo(18840)</ref>
    </refs>
    <vuln_soft>
      <prod name="winamp" vendor="nullsoft">
        <vers num="5.0"/>
        <vers num="5.01"/>
        <vers num="5.02"/>
        <vers num="5.03"/>
        <vers num="5.04"/>
        <vers num="5.05"/>
        <vers num="5.06"/>
        <vers num="5.07"/>
        <vers num="5.08c"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1151" seq="2004-1151" published="2005-01-10" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://linux.bkbits.net:8080/linux-2.6/cset@1.2079">http://linux.bkbits.net:8080/linux-2.6/cset@1.2079</ref>
      <ref source="MISC" url="http://linux.bkbits.net:8080/linux-2.6/gnupatch@41ae6af1cR3mJYlW6D8EHxCKSxuJiQ">http://linux.bkbits.net:8080/linux-2.6/gnupatch@41ae6af1cR3mJYlW6D8EHxCKSxuJiQ</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110306397320336&amp;w=2">20041214 [USN-38-1] Linux kernel vulnerabilities</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_44_kernel.html">SUSE-SA:2004:044</ref>
      <ref source="MLIST" url="http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html">[linux-kernel] 20041130 Buffer overrun in arch/x86_64/sys_ia32.c:sys32_ni_syscall()</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1152" seq="2004-1152" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the mailListIsPdf function in Adobe Acrobat Reader 5.09 for Unix allows remote attackers to execute arbitrary code via an e-mail message with a crafted PDF attachment.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.adobe.com/support/techdocs/331153.html">http://www.adobe.com/support/techdocs/331153.html</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=161&amp;type=vulnerabilities&amp;flashstatus=false" adv="1" patch="1">20041214 Adobe Acrobat Reader 5.0.9 mailListIsPdf() Buffer Overflow Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/253024">VU#253024</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_01_sr.html">SUSE-SR:2005:001</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18477">adobe-acrobat-maillistlspdf-bo(18477)</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="5.0.9" edition=":unix"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1153" seq="2004-1153" published="2005-01-10" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in Adobe Acrobat Reader 6.0.0 through 6.0.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an .ETD document containing format string specifiers in (1) title or (2) baseurl fields.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679">http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=163&amp;type=vulnerabilities" adv="1" patch="1">20041214 Adobe Reader 6.0 .ETD File Format String Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18478">adobe-acrobat-etd-format-string(18478)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2919">oval:org.mitre.oval:def:2919</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="6.0"/>
        <vers num="6.0.2"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1154" seq="2004-1154" published="2005-01-10" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SCO" url="ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt">SCOSA-2005.17</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html">APPLE-SA-2005-03-21</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1">101643</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1">57730</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-701">DSA-701</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=165&amp;type=vulnerabilities">20041216 Samba smbd Security Descriptor Integer Overflow Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/226184" adv="1">VU#226184</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_45_samba.html">SUSE-SA:2004:045</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-020.html">RHSA-2005:020</ref>
      <ref source="CONFIRM" url="http://www.samba.org/samba/security/CAN-2004-1154.html">http://www.samba.org/samba/security/CAN-2004-1154.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11973">11973</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18519">samba-msrpc-heap-corruption(18519)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236">oval:org.mitre.oval:def:10236</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459">oval:org.mitre.oval:def:1459</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642">oval:org.mitre.oval:def:642</ref>
    </refs>
    <vuln_soft>
      <prod name="samba" vendor="samba">
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.0.10"/>
        <vers num="2.2.0"/>
        <vers num="2.2.0a"/>
        <vers num="2.2.1a"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.3a"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.7a"/>
        <vers num="2.2.8"/>
        <vers num="2.2.8a"/>
        <vers num="2.2.9"/>
        <vers num="2.2.11"/>
        <vers num="2.2.12"/>
        <vers num="2.2a"/>
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.2a"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4" edition="rc1"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.0.7"/>
        <vers num="3.0.8"/>
        <vers num="3.0.9"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1155" seq="2004-1155" published="2004-12-31" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Internet Explorer 5.01 through 6 allows remote attackers to spoof arbitrary web sites by injecting content from one window into another window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.  NOTE: later research shows that Internet Explorer 7 on Windows XP SP2 is also vulnerable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/449917/100/0/threaded">20061025 IE7 status: 8 days after release, 3 unfixed issues</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11855" adv="1">11855</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.0.1" edition=":windows_2000"/>
        <vers num="5.0.1" edition=":windows_95"/>
        <vers num="5.0.1" edition=":windows_98"/>
        <vers num="5.0.1" edition=":windows_nt_4.0"/>
        <vers num="5.0.1" edition="sp1"/>
        <vers num="5.0.1" edition="sp2"/>
        <vers num="5.0.1" edition="sp3"/>
        <vers num="5.0.1" edition="sp4"/>
        <vers num="5.2.3" edition=":macintosh"/>
        <vers num="5.5" edition="preview"/>
        <vers num="5.5" edition="sp1"/>
        <vers num="5.5" edition="sp2"/>
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0" edition="sp2"/>
        <vers num="7.0" edition="windows_xp_sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1156" seq="2004-1156" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla before 1.7.6, and Firefox before 1.0.1, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200503-10.xml">GLSA-200503-10</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200503-30.xml">GLSA-200503-30</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/mfsa2005-13.html">http://www.mozilla.org/security/announce/mfsa2005-13.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-176.html">RHSA-2005:176</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-384.html">RHSA-2005:384</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100045">oval:org.mitre.oval:def:100045</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10117">oval:org.mitre.oval:def:10117</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9" edition="rc"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="1.0"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9.2"/>
        <vers num="0.9.2.1"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.4.1"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.35"/>
        <vers num="0.9.48"/>
        <vers num="1.0" edition="rc1"/>
        <vers num="1.0" edition="rc2"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.2" edition="alpha"/>
        <vers num="1.2" edition="beta"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4" edition="beta"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.5"/>
        <vers num="1.5.1"/>
        <vers num="1.6"/>
        <vers num="1.7" edition="alpha"/>
        <vers num="1.7" edition="beta"/>
        <vers num="1.7" edition="rc1"/>
        <vers num="1.7" edition="rc2"/>
        <vers num="1.7" edition="rc3"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="1.7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1157" seq="2004-1157" published="2005-01-10" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Opera 7.x up to 7.54, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-17.xml">GLSA-200502-17</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="7.54"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1158" seq="2004-1158" published="2005-01-10" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110296048613575&amp;w=2">20041213 KDE Security Advisory: Konqueror Window Injection Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20041213-1.txt">http://www.kde.org/info/security/advisory-20041213-1.txt</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_01_sr.html">SUSE-SR:2005:001</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-009.html">RHSA-2005:009</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11853" adv="1" patch="1">11853</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11056">oval:org.mitre.oval:def:11056</ref>
    </refs>
    <vuln_soft>
      <prod name="konqueror" vendor="kde">
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.5"/>
        <vers num="3.0.5b"/>
        <vers num="3.1"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.4"/>
        <vers num="3.1.5"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2.6"/>
        <vers num="3.2.3"/>
        <vers num="3.3"/>
        <vers num="3.3.1"/>
        <vers num="3.3.2"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1159" seq="2004-1159" published="2005-01-10" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-1122, CVE-2004-1314.  Reason: this was an out-of-band assignment duplicate intended for one issue, but the description and references inadvertently combined multiple issues.  Notes: All CVE users should consult CVE-2004-1122 and CVE-2004-1314 to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-1160" seq="2004-1160" published="2005-01-10" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Netscape 7.x to 7.2, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11852" adv="1">11852</ref>
    </refs>
    <vuln_soft>
      <prod name="navigator" vendor="netscape">
        <vers num="7.0"/>
        <vers num="7.0.2"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1161" seq="2004-1161" published="2005-01-10" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">rssh 2.2.2 and earlier does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via (1) rdist -P, (2) rsync, or (3) scp -S.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110202047507273&amp;w=2">20041202 rssh and scponly arbitrary command execution</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110581113814623&amp;w=2">20050115 Re: rssh and scponly arbitrary command execution</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml" adv="1" patch="1">GLSA-200412-01</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11792" adv="1">11792</ref>
    </refs>
    <vuln_soft>
      <prod name="rssh" vendor="rssh">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1162" seq="2004-1162" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The unison command in scponly before 4.0 does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via the (1) -rshcmd or (2) -sshcmd flags.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110202047507273&amp;w=2">20041202 rssh and scponly arbitrary command execution</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110581113814623&amp;w=2">20050115 Re: rssh and scponly arbitrary command execution</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-01.xml">GLSA-200412-01</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11791" adv="1" patch="1">11791</ref>
      <ref source="CONFIRM" url="http://www.sublimation.org/scponly/#relnotes">http://www.sublimation.org/scponly/#relnotes</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18362">scponly-commandline-command-execution(18362)</ref>
    </refs>
    <vuln_soft>
      <prod name="scponly" vendor="scponly">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="3.0"/>
        <vers num="3.5"/>
        <vers num="3.8"/>
        <vers num="3.9"/>
        <vers num="3.11"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1163" seq="2004-1163" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Cisco CNS Network Registrar Central Configuration Management (CCM) server 6.0 through 6.1.1.3 allows remote attackers to cause a denial of service (CPU consumption) by ending a connection after sending a certain sequence of packets.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a008036786d.shtml">20041202 Cisco Network Registrar Denial of Service Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18327">cisco-cns-ccm-dos(18327)</ref>
    </refs>
    <vuln_soft>
      <prod name="cns_network_registrar" vendor="cisco">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.5.2"/>
        <vers num="6.0.5.3"/>
        <vers num="6.0.5.4"/>
        <vers num="6.1"/>
        <vers num="6.1.1"/>
        <vers num="6.1.1.1"/>
        <vers num="6.1.1.2"/>
        <vers num="6.1.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1164" seq="2004-1164" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The lock manager in Cisco CNS Network Registrar 6.0 through 6.1.1.3 allows remote attackers to cause a denial of service (process crash) via a certain "unexpected packet sequence."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a008036786d.shtml">20041202 Cisco Network Registrar Denial of Service Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11793" adv="1">11793</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18328">cisco-cns-lock-dos(18328)</ref>
    </refs>
    <vuln_soft>
      <prod name="cns_network_registrar" vendor="cisco">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.5.2"/>
        <vers num="6.0.5.3"/>
        <vers num="6.0.5.4"/>
        <vers num="6.1"/>
        <vers num="6.1.1"/>
        <vers num="6.1.1.1"/>
        <vers num="6.1.1.2"/>
        <vers num="6.1.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1165" seq="2004-1165" published="2005-01-10" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Konqueror 3.3.1 allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110245752232681&amp;w=2">20041205 7a69Adv#16 - Konqueror FTP command injection</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-631">DSA-631</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200501-18.xml">GLSA-200501-18</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:045">MDKSA-2005:045</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-009.html">RHSA-2005:009</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-065.html">RHSA-2005:065</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18384">web-browser-ftp-command-execution(18384)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9645">oval:org.mitre.oval:def:9645</ref>
    </refs>
    <vuln_soft>
      <prod name="kdelibs" vendor="kde">
        <vers num="3.1"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.4"/>
        <vers num="3.1.5"/>
        <vers num="3.2"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2"/>
      </prod>
      <prod name="konqueror" vendor="kde">
        <vers num="3.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1166" seq="2004-1166" published="2004-12-31" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in Microsoft Internet Explorer 6.0.2800.1106 and earlier allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110253463305359&amp;w=2">20041207 7a69Adv#15 - Internet Explorer FTP command injection</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012444">1012444</ref>
      <ref source="MISC" url="http://www.rapid7.com/advisories/R7-0032.jsp">http://www.rapid7.com/advisories/R7-0032.jsp</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/489500/100/0/threaded">20080313 Rapid7 Advisory R7-0032: Microsoft Internet Explorer FTP Command Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11826" adv="1">11826</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/28208">28208</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/3212" adv="1">ADV-2006-3212</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0870" adv="1">ADV-2008-0870</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042">MS06-042</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18384">web-browser-ftp-command-execution(18384)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A462">oval:org.mitre.oval:def:462</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1167" seq="2004-1167" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">mirrorselect before 0.89 creates temporary files in a world-writable location with predictable file names, which allows remote attackers to overwrite arbitrary files via a symlink attack.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-05.xml" adv="1" patch="1">GLSA-200412-05</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18382">mirrorselect-symlink(18382)</ref>
    </refs>
    <vuln_soft>
      <prod name="mirrorselect" vendor="gentoo">
        <vers num="0.80"/>
        <vers num="0.81"/>
        <vers num="0.82"/>
        <vers num="0.83"/>
        <vers num="0.84"/>
        <vers num="0.85"/>
        <vers num="0.86"/>
        <vers num="0.87"/>
        <vers num="0.88"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1168" seq="2004-1168" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the WebDav handler in MaxDB WebTools 7.5.00.18 and earlier allows remote attackers to execute arbitrary code via a long Overwrite header.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110244542000340&amp;w=2">20041207 MaxDB WebTools &lt;= 7.5.00.18 buffer overflow and Denial of Service</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18386">maxdb-webdav-bo(18386)</ref>
    </refs>
    <vuln_soft>
      <prod name="maxdb" vendor="mysql">
        <vers num="7.5.00.08"/>
        <vers num="7.5.00.11"/>
        <vers num="7.5.00.12"/>
        <vers num="7.5.00.14"/>
        <vers num="7.5.00.15"/>
        <vers num="7.5.00.16"/>
        <vers num="7.5.00.18"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1169" seq="2004-1169" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">MaxDB WebTools 7.5.00.18 and earlier allows remote attackers to cause a denial of service (application crash) via an HTTP GET request for a file that does not exist, followed by two carriage returns, which causes a NULL dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110244542000340&amp;w=2">20041207 MaxDB WebTools &lt;= 7.5.00.18 buffer overflow and Denial of Service</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18387">maxdb-dos(18387)</ref>
    </refs>
    <vuln_soft>
      <prod name="maxdb" vendor="mysql">
        <vers num="7.5.00.08"/>
        <vers num="7.5.00.11"/>
        <vers num="7.5.00.12"/>
        <vers num="7.5.00.14"/>
        <vers num="7.5.00.15"/>
        <vers num="7.5.00.16"/>
        <vers num="7.5.00.18"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1170" seq="2004-1170" published="2005-01-10" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">a2ps 4.13 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/1026.html" adv="1" patch="1">20040824 a2ps executing shell commands from file name</ref>
      <ref source="CONFIRM" url="http://bugs.debian.org/283134">http://bugs.debian.org/283134</ref>
      <ref source="OPENPKG" url="http://marc.info/?l=bugtraq&amp;m=110598355226660&amp;w=2">OpenPKG-SA-2005.003</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57649-1&amp;searchclause=">57649</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:140">MDKSA-2004:140</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_34_xfree86_libs_xshared.html">SUSE-SA:2004:034</ref>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/5MP0N2KDPA.html">http://www.securiteam.com/unixfocus/5MP0N2KDPA.html</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/419765/100/0/threaded">FLSA:152870</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11025" adv="1" patch="1">11025</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17127">gnu-a2ps-gain-privileges(17127)</ref>
    </refs>
    <vuln_soft>
      <prod name="a2ps" vendor="gnu">
        <vers num="4.13"/>
        <vers num="4.13b"/>
      </prod>
      <prod name="java_desktop_system" vendor="sun">
        <vers num="2.0"/>
        <vers num="2003"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1171" seq="2004-1171" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">KDE 3.2.x and 3.3.0 through 3.3.2, when saving credentials that are (1) manually entered by the user or (2) created by the SMB protocol handler, stores those credentials for plaintext in the user's .desktop file, which may be created with world-readable permissions, which could allow local users to obtain usernames and passwords for remote resources such as SMB shares.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1292.html">20041129 Password Disclosure for SMB Shares in KDE's Konqueror</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110178786809694&amp;w=2">20041129 Password Disclosure for SMB Shares in KDE's Konqueror</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110261063201488&amp;w=2">20041209 KDE Security Advisory: plain text password exposure</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012471">1012471</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-051.shtml">P-051</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-16.xml">GLSA-200412-16</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/305294" adv="1">VU#305294</ref>
      <ref source="CONFIRM" url="http://www.kde.org/info/security/advisory-20041209-1.txt">http://www.kde.org/info/security/advisory-20041209-1.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:150">MDKSA-2004:150</ref>
      <ref source="MISC" url="http://www.sec-consult.com/index.php?id=118">http://www.sec-consult.com/index.php?id=118</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11866" adv="1" patch="1">11866</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18267">kde-smb-password-plaintext(18267)</ref>
    </refs>
    <vuln_soft>
      <prod name="kde" vendor="kde">
        <vers num="3.2"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2"/>
        <vers num="3.2.3"/>
        <vers num="3.3"/>
        <vers num="3.3.1"/>
        <vers num="3.3.2"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1172" seq="2004-1172" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the Agent Browser in Veritas Backup Exec 8.x before 8.60.3878 Hotfix 68, and 9.x before 9.1.4691 Hotfix 40, allows remote attackers to execute arbitrary code via a registration request with a long hostname.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://seer.support.veritas.com/docs/273419.htm">http://seer.support.veritas.com/docs/273419.htm</ref>
      <ref source="CONFIRM" url="http://seer.support.veritas.com/docs/273420.htm">http://seer.support.veritas.com/docs/273420.htm</ref>
      <ref source="CONFIRM" url="http://seer.support.veritas.com/docs/273422.htm">http://seer.support.veritas.com/docs/273422.htm</ref>
      <ref source="CONFIRM" url="http://seer.support.veritas.com/docs/273850.htm">http://seer.support.veritas.com/docs/273850.htm</ref>
      <ref source="MISC" url="http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php">http://www.frsirt.com/exploits/20050111.101_BXEC.cpp.php</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=169">20041216 Veritas Backup Exec Agent Browser Registration Request Buffer Overflow Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/907729">VU#907729</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11974" adv="1" patch="1">11974</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18506">netbackup-agent-browser-bo(18506)</ref>
    </refs>
    <vuln_soft>
      <prod name="backup_exec" vendor="symantec_veritas">
        <vers num="8.0"/>
        <vers num="8.5"/>
        <vers num="8.6"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1173" seq="2004-1173" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Internet Explorer 6 allows remote attackers to bypass the popup blocker via the document object model (DOM) methods in the DHTML Dynamic HTML (DHTML) Editing Component (DEC) and Javascript that calls showModalDialog.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110271114525795&amp;w=2">20041210 HOW TO BREAK XP SP2 POPUP BLOCKER: kick it in the nut !</ref>
      <ref source="NTBUGTRAQ" url="http://marc.info/?l=ntbugtraq&amp;m=110271016129952&amp;w=2">20041210 HOW TO BREAK XP SP2 POPUP BLOCKER: kick it in the nut !</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18444">ie-popup-blocking-bypass(18444)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1174" seq="2004-1174" published="2005-04-14" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">direntry.c in Midnight Commander (mc) 4.5.55 and earlier allows attackers to cause a denial of service by "manipulating non-existing file handles."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012903">1012903</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-639" adv="1" patch="1">DSA-639</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-512.html">RHSA-2005:512</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18909">midnight-commander-direntry-dos(18909)</ref>
    </refs>
    <vuln_soft>
      <prod name="midnight_commander" vendor="midnight_commander">
        <vers num="4.5.40"/>
        <vers num="4.5.41"/>
        <vers num="4.5.42"/>
        <vers num="4.5.43"/>
        <vers num="4.5.44"/>
        <vers num="4.5.45"/>
        <vers num="4.5.46"/>
        <vers num="4.5.47"/>
        <vers num="4.5.48"/>
        <vers num="4.5.49"/>
        <vers num="4.5.50"/>
        <vers num="4.5.51"/>
        <vers num="4.5.52"/>
        <vers num="4.5.54"/>
        <vers num="4.5.55"/>
        <vers num="4.6"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="turbolinux_workstation" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1175" seq="2004-1175" published="2005-04-14" modified="2017-07-18" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">fish.c in midnight commander allows remote attackers to execute arbitrary programs via "insecure filename quoting," possibly using shell metacharacters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012903">1012903</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-639" adv="1" patch="1">DSA-639</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-512.html">RHSA-2005:512</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18906">midnight-commander-command-execution(18906)</ref>
    </refs>
    <vuln_soft>
      <prod name="midnight_commander" vendor="midnight_commander">
        <vers num="4.5.40"/>
        <vers num="4.5.41"/>
        <vers num="4.5.42"/>
        <vers num="4.5.43"/>
        <vers num="4.5.44"/>
        <vers num="4.5.45"/>
        <vers num="4.5.46"/>
        <vers num="4.5.47"/>
        <vers num="4.5.48"/>
        <vers num="4.5.49"/>
        <vers num="4.5.50"/>
        <vers num="4.5.51"/>
        <vers num="4.5.52"/>
        <vers num="4.5.54"/>
        <vers num="4.5.55"/>
        <vers num="4.6"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="turbolinux_workstation" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1176" seq="2004-1176" published="2005-04-14" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer underflow in extfs.c in Midnight Commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012903">1012903</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-639" adv="1" patch="1">DSA-639</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-24.xml">GLSA-200502-24</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-217.html">RHSA-2005:217</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18911">midnight-commander-extfs-dos(18911)</ref>
    </refs>
    <vuln_soft>
      <prod name="midnight_commander" vendor="midnight_commander">
        <vers num="4.5.40"/>
        <vers num="4.5.41"/>
        <vers num="4.5.42"/>
        <vers num="4.5.43"/>
        <vers num="4.5.44"/>
        <vers num="4.5.45"/>
        <vers num="4.5.46"/>
        <vers num="4.5.47"/>
        <vers num="4.5.48"/>
        <vers num="4.5.49"/>
        <vers num="4.5.50"/>
        <vers num="4.5.51"/>
        <vers num="4.5.52"/>
        <vers num="4.5.54"/>
        <vers num="4.5.55"/>
        <vers num="4.6"/>
      </prod>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":advanced_server_ia64"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="2.1" edition=":workstation_ia64"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":ia64"/>
        <vers num="2.1" edition=":itanium_processor"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="turbolinux_workstation" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1177" seq="2004-1177" published="2005-01-10" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=287555" patch="1">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=287555</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110549296126351&amp;w=2">20050110 [USN-59-1] mailman vulnerabilities</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-674" adv="1" patch="1">DSA-674</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:015">MDKSA-2005:015</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_07_mailman.html">SUSE-SA:2005:007</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-235.html">RHSA-2005:235</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18854">mailman-script-driver-xss(18854)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11113">oval:org.mitre.oval:def:11113</ref>
    </refs>
    <vuln_soft>
      <prod name="mailman" vendor="gnu">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="2.0" edition="beta3"/>
        <vers num="2.0" edition="beta4"/>
        <vers num="2.0" edition="beta5"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.0.10"/>
        <vers num="2.0.11"/>
        <vers num="2.0.12"/>
        <vers num="2.0.13"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.4"/>
        <vers num="2.1b1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1179" seq="2004-1179" published="2004-12-31" modified="2019-07-31" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The debstd script in debmake 3.6.x before 3.6.10 and 3.7.x before 3.7.7 allows local users to overwrite arbitrary files via a symlink attack on temporary directories.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-615" adv="1" patch="1">DSA-615</ref>
      <ref source="FULLDISC" url="http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2004-12/0645.html">20041223 [USN-49-1] debmake vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12078" adv="1" patch="1">12078</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18646" adv="1">debmake-debstd-symlink(18646)</ref>
    </refs>
    <vuln_soft>
      <prod name="debmake" vendor="debian">
        <vers num="3.6"/>
        <vers num="3.6.9"/>
        <vers num="3.7"/>
        <vers num="3.7.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1180" seq="2004-1180" published="2004-02-16" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the rwho daemon (rwhod) before 0.17, on little endian architectures, allows remote attackers to cause a denial of service (application crash).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-678" adv="1" patch="1">DSA-678</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:039">MDKSA-2005:039</ref>
    </refs>
    <vuln_soft>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":woody"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
      <prod name="solaris" vendor="sun">
        <vers num=""/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1181" seq="2004-1181" published="2005-04-14" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">htmlheadline before 21.8 allows local users to overwrite arbitrary files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012756">1012756</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-622" adv="1" patch="1">DSA-622</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12147" adv="1" patch="1">12147</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18737">htmlheadline-symlink(18737)</ref>
    </refs>
    <vuln_soft>
      <prod name="htmlheadline" vendor="toshiaki_kanosue">
        <vers num="21.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1182" seq="2004-1182" published="2004-12-31" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110546971307585&amp;w=2">20050111 HylaFAX hfaxd unauthorized login vulnerability</ref>
      <ref source="MLIST" url="http://marc.info/?l=hylafax&amp;m=110545119911558&amp;w=2">[hylafax-announce] 20050111 **ANOUNCE** hylafax-4.2.1 released</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200501-21.xml" patch="1">GLSA-200501-21</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:006">MDKSA-2005:006</ref>
    </refs>
    <vuln_soft>
      <prod name="hylafax" vendor="hylafax">
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.1.3"/>
        <vers num="4.1.5"/>
        <vers num="4.1.6"/>
        <vers num="4.1.7"/>
        <vers num="4.1.8"/>
        <vers num="4.1_beta1"/>
        <vers num="4.1_beta2"/>
        <vers num="4.1_beta3"/>
        <vers num="4.2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1183" seq="2004-1183" published="2005-01-06" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the tiffdump utility for libtiff 3.7.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000920">CLA-2005:920</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110503635113419&amp;w=2">20050106 [USN-54-1] TIFF library tool vulnerability</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200501-06.xml" patch="1">GLSA-200501-06</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:001">MDKSA-2005:001</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:002">MDKSA-2005:002</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:052">MDKSA-2005:052</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_01_libtiff_tiff.html" patch="1">SUSE-SA:2005:001</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-019.html">RHSA-2005:019</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-035.html">RHSA-2005:035</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12173">12173</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18782">libtiff-tiffdump-bo(18782)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9743">oval:org.mitre.oval:def:9743</ref>
    </refs>
    <vuln_soft>
      <prod name="libtiff" vendor="libtiff">
        <vers num="3.4"/>
        <vers num="3.5.1"/>
        <vers num="3.5.2"/>
        <vers num="3.5.3"/>
        <vers num="3.5.4"/>
        <vers num="3.5.5"/>
        <vers num="3.5.6"/>
        <vers num="3.5.7"/>
        <vers num="3.6.0"/>
        <vers num="3.6.1"/>
        <vers num="3.7.0"/>
        <vers num="3.7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1184" seq="2004-1184" published="2005-01-21" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html">APPLE-SA-2009-05-12</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012965">1012965</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3549">http://support.apple.com/kb/HT3549</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-654" adv="1" patch="1">DSA-654</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml" adv="1" patch="1">GLSA-200502-03</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:033">MDKSA-2005:033</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-040.html" adv="1" patch="1">RHSA-2005:040</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/419768/100/0/threaded">FLSA:152892</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/435199/100/0/threaded">20060526 rPSA-2006-0083-1 enscript</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12329">12329</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-133A.html">TA09-133A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1297">ADV-2009-1297</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19012">enscript-epsf-command-ececution(19012)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9658">oval:org.mitre.oval:def:9658</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/68-1/">USN-68-1</ref>
    </refs>
    <vuln_soft>
      <prod name="enscript" vendor="gnu">
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="1.6.1"/>
        <vers num="1.6.2"/>
        <vers num="1.6.3"/>
        <vers num="1.6.4"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="3.0"/>
        <vers num="4.0"/>
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.4"/>
        <vers num="4.4.1"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="6.0"/>
        <vers num="6.1" edition="alpha"/>
        <vers num="6.2"/>
        <vers num="6.3" edition=":ppc"/>
        <vers num="6.3" edition="alpha"/>
        <vers num="6.4" edition=":i386"/>
        <vers num="6.4" edition=":ppc"/>
        <vers num="6.4" edition="alpha"/>
        <vers num="7.0" edition=":i386"/>
        <vers num="7.0" edition=":ppc"/>
        <vers num="7.0" edition=":sparc"/>
        <vers num="7.0" edition="alpha"/>
        <vers num="7.1" edition=":spa"/>
        <vers num="7.1" edition=":sparc"/>
        <vers num="7.1" edition=":x86"/>
        <vers num="7.1" edition="alpha"/>
        <vers num="7.2" edition=":i386"/>
        <vers num="7.3" edition=":i386"/>
        <vers num="7.3" edition=":ppc"/>
        <vers num="7.3" edition=":sparc"/>
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1" edition=":x86_64"/>
        <vers num="9.2" edition=":x86_64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1185" seq="2004-1185" published="2005-01-21" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html">APPLE-SA-2009-05-12</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012965">1012965</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3549">http://support.apple.com/kb/HT3549</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-654" adv="1" patch="1">DSA-654</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml" patch="1">GLSA-200502-03</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:033">MDKSA-2005:033</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-040.html">RHSA-2005:040</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/419768/100/0/threaded">FLSA:152892</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/435199/100/0/threaded">20060526 rPSA-2006-0083-1 enscript</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12329">12329</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-133A.html">TA09-133A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1297">ADV-2009-1297</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19029">enscript-filename-command-execution(19029)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10808">oval:org.mitre.oval:def:10808</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/68-1/">USN-68-1</ref>
    </refs>
    <vuln_soft>
      <prod name="enscript" vendor="gnu">
        <vers num="1.3.0"/>
        <vers num="1.4.0"/>
        <vers num="1.5.0"/>
        <vers num="1.6.0"/>
        <vers num="1.6.1"/>
        <vers num="1.6.2"/>
        <vers num="1.6.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1186" seq="2004-1186" published="2004-12-31" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html">APPLE-SA-2009-05-12</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012965">1012965</ref>
      <ref source="CONFIRM" url="http://support.apple.com/kb/HT3549">http://support.apple.com/kb/HT3549</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-654" adv="1" patch="1">DSA-654</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml" patch="1">GLSA-200502-03</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:033">MDKSA-2005:033</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-040.html">RHSA-2005:040</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/419768/100/0/threaded">FLSA:152892</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/435199/100/0/threaded">20060526 rPSA-2006-0083-1 enscript</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12329">12329</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA09-133A.html">TA09-133A</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/1297">ADV-2009-1297</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19033">enscript-multiple-bo(19033)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11134">oval:org.mitre.oval:def:11134</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/68-1/">USN-68-1</ref>
    </refs>
    <vuln_soft>
      <prod name="enscript" vendor="gnu">
        <vers num="1.6.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1187" seq="2004-1187" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&amp;r2=1.21">http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&amp;r2=1.21</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=176&amp;type=vulnerabilities" adv="1" patch="1">20041221 Multiple Vendor Xine version 0.99.2 PNM Handler PNA_TAG Heap Overflow Vulnerability</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:011">MDKSA-2005:011</ref>
      <ref source="CONFIRM" url="http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff">http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18640">xine-pnatag-bo(18640)</ref>
    </refs>
    <vuln_soft>
      <prod name="mplayer" vendor="mplayer">
        <vers num="0.90"/>
        <vers num="0.90_pre"/>
        <vers num="0.90_rc"/>
        <vers num="0.90_rc4"/>
        <vers num="0.91"/>
        <vers num="0.92"/>
        <vers num="0.92.1"/>
        <vers num="0.92_cvs"/>
        <vers num="1.0_pre1"/>
        <vers num="1.0_pre2"/>
        <vers num="1.0_pre3"/>
        <vers num="1.0_pre3try2"/>
        <vers num="1.0_pre4"/>
        <vers num="1.0_pre5"/>
        <vers num="1.0_pre5try1"/>
        <vers num="1.0_pre5try2"/>
        <vers num="head_cvs"/>
      </prod>
      <prod name="xine" vendor="xine">
        <vers num="0.9.8"/>
        <vers num="0.9.13"/>
        <vers num="0.9.18"/>
        <vers num="1_alpha"/>
        <vers num="1_beta1"/>
        <vers num="1_beta2"/>
        <vers num="1_beta3"/>
        <vers num="1_beta4"/>
        <vers num="1_beta5"/>
        <vers num="1_beta6"/>
        <vers num="1_beta7"/>
        <vers num="1_beta8"/>
        <vers num="1_beta9"/>
        <vers num="1_beta10"/>
        <vers num="1_beta11"/>
        <vers num="1_beta12"/>
        <vers num="1_rc0"/>
        <vers num="1_rc0a"/>
        <vers num="1_rc1"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3"/>
        <vers num="1_rc3a"/>
        <vers num="1_rc3b"/>
        <vers num="1_rc4"/>
        <vers num="1_rc5"/>
        <vers num="1_rc6"/>
        <vers num="1_rc6a"/>
        <vers num="1_rc7"/>
        <vers num="1_rc8"/>
      </prod>
      <prod name="xine-lib" vendor="xine">
        <vers num="0.9.8"/>
        <vers num="0.9.13"/>
        <vers num="0.99"/>
        <vers num="1_alpha"/>
        <vers num="1_beta1"/>
        <vers num="1_beta2"/>
        <vers num="1_beta3"/>
        <vers num="1_beta4"/>
        <vers num="1_beta5"/>
        <vers num="1_beta6"/>
        <vers num="1_beta7"/>
        <vers num="1_beta8"/>
        <vers num="1_beta9"/>
        <vers num="1_beta10"/>
        <vers num="1_beta11"/>
        <vers num="1_beta12"/>
        <vers num="1_rc0"/>
        <vers num="1_rc1"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3"/>
        <vers num="1_rc3a"/>
        <vers num="1_rc3b"/>
        <vers num="1_rc3c"/>
        <vers num="1_rc4"/>
        <vers num="1_rc5"/>
        <vers num="1_rc6"/>
        <vers num="1_rc6a"/>
        <vers num="1_rc7"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1188" seq="2004-1188" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The pnm_get_chunk function in xine 0.99.2 and earlier, and other packages such as MPlayer that use the same code, does not properly verify that the chunk size is less than the PREAMBLE_SIZE, which causes a read operation with a negative length that leads to a buffer overflow via (1) RMF_TAG, (2) DATA_TAG, (3) PROP_TAG, (4) MDPR_TAG, and (5) CONT_TAG values, a different vulnerability than CVE-2004-1187.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&amp;r2=1.21">http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&amp;r2=1.21</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=177&amp;type=vulnerabilities" adv="1" patch="1">20041221 Multiple Vendor Xine version 0.99.2 PNM Handler Negative Read Length Heap Overflow Vulnerability</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:011">MDKSA-2005:011</ref>
      <ref source="CONFIRM" url="http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff">http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18638">xine-pnmgetchunk-bo(18638)</ref>
    </refs>
    <vuln_soft>
      <prod name="mplayer" vendor="mplayer">
        <vers num="0.90"/>
        <vers num="0.90_pre"/>
        <vers num="0.90_rc"/>
        <vers num="0.90_rc4"/>
        <vers num="0.91"/>
        <vers num="0.92"/>
        <vers num="0.92.1"/>
        <vers num="0.92_cvs"/>
        <vers num="1.0_pre1"/>
        <vers num="1.0_pre2"/>
        <vers num="1.0_pre3"/>
        <vers num="1.0_pre3try2"/>
        <vers num="1.0_pre4"/>
        <vers num="1.0_pre5"/>
        <vers num="1.0_pre5try1"/>
        <vers num="1.0_pre5try2"/>
        <vers num="head_cvs"/>
      </prod>
      <prod name="xine" vendor="xine">
        <vers num="0.9.8"/>
        <vers num="0.9.13"/>
        <vers num="0.9.18"/>
        <vers num="1_alpha"/>
        <vers num="1_beta1"/>
        <vers num="1_beta2"/>
        <vers num="1_beta3"/>
        <vers num="1_beta4"/>
        <vers num="1_beta5"/>
        <vers num="1_beta6"/>
        <vers num="1_beta7"/>
        <vers num="1_beta8"/>
        <vers num="1_beta9"/>
        <vers num="1_beta10"/>
        <vers num="1_beta11"/>
        <vers num="1_beta12"/>
        <vers num="1_rc0"/>
        <vers num="1_rc0a"/>
        <vers num="1_rc1"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3"/>
        <vers num="1_rc3a"/>
        <vers num="1_rc3b"/>
        <vers num="1_rc4"/>
        <vers num="1_rc5"/>
        <vers num="1_rc6"/>
        <vers num="1_rc6a"/>
        <vers num="1_rc7"/>
        <vers num="1_rc8"/>
      </prod>
      <prod name="xine-lib" vendor="xine">
        <vers num="0.9.8"/>
        <vers num="0.9.13"/>
        <vers num="0.99"/>
        <vers num="1_alpha"/>
        <vers num="1_beta1"/>
        <vers num="1_beta2"/>
        <vers num="1_beta3"/>
        <vers num="1_beta4"/>
        <vers num="1_beta5"/>
        <vers num="1_beta6"/>
        <vers num="1_beta7"/>
        <vers num="1_beta8"/>
        <vers num="1_beta9"/>
        <vers num="1_beta10"/>
        <vers num="1_beta11"/>
        <vers num="1_beta12"/>
        <vers num="1_rc0"/>
        <vers num="1_rc1"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3"/>
        <vers num="1_rc3a"/>
        <vers num="1_rc3b"/>
        <vers num="1_rc3c"/>
        <vers num="1_rc4"/>
        <vers num="1_rc5"/>
        <vers num="1_rc6"/>
        <vers num="1_rc6a"/>
        <vers num="1_rc7"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1189" seq="2004-1189" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000917">CLA-2005:917</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html">APPLE-SA-2005-08-17</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html">APPLE-SA-2005-08-15</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110358420909358&amp;w=2">20041220 MITKRB5-SA-2004-004: heap overflow in libkadm5srv</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110548298407590&amp;w=2">20050110 [USN-58-1] MIT Kerberos server vulnerability</ref>
      <ref source="CONFIRM" url="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt" adv="1" patch="1">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:156">MDKSA-2004:156</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-012.html">RHSA-2005:012</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-045.html">RHSA-2005:045</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0069">2004-0069</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18621">kerberos-libkadm5srv-bo(18621)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11911">oval:org.mitre.oval:def:11911</ref>
    </refs>
    <vuln_soft>
      <prod name="kerberos" vendor="mit">
        <vers num="5-1.2"/>
        <vers num="5-1.3.1"/>
        <vers num="5-1.3.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1190" seq="2004-1190" published="2005-01-10" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">SUSE Linux before 9.1 and SUSE Linux Enterprise Server before 9 do not properly check commands sent to CD devices that have been opened read-only, which could allow local users to conduct unauthorized write activities to modify the firmware of associated SCSI devices.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_42_kernel.html" adv="1" patch="1">SUSE-SA:2004:042</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2006-0101.html">RHSA-2006:0101</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11784">11784</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18370">suse-scsi-firmware-overwrite(18370)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9369">oval:org.mitre.oval:def:9369</ref>
    </refs>
    <vuln_soft>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.1" edition=":enterprise_server"/>
        <vers num="8.2" edition=":enterprise_server"/>
        <vers num="9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1191" seq="2004-1191" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="1.2" CVSS_base_score="1.2" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Race condition in SuSE Linux 8.1 through 9.2, when run on SMP systems that have more than 4GB of memory, could allow local users to read unauthorized memory from "foreign memory pages."</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_42_kernel.html">SUSE-SA:2004:042</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18137">linux-smbrecvtrans2-memory-leak(18137)</ref>
    </refs>
    <vuln_soft>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.1"/>
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1192" seq="2004-1192" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the lprintf function in Citadel/UX 6.27 and earlier allows remote attackers to execute arbitrary code via format string specifiers sent to the server.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110295469430696&amp;w=2">20041213 Citadel/UX &lt;= v6.27 Remote Format String Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110304986223400&amp;w=2">20041214 Re: Citadel/UX &lt;= v6.27 Remote Format String Vulnerability</ref>
      <ref source="MISC" url="http://www.nosystem.com.ar/advisories/advisory-09.txt">http://www.nosystem.com.ar/advisories/advisory-09.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18429">citadel-format-string(18429)</ref>
    </refs>
    <vuln_soft>
      <prod name="ux" vendor="citadel">
        <vers num="6.07"/>
        <vers num="6.08"/>
        <vers num="6.23"/>
        <vers num="6.24"/>
        <vers num="6.26"/>
        <vers num="6.27"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1193" seq="2004-1193" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.6" CVSS_base_score="6.6" CVSS_impact_subscore="9.2" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:C/A:C)">
    <desc>
      <descript source="cve">Prevx Home 1.0 allows local users with administrator privileges to bypass the intrusion prevention features by directly writing to \device\physicalmemory, which restores the running kernel's original SDT ServiceTable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110118902823639&amp;w=2">20041122 [SIG^2 G-TEC] Prevx Home v1.0 Instrusion Prevention Features Can Be Disabled by Direct Service Table Restoration</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110138413816367&amp;w=2">20041124 Re: [SIG^2 G-TEC] Prevx Home v1.0 Instrusion Prevention Features Can Be Disabled by Direct Service Table Restoration</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012294">1012294</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18195">prevx-home-settings-disable(18195)</ref>
    </refs>
    <vuln_soft>
      <prod name="prevx_home" vendor="prevx">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1194" seq="2004-1194" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Star Wars Battlefront 1.11 and earlier allows remote attackers to cause a denial of service (application crash) via a long nickname.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110132227932050&amp;w=2">20041124 Limited buffer-overflow and arbitrary memory access in Star Wars</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11750" adv="1">11750</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18256">star-wars-nickname-bo(18256)</ref>
    </refs>
    <vuln_soft>
      <prod name="star_wars_battlefront" vendor="lucasarts">
        <vers num="1.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1195" seq="2004-1195" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Star Wars Battlefront 1.11 and earlier allows remote attackers to cause a denial of service (application crash) via a join request that contains a memory address that causes the server to read arbitrary memory.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110132227932050&amp;w=2">20041124 Limited buffer-overflow and arbitrary memory access in Star Wars Battlefront 1.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11750" adv="1">11750</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18257">star-wars-packet-dos(18257)</ref>
    </refs>
    <vuln_soft>
      <prod name="star_wars_battlefront" vendor="lucasarts">
        <vers num="1.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1196" seq="2004-1196" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in inmail.pl in Insite Inmail allows remote attackers to inject arbitrary web script or HTML via the acao parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110140029419018&amp;w=2">20041124 XSS in Brazilian Insite products</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11758">11758</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18268">insite-inmail-inshop-xss(18268)</ref>
    </refs>
    <vuln_soft>
      <prod name="inmail" vendor="insite">
        <vers num=""/>
      </prod>
      <prod name="inshop" vendor="insite">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1197" seq="2004-1197" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in inshop.pl in Insite inShop allows remote attackers to inject arbitrary web script or HTML via the screen parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110140029419018&amp;w=2">20041124 XSS in Brazilian Insite products</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11758" adv="1">11758</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18268">insite-inmail-inshop-xss(18268)</ref>
    </refs>
    <vuln_soft>
      <prod name="inmail" vendor="insite">
        <vers num=""/>
      </prod>
      <prod name="inshop" vendor="insite">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1198" seq="2004-1198" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer allows remote attackers to cause a denial of service (application crash from memory consumption), as demonstrated using Javascript code that continuously creates nested arrays and then sorts the newly created arrays.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1221.html" adv="1">20041125 MSIE &amp; FIREFOX flaws: "detailed" advisory and comments that you probably don't want to read anyway</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/382257">20041125 MSIE flaws: nested array sort() loop Stack overflow exception</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11751" adv="1">11751</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18282">web-browser-array-dos(18282)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1199" seq="2004-1199" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Safari 1.2.4 on Mac OS X 10.3.6 allows remote attackers to cause a denial of service (application crash from memory exhaustion), as demonstrated using Javascript code that continuously creates nested arrays and then sorts the newly created arrays.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029458.html">20041125 More Browser flaws on MACOSX: nested array sort() loop Stack overflow exception</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11759" adv="1">11759</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18282">web-browser-array-dos(18282)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="beta2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1200" seq="2004-1200" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Firefox and Mozilla allow remote attackers to cause a denial of service (application crash from memory consumption), as demonstrated using Javascript code that continuously creates nested arrays and then sorts the newly created arrays.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029434.html">20041125 FIREFOX flaws: nested array sort() loop Stack overflow exception</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029491.html">20041125 MSIE &amp; FIREFOX flaws: "detailed" advisory and comments that you probably don't want to read anyway</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11752" adv="1">11752</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11760">11760</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18282">web-browser-array-dos(18282)</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9" edition="rc"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="preview_release"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1201" seq="2004-1201" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Opera 7.54 allows remote attackers to cause a denial of service (application crash from memory exhaustion), as demonstrated using Javascript code that continuously creates nested arrays and then sorts the newly created arrays.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=110141347502530&amp;w=2">20041125 Re: MSIE flaws: nested array sort() loop Stack overflow exception</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=110144136213993&amp;w=2">20041125 Re: Opera flaws: nested array sort() loop Stack overflow exception</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11762" adv="1">11762</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18282">web-browser-array-dos(18282)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="5.0" edition=":linux"/>
        <vers num="5.0" edition=":mac"/>
        <vers num="5.0.2" edition=":win32"/>
        <vers num="5.1.0" edition=":win32"/>
        <vers num="5.1.1" edition=":win32"/>
        <vers num="5.12" edition=":win32"/>
        <vers num="6.0" edition=":win32"/>
        <vers num="6.0.1" edition=":linux"/>
        <vers num="6.0.1" edition=":win32"/>
        <vers num="6.0.2" edition=":linux"/>
        <vers num="6.0.2" edition=":win32"/>
        <vers num="6.0.3" edition=":linux"/>
        <vers num="6.0.3" edition=":win32"/>
        <vers num="6.0.4" edition=":win32"/>
        <vers num="6.0.5" edition=":win32"/>
        <vers num="6.0.6" edition=":win32"/>
        <vers num="6.10" edition=":linux"/>
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0.1" edition=":win32"/>
        <vers num="7.0.2" edition=":win32"/>
        <vers num="7.0.3" edition=":win32"/>
        <vers num="7.0_beta1" edition=":win32"/>
        <vers num="7.0_beta2" edition=":win32"/>
        <vers num="7.10"/>
        <vers num="7.11"/>
        <vers num="7.11b"/>
        <vers num="7.11j"/>
        <vers num="7.20"/>
        <vers num="7.20_beta1_build2981"/>
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
        <vers num="7.50"/>
        <vers num="7.51"/>
        <vers num="7.52"/>
        <vers num="7.53"/>
        <vers num="7.54"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1202" seq="2004-1202" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in parser.php in phpCMS 1.2.1 and earlier, with non-stealth and debug modes enabled, allows remote attackers to inject arbitrary web script or HTML via the file parameter.</descript>
    </desc>
    <sols>
      <sol source="nvd">Successful exploitation requires that both the non-stealth and the debug modes are enabled.</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029499.html" patch="1">20041126 phpCMS &lt;= 1.2.1 Xss Vulnerability, Information disclosure</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110149207123510&amp;w=2">20041126 phpCMS &lt;= 1.2.1 Xss Vulnerability, Information disclosure</ref>
      <ref source="CONFIRM" url="http://www.phpcms.de/download/index.en.html" patch="1">http://www.phpcms.de/download/index.en.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11765" patch="1">11765</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18272">phpcms-parser-xss(18272)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpcms" vendor="phpcms">
        <vers num="1.1.9"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1203" seq="2004-1203" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">parser.php in phpCMS 1.2.1 and earlier, with non-stealth and debug modes enabled, allows remote attackers to gain sensitive information via an invalid file parameter, which reveals the web server's installation path.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029499.html">20041126 phpCMS &lt;= 1.2.1 Xss Vulnerability, Information disclosure</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110149207123510&amp;w=2">20041126 phpCMS &lt;= 1.2.1 Xss Vulnerability, Information disclosure</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18272">phpcms-parser-xss(18272)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18279">phpcms-parser-path-disclosure(18279)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpcms" vendor="phpcms">
        <vers num="1.1.9"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1204" seq="2004-1204" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">FluxBox 0.9.10 and earlier versions allows local users to cause a denial of service (application crash) by calling Xman with a long -title value, possibly triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110149783715867&amp;w=2">20041126 FluxBox crash vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18264">fluxbox-xman-dos(18264)</ref>
    </refs>
    <vuln_soft>
      <prod name="fluxbot" vendor="fluxbox-team">
        <vers num="0.9.10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1205" seq="2004-1205" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">codebrowserpntm.php in PnTresMailer 6.03 allows remote attackers to gain sensitive information via an invalid filetohighlight parameter, which reveals the full path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110149886306037&amp;w=2">20041126 PnTresMailer code browser 6.03 Vulnerabilities</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18263">pntresmailer-information-disclosure(18263)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1206" seq="2004-1206" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in codebrowserpntm.php in pnTresMailer 6.0.3 allows remote attackers to read arbitrary files via a .. (dot dot) in the filetodownload parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110149886306037&amp;w=2">20041126 PnTresMailer code browser 6.03 Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11767" adv="1">11767</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18263">pntresmailer-information-disclosure(18263)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1207" seq="2004-1207" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Serious engine, as used in (1) Alpha Black Zero Intrepid Protocol 1.04 and earlier, (2) Nitro family, and (3) Serious Sam Second Encounter 1.07 allows remote attackers to cause a denial of service (server crash) via a large number of UDP join requests that exceeds the maximum player limit, as originally reported for Alpha Black Zero.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109651567308405&amp;w=2">20040929 Crash in Alpha Black Zero 1.04</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110180289205605&amp;w=2">20041128 Players overflow in Serious engine UDP (was Alpha Black Zero, 29 Sep 2004)</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011454">1011454</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11279">11279</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17545">alphablackzero-udp-packet-dos(17545)</ref>
    </refs>
    <vuln_soft>
      <prod name="seriousengine" vendor="serioussam">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1208" seq="2004-1208" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Orbz 2.10 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long password field in a join request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110176280402580&amp;w=2">20041129 Buffer-overflow in Orbz 2.10</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11774" adv="1">11774</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18298">orbz-join-password-bo(18298)</ref>
    </refs>
    <vuln_soft>
      <prod name="orbz" vendor="21-6_productions">
        <vers num="2.5"/>
        <vers num="2.6"/>
        <vers num="2.7"/>
        <vers num="2.8"/>
        <vers num="2.9"/>
        <vers num="2.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1209" seq="2004-1209" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Verisign Payflow Link, when running with empty Accepted URL fields, does not properly verify the data in the hidden AMOUNT field, which allows remote attackers to modify the price of the items that they purchase.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110181288820226&amp;w=2">20041129 [SHK-001]Payflow Link Default Config may lead to Hidden Field Modification</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18299">payflow-link-modification(18299)</ref>
    </refs>
    <vuln_soft>
      <prod name="payflow_link" vendor="verisign">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1210" seq="2004-1210" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in proxylog.dat in IPCop 1.4.1 and possibly other versions, allows remote attackers to inject arbitrary web script or HTML via the (1) url or (2) part variables.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110197682705001&amp;w=2">20041201 [KA Advisory 0411291] IPCop Cross Site Scripting Vulnerability in proxylog.dat</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11779">11779</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18301">ipcop-proxylogdat-xss(18301)</ref>
    </refs>
    <vuln_soft>
      <prod name="ipcop" vendor="ipcop">
        <vers num="1.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1211" seq="2004-1211" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the IMAP service in Mercury/32 4.01a allow remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via long arguments to the (1) EXAMINE, (2) SUBSCRIBE, (3) STATUS, (4) APPEND, (5) CHECK, (6) CLOSE, (7) EXPUNGE, (8) FETCH, (9) RENAME, (10) DELETE, (11) LIST, (12) SEARCH, (13) CREATE, or (14) UNSUBSCRIBE commands.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://home.kabelfoon.nl/~jaabogae/han/m_401b.html">http://home.kabelfoon.nl/~jaabogae/han/m_401b.html</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/029701.html">20041201 Multiple buffer overflows exist in Mercury/32, v4.01a, Dec 8 2003.</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110193702909991&amp;w=2">20041201 Multiple buffer overflows exist in Mercury/32, v4.01a, Dec 8 2003.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11775" adv="1" patch="1">11775</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18318">mercury-command-bo(18318)</ref>
    </refs>
    <vuln_soft>
      <prod name="mercury" vendor="david_harris">
        <vers num="4.0.1a" edition=":win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1212" seq="2004-1212" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in btdownload.php in Blog Torrent preview 0.8 allows remote attackers to download arbitrary files via a .. (dot dot) in the file argument.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/battletorrent/btorrent_server/btdownload.php?r1=1.6&amp;r2=1.7">http://cvs.sourceforge.net/viewcvs.py/battletorrent/btorrent_server/btdownload.php?r1=1.6&amp;r2=1.7</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110200971917165&amp;w=2">20041202 Blog Torrent preview 0.8 - arbitary file download</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11795" adv="1" patch="1">11795</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18356">blogtorrent-btdownloadphp-dir-traversal(18356)</ref>
    </refs>
    <vuln_soft>
      <prod name="blog_torrent_preview" vendor="blog_torrent">
        <vers num="0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1213" seq="2004-1213" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Advanced Guestbook 2.3.1, 2.2, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the entry parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110206527624612&amp;w=2">20041202 Advanced Guestbook</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110238530129498&amp;w=2">20041204 Re: Advanced Guestbook</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11798">11798</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18334">advguestbook-indexphp-xss(18334)</ref>
    </refs>
    <vuln_soft>
      <prod name="advanced_guestbook" vendor="advanced_guestbook">
        <vers num="2.2"/>
        <vers num="2.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1214" seq="2004-1214" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in Kreed 1.05 and earlier allows remote attackers to execute arbitrary code via format specifiers in (1) a nickname or (2) message text.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110201776207915&amp;w=2">20041202 Multiple vulnerabilities in Kreed 1.05</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11799" adv="1">11799</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18343">kreed-message-nickname-format-string(18343)</ref>
    </refs>
    <vuln_soft>
      <prod name="kreed" vendor="burut">
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1215" seq="2004-1215" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Kreed 1.05 and earlier allows remote attackers to cause a denial of service (server disconnect) via a long UDP packet, which causes a "message too long" socket error.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110201776207915&amp;w=2">20041202 Multiple vulnerabilities in Kreed 1.05</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11799" adv="1">11799</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18344">kreed-udp-packet-dos(18344)</ref>
    </refs>
    <vuln_soft>
      <prod name="kreed" vendor="burut">
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1216" seq="2004-1216" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The scripts that handle players in Kreed 1.05 and earlier allow remote attackers to cause a denial of service (server freeze) via a long (1) nickname or (2) model type, which generates dialog boxes on the server that must be manually handled before the server continues the game.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110201776207915&amp;w=2">20041202 Multiple vulnerabilities in Kreed 1.05</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11799" adv="1">11799</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18345">kreed-nickname-modeltype-dos(18345)</ref>
    </refs>
    <vuln_soft>
      <prod name="kreed" vendor="burut">
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1217" seq="2004-1217" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Hosting Controller 6.1 Hotfix 1.4, and possibly other versions, allows remote attackers to view arbitrary directories by specifying the target pathname in the FilePath parameter to (1) Statsbrowse.asp or (2) Generalbrowse.asp.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110237762807764&amp;w=2">20041205 Hosting Controller</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11822" adv="1">11822</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18363">hosting-controller-view-files(18363)</ref>
    </refs>
    <vuln_soft>
      <prod name="hosting_controller" vendor="hosting_controller">
        <vers num="6.1"/>
        <vers num="6.1_hotfix_1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1218" seq="2004-1218" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Remote Execute 2.30 allows remote attackers to cause a denial of service (application crash) by making 7 simultaneous connections.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110238855010003&amp;w=2">20041206 DoS leading to crash of client in Remote Execute 2.30</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/136424" adv="1">VU#136424</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11821" adv="1" patch="1">11821</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18380">remote-execute-dos(18380)</ref>
    </refs>
    <vuln_soft>
      <prod name="remote_execute" vendor="ibex_software">
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1219" seq="2004-1219" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">paFileDB 3.1, when using sessions authentication and while the administrator logs on, allows remote attackers to read the administrator's password hash and conduct brute force password guessing attacks by listing the contents of the sessions directory and reading the associated file for the administrator session.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://echo.or.id/adv/adv09-y3dips-2004.txt">http://echo.or.id/adv/adv09-y3dips-2004.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110245123927025&amp;w=2">20041207 Multiple Vulnerabilities in paFileDB 3.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11818" adv="1">11818</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18364">pafiledb-session-information-disclosure(18364)</ref>
    </refs>
    <vuln_soft>
      <prod name="pafiledb" vendor="php_arena">
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1220" seq="2004-1220" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Battlefield 1942 1.6.19 and earlier, and Battlefield Vietnam 1.2 and earlier, allows a remote master server to cause a denial of service (client crash) via a server reply that contains a large numplayers value, which triggers a null dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110244662102167&amp;w=2">20041207 Broadcast client crash in Battlefield 1942 1.6.19 and Vietnam 1.2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11838" adv="1">11838</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18400">battlefield-numplayers-dos(18400)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18402">battlefieldvietnam-numplayers-dos(18402)</ref>
    </refs>
    <vuln_soft>
      <prod name="battlefield_1942" vendor="digital_illusions">
        <vers num="1.6.19"/>
      </prod>
      <prod name="battlefield_vietnam" vendor="digital_illusions">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1221" seq="2004-1221" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in weblibs.pl in WebLibs 1.0 allows remote attackers to read arbitrary files via .. sequences in the TextFile parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110245395510945&amp;w=2">20041207 Remote Web Server Text File Viewing Vulnerability in WebLibs 1.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11848" adv="1">11848</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18399">weblibs-directory-traversal(18399)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblibs" vendor="darryl_burgdorf">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1222" seq="2004-1222" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">weblibs.pl in WebLibs 1.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the TextFile parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110245395510945&amp;w=2">20041207 Remote Web Server Text File Viewing Vulnerability in WebLibs 1.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11848" adv="1">11848</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18399">weblibs-directory-traversal(18399)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblibs" vendor="darryl_burgdorf">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1223" seq="2004-1223" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Management Agent in F-Secure Policy Manager 5.11.2810 allows remote attackers to gain sensitive information, such as the absolute path for the web server, via an HTTP request to fsmsh.dll without any parameters.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110262921306862&amp;w=2">20041209 =?iso-8859-1?Q?F-Secure_Policy_Manager_-__physical_path_disclosure?=</ref>
      <ref source="MISC" url="http://www.oliverkarow.de/research/f-secure.txt">http://www.oliverkarow.de/research/f-secure.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11869" adv="1">11869</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18413">fsecure-url-obtain-information(18413)</ref>
    </refs>
    <vuln_soft>
      <prod name="policy_manager" vendor="f-secure">
        <vers num="5.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1224" seq="2004-1224" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Off-by-one error in the mtr_curses_keyaction function for mtr 0.55 through 0.65 allows local users to hijack raw sockets, as demonstrated using the "s" keybinding, which leaves a buffer without a NULL terminator.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110279034910663&amp;w=2">20041211 Local off-by-one in mtr versions 0.55 to 0.65</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18428">mtr-mtrcurseskeyaction-offbyone-bo(18428)</ref>
    </refs>
    <vuln_soft>
      <prod name="mtr" vendor="mtr">
        <vers num="0.55"/>
        <vers num="0.56"/>
        <vers num="0.57"/>
        <vers num="0.58"/>
        <vers num="0.59"/>
        <vers num="0.60"/>
        <vers num="0.61"/>
        <vers num="0.62"/>
        <vers num="0.63"/>
        <vers num="0.64"/>
        <vers num="0.65"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1225" seq="2004-1225" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in SugarCRM Sugar Sales before 2.0.1a allows remote attackers to execute arbitrary SQL commands and gain privileges via the record parameter in a DetailView action to index.php, and record parameters in other functionality.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110295433323795&amp;w=2">20041213 SugarSales Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00053-120104">http://www.gulftech.org/?node=research&amp;article_id=00053-120104</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11740" adv="1">11740</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18325">sugarcrm-record-sql-injection(18325)</ref>
    </refs>
    <vuln_soft>
      <prod name="sugarcrm" vendor="sugarcrm">
        <vers num="1.0"/>
        <vers num="1.0f"/>
        <vers num="1.0g"/>
        <vers num="1.1"/>
        <vers num="1.1a"/>
        <vers num="1.1b"/>
        <vers num="1.1c"/>
        <vers num="1.1d"/>
        <vers num="1.1e"/>
        <vers num="1.1f"/>
        <vers num="1.5d"/>
        <vers num="2.0.1"/>
        <vers num="2.0.1a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1226" seq="2004-1226" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to gain sensitive information via certain requests to scripts that contain invalid input, which reveals the path in an error message, as demonstrated using phprint.php with an empty module parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110295433323795&amp;w=2">20041213 SugarSales Multiple Vulnerabilities</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18447">sugar-sales-path-disclosure(18447)</ref>
    </refs>
    <vuln_soft>
      <prod name="sugarcrm" vendor="sugarcrm">
        <vers num="2.0.1c" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1227" seq="2004-1227" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to read arbitrary files and possibly execute arbitrary PHP code via .. (dot dot) sequences in the (1) module, (2) action, or (3) theme parameters to index.php, (4) the theme parameter to Login.php, and possibly other parameters or scripts.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110295433323795&amp;w=2">20041213 SugarSales Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00053-120104">http://www.gulftech.org/?node=research&amp;article_id=00053-120104</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11740" adv="1">11740</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18326">sugarcrm-directory-traversal(18326)</ref>
    </refs>
    <vuln_soft>
      <prod name="sugar_sales" vendor="sugarcrm">
        <vers num="2.0.1c" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1228" seq="2004-1228" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:P)">
    <desc>
      <descript source="cve">The install scripts in SugarCRM Sugar Sales 2.0.1c and earlier are not removed after installation, which allows attackers to obtain the MySQL administrative password in cleartext from an installation form, or to cause a denial of service by changing database settings to the default.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110295433323795&amp;w=2">20041213 SugarSales Multiple Vulnerabilities</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18449">sugar-sales-password-plaintext(18449)</ref>
    </refs>
    <vuln_soft>
      <prod name="sugar_sales" vendor="sugarcrm">
        <vers num="2.0.1c" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1229" seq="2004-1229" published="2005-01-10" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting vulnerability in the parser for Gadu-Gadu allows remote attackers to inject arbitrary web script or HTML via (1) http:// or (2) news:// URLs, a different vulnerability than CVE-2004-1410.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110295777306493&amp;w=2">20041213 Gadu-Gadu several vulnerabilities</ref>
      <ref source="MISC" url="http://www.man.poznan.pl/~security/gg-adv.txt" adv="1">http://www.man.poznan.pl/~security/gg-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11899">11899</ref>
    </refs>
    <vuln_soft>
      <prod name="gadu-gadu_instant_messenger" vendor="gadu-gadu">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1230" seq="2004-1230" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Gadu-Gadu allows remote attackers to gain sensitive information and read files from the _cache directory of other users via a DCC connection and a CTCP packet that contains a 1 as the type and a 4 as the subtype.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110295777306493&amp;w=2">20041213 Gadu-Gadu several vulnerabilities</ref>
      <ref source="MISC" url="http://www.man.poznan.pl/~security/gg-adv.txt">http://www.man.poznan.pl/~security/gg-adv.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18461">gadu-gadu-dcc-ctcp-obtain-files(18461)</ref>
    </refs>
    <vuln_soft>
      <prod name="gadu-gadu_instant_messenger" vendor="gadu-gadu">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1231" seq="2004-1231" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Gadu-Gadu allows remote attackers to read arbitrary files via .. (dot dot) sequences in a DCC connection with a CTCP packet that contains a 1 as the type and a 4 as the subtype.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110295777306493&amp;w=2">20041213 Gadu-Gadu several vulnerabilities</ref>
      <ref source="MISC" url="http://www.man.poznan.pl/~security/gg-adv.txt">http://www.man.poznan.pl/~security/gg-adv.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18461">gadu-gadu-dcc-ctcp-obtain-files(18461)</ref>
    </refs>
    <vuln_soft>
      <prod name="gadu-gadu_instant_messenger" vendor="gadu-gadu">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1232" seq="2004-1232" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the code that sends images in Gadu-Gadu allows remote attackers to execute arbitrary code via a large image filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110295777306493&amp;w=2">20041213 Gadu-Gadu several vulnerabilities</ref>
      <ref source="MISC" url="http://www.man.poznan.pl/~security/gg-adv.txt">http://www.man.poznan.pl/~security/gg-adv.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18462">gadu-gadu-image-filename-bo(18462)</ref>
    </refs>
    <vuln_soft>
      <prod name="gadu-gadu_instant_messenger" vendor="gadu-gadu">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1233" seq="2004-1233" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer overflow in Gadu-Gadu allows remote attackers to cause a denial of service (disk consumption) via a user packet to the DCC file transfer capability with an invalid file length.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110295777306493&amp;w=2">20041213 Gadu-Gadu several vulnerabilities</ref>
      <ref source="MISC" url="http://www.man.poznan.pl/~security/gg-adv.txt">http://www.man.poznan.pl/~security/gg-adv.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18465">gadu-gadu-dcc-bo(18465)</ref>
    </refs>
    <vuln_soft>
      <prod name="gadu-gadu_instant_messenger" vendor="gadu-gadu">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1234" seq="2004-1234" published="2004-12-31" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">load_elf_binary in Linux before 2.4.26 allows local users to cause a denial of service (system crash) via an ELF binary in which the interpreter is NULL.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=142965">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=142965</ref>
      <ref source="CONFIRM" url="http://linux.bkbits.net:8080/linux-2.4/cset@4076466d_SqUm4azg4_v3FIG2-X6XQ" patch="1">http://linux.bkbits.net:8080/linux-2.4/cset@4076466d_SqUm4azg4_v3FIG2-X6XQ</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-689.html">RHSA-2004:689</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-016.html">RHSA-2005:016</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-017.html">RHSA-2005:017</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12101" patch="1">12101</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336" patch="1">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18687">linux-loadelfbinary-dos(18687)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10608">oval:org.mitre.oval:def:10608</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" prev="1" edition="test1"/>
        <vers num="2.4.0" prev="1" edition="test10"/>
        <vers num="2.4.0" prev="1" edition="test11"/>
        <vers num="2.4.0" prev="1" edition="test12"/>
        <vers num="2.4.0" prev="1" edition="test2"/>
        <vers num="2.4.0" prev="1" edition="test3"/>
        <vers num="2.4.0" prev="1" edition="test4"/>
        <vers num="2.4.0" prev="1" edition="test5"/>
        <vers num="2.4.0" prev="1" edition="test6"/>
        <vers num="2.4.0" prev="1" edition="test7"/>
        <vers num="2.4.0" prev="1" edition="test8"/>
        <vers num="2.4.0" prev="1" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3" edition="pre3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22" edition="pre10"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1235" seq="2004-1235" published="2005-04-14" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.2" CVSS_base_score="6.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/index.php?id=a&amp;anuncio=000930">CLA-2005:930</ref>
      <ref source="MISC" url="http://isec.pl/vulnerabilities/isec-0021-uselib.txt">http://isec.pl/vulnerabilities/isec-0021-uselib.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110512575901427&amp;w=2">20050107 Linux kernel sys_uselib local root vulnerability</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:022">MDKSA-2005:022</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_01_sr.html">SUSE-SR:2005:001</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-016.html">RHSA-2005:016</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-017.html">RHSA-2005:017</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-043.html" adv="1" patch="1">RHSA-2005:043</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-092.html">RHSA-2005:092</ref>
      <ref source="CONFIRM" url="http://www.securityfocus.com/advisories/7804">http://www.securityfocus.com/advisories/7804</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/advisories/7805">FEDORA-2005-014</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/advisories/7806">FEDORA-2005-013</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12190" adv="1" patch="1">12190</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2005/0001/">2005-0001</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2336">FLSA:2336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18800">linux-uselib-gain-privileges(18800)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567">oval:org.mitre.oval:def:9567</ref>
    </refs>
    <vuln_soft>
      <prod name="intuity_audix" vendor="avaya">
        <vers num="" edition=":lx"/>
      </prod>
      <prod name="mn100" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="network_routing" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="mandrake_multi_network_firewall" vendor="mandrakesoft">
        <vers num="8.2"/>
      </prod>
      <prod name="converged_communications_server" vendor="avaya">
        <vers num="2.0"/>
      </prod>
      <prod name="s8300" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8500" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8700" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="s8710" vendor="avaya">
        <vers num="r2.0.0"/>
        <vers num="r2.0.1"/>
      </prod>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="1.1"/>
        <vers num="2.0"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="10.0"/>
      </prod>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.4.28"/>
        <vers num="2.4.29" edition="rc2"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
        <vers num="3.0"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
        <vers num="4.0" edition=":advanced_server"/>
        <vers num="4.0" edition=":enterprise_server"/>
        <vers num="4.0" edition=":workstation"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
        <vers num="4.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="7.3" edition=":i386"/>
        <vers num="9.0" edition=":i386"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1236" seq="2004-1236" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the LDAP component for Netscape Directory Server (NDS) 3.6 on HP-UX and other operating systems allows remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=110384298016120">SSRT4867</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57754-1" adv="1">57754</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-083.shtml">P-083</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/258905" adv="1">VU#258905</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12099">12099</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18676">nds-ldap-bo(18676)</ref>
    </refs>
    <vuln_soft>
      <prod name="directory_server" vendor="netscape">
        <vers num="3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1237" seq="2004-1237" published="2005-04-14" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat Enterprise Linux 3 allows local users to cause a denial of service (system crash) via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-043.html" adv="1" patch="1">RHSA-2005:043</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11282">oval:org.mitre.oval:def:11282</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.4.28"/>
        <vers num="2.4.29" edition="rc1"/>
        <vers num="2.4.29" edition="rc2"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0" edition=":desktop"/>
        <vers num="8" edition=":enterprise_server"/>
        <vers num="8.1"/>
        <vers num="8.2"/>
        <vers num="9.0" edition=":enterprise_server"/>
        <vers num="9.1"/>
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1238" seq="2004-1238" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-1239" seq="2004-1239" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-1240" seq="2004-1240" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-1241" seq="2004-1241" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-1242" seq="2004-1242" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-1243" seq="2004-1243" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004.  Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-1244" seq="2004-1244" published="2004-02-08" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Windows Media Player 9 allows remote attackers to execute arbitrary code via a PNG file containing large (1) width or (2) height values, aka the "PNG Processing Vulnerability."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/259890" adv="1" patch="1">VU#259890</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA05-039A.html" adv="1" patch="1">TA05-039A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-009">MS05-009</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19096">win-ms05kb890261-update(19096)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1306">oval:org.mitre.oval:def:1306</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1568">oval:org.mitre.oval:def:1568</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2379">oval:org.mitre.oval:def:2379</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_media_player" vendor="microsoft">
        <vers num="9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1254" seq="2004-1254" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">WinRAR 3.40, and possibly earlier versions, allows remote attackers to execute arbitrary code via a ZIP file containing a file with a long filename, possibly causing an integer overflow that leads to a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.frsirt.com/exploits/20041217.Winrar.c.php">http://www.frsirt.com/exploits/20041217.Winrar.c.php</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18569">winrar-zip-file-bo(18569)</ref>
    </refs>
    <vuln_soft>
      <prod name="winrar" vendor="rarlab">
        <vers num="3.0.0"/>
        <vers num="3.10"/>
        <vers num="3.10_beta3"/>
        <vers num="3.10_beta5"/>
        <vers num="3.11"/>
        <vers num="3.20"/>
        <vers num="3.40"/>
        <vers num="3.41"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1255" seq="2004-1255" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the expandtabs function in 2fax 3.04 allows remote attackers to execute arbitrary code via a text file that is converted to TIFF.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/2fax.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/2fax.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/10901">2fax-bpcx-bo(10901)</ref>
    </refs>
    <vuln_soft>
      <prod name="2fax" vendor="2fax">
        <vers num="3.0_4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1256" seq="2004-1256" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the (1) event_text and (2) event_specific functions in abc2midi 2004.12.04 allow remote attackers to execute arbitrary code via crafted ABC files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/abc2midi.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/abc2midi.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18573">abc2midi-eventtext-bo(18573)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18574">abc2midi-eventspecific-bo(18574)</ref>
    </refs>
    <vuln_soft>
      <prod name="abcmidi" vendor="abcmidi">
        <vers num="2004-12-04"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1257" seq="2004-1257" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the process_abc function in abc.c for abc2mtex 1.6.1 allows remote attackers to execute arbitrary code via crafted ABC files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/abc2mtex.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/abc2mtex.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18578">abc2mtex-processabc-bo(18578)</ref>
    </refs>
    <vuln_soft>
      <prod name="abc2mtex" vendor="abc2mtex">
        <vers num="1.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1258" seq="2004-1258" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the put_words function in subs.c for abcm2ps 3.7.20 allows remote attackers to execute arbitrary code via crafted ABC files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/abcm2ps.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/abcm2ps.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18579">abcm2ps-putwords-bo(18579)</ref>
    </refs>
    <vuln_soft>
      <prod name="abcm2ps" vendor="moinejf">
        <vers num="3.7.20"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1259" seq="2004-1259" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the handle_directive function in abcpp.c for abcpp 1.3.0 allow remote attackers to execute arbitrary code via crafted ABC files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/abcpp.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/abcpp.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18581">abcpp-handledirective-bo(18581)</ref>
    </refs>
    <vuln_soft>
      <prod name="abcpp" vendor="abcpp">
        <vers num="1.3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1260" seq="2004-1260" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the (1) write_heading function in subs.cpp or (2) trim_title function in parse.cpp for abctab2ps 1.6.3 allow remote attackers to execute arbitrary code via crafted ABC files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/abctab2ps.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/abctab2ps.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18583">abctab2ps-writeheading-bo(18583)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18584">abctab2ps-trimtitle-bo(18584)</ref>
    </refs>
    <vuln_soft>
      <prod name="abctab2ps" vendor="abctab2ps">
        <vers num="1.6.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1261" seq="2004-1261" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the preparse function in asp2php 0.76.23 allow remote attackers to execute arbitrary code via crafted ASP scripts.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/asp2php.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/asp2php.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18585">asp2php-preparse-bo(18585)</ref>
    </refs>
    <vuln_soft>
      <prod name="asp2php" vendor="asp2php">
        <vers num="0.76.23"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1262" seq="2004-1262" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the bsb_open_header function in libbsb for bsb2ppm 0.0.6 allows remote attackers to execute arbitrary code via crafted BSB pictures.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/bsb2ppm.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/bsb2ppm.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18586">bsb2ppm-bsbopenheader-bo(18586)</ref>
    </refs>
    <vuln_soft>
      <prod name="bsb2ppm" vendor="stuart_cunningham">
        <vers num="0.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1263" seq="2004-1263" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">changepassword.cgi in ChangePassword 0.8, when installed setuid, allows local users to execute arbitrary code by modifying the PATH environment variable to point to a malicious "make" program.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/changepassword.txt">http://tigger.uic.edu/~jlongs2/holes/changepassword.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18593">changepassword-gain-privileges(18593)</ref>
    </refs>
    <vuln_soft>
      <prod name="changepassword" vendor="changepassword">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.6.1"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1264" seq="2004-1264" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the simplify_path function in config.c for ChBg 1.5 allows remote attackers to execute arbitrary code via a crafted chbg scenario file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/chbg.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/chbg.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-644">DSA-644</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:027">MDKSA-2005:027</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18595">chbg-simplifypath-bo(18595)</ref>
    </refs>
    <vuln_soft>
      <prod name="chbg" vendor="chbg">
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1265" seq="2004-1265" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the readObjectChunk function in 3dsimp.cpp for the convex-tool program in Convex 3D 0.8pre1 allows remote attackers to execute arbitrary code via a crafted 3DS file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/convex3d.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/convex3d.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18601">convex-3d-readobjectchunk-bo(18601)</ref>
    </refs>
    <vuln_soft>
      <prod name="convex_3d" vendor="alex_dunaevsky">
        <vers num="0.8_pre1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1266" seq="2004-1266" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the get_field_headers function in csv2xml.cpp for csv2xml 0.5.1 allows remote attackers to execute arbitrary code via a crafted CSV file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/csv2xml.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/csv2xml.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18602">csv2xml-getfieldheaders-bo(18602)</ref>
    </refs>
    <vuln_soft>
      <prod name="csv2xml" vendor="jacob_rhoden">
        <vers num="0.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1267" seq="2004-1267" published="2005-01-10" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the ParseCommand function in hpgl-input.c in the hpgltops program for CUPS 1.1.22 allows remote attackers to execute arbitrary code via a crafted HPGL file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/cups.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/cups.txt</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml">GLSA-200412-25</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:008">MDKSA-2005:008</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-013.html">RHSA-2005:013</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-053.html">RHSA-2005:053</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18604">cups-parsecommand-hpgl-bo(18604)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10620">oval:org.mitre.oval:def:10620</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/50-1/">USN-50-1</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.0.4"/>
        <vers num="1.0.4_8"/>
        <vers num="1.1.1"/>
        <vers num="1.1.4"/>
        <vers num="1.1.4_2"/>
        <vers num="1.1.4_3"/>
        <vers num="1.1.4_5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.10"/>
        <vers num="1.1.12"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.19_rc5"/>
        <vers num="1.1.20"/>
        <vers num="1.1.21"/>
        <vers num="1.1.22_rc1"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1268" seq="2004-1268" published="2005-01-10" modified="2018-10-03" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling the associated file system and triggering the write errors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/cups2.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/cups2.txt</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml">GLSA-200412-25</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:008">MDKSA-2005:008</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-013.html">RHSA-2005:013</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-053.html">RHSA-2005:053</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18606">cups-lppasswd-passwd-truncate(18606)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10398">oval:org.mitre.oval:def:10398</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/50-1/">USN-50-1</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.0.4"/>
        <vers num="1.0.4_8"/>
        <vers num="1.1.1"/>
        <vers num="1.1.4"/>
        <vers num="1.1.4_2"/>
        <vers num="1.1.4_3"/>
        <vers num="1.1.4_5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.10"/>
        <vers num="1.1.12"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.19_rc5"/>
        <vers num="1.1.20"/>
        <vers num="1.1.21"/>
        <vers num="1.1.22_rc1"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1269" seq="2004-1269" published="2005-01-10" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">lppasswd in CUPS 1.1.22 does not remove the passwd.new file if it encounters a file-size resource limit while writing to passwd.new, which causes subsequent invocations of lppasswd to fail.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/cups2.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/cups2.txt</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml">GLSA-200412-25</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:008">MDKSA-2005:008</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-013.html">RHSA-2005:013</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-053.html">RHSA-2005:053</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18608">cups-lppasswd-dos(18608)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9545">oval:org.mitre.oval:def:9545</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/50-1/">USN-50-1</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.0.4"/>
        <vers num="1.0.4_8"/>
        <vers num="1.1.1"/>
        <vers num="1.1.4"/>
        <vers num="1.1.4_2"/>
        <vers num="1.1.4_3"/>
        <vers num="1.1.4_5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.10"/>
        <vers num="1.1.12"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.19_rc5"/>
        <vers num="1.1.20"/>
        <vers num="1.1.21"/>
        <vers num="1.1.22_rc1"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1270" seq="2004-1270" published="2005-01-10" modified="2018-10-03" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/cups2.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/cups2.txt</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml">GLSA-200412-25</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:008">MDKSA-2005:008</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-013.html">RHSA-2005:013</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-053.html">RHSA-2005:053</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18609">cups-lppasswd-passwd-modify(18609)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11507">oval:org.mitre.oval:def:11507</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/50-1/">USN-50-1</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.0.4"/>
        <vers num="1.0.4_8"/>
        <vers num="1.1.1"/>
        <vers num="1.1.4"/>
        <vers num="1.1.4_2"/>
        <vers num="1.1.4_3"/>
        <vers num="1.1.4_5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.10"/>
        <vers num="1.1.12"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.19_rc5"/>
        <vers num="1.1.20"/>
        <vers num="1.1.21"/>
        <vers num="1.1.22_rc1"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1271" seq="2004-1271" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the dxfin function in d.c for dxfscope 0.2 allows remote attackers to execute arbitrary code via a crafted DXF file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/dxfscope.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/dxfscope.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18558">dxfscope-dxfin-bo(18558)</ref>
    </refs>
    <vuln_soft>
      <prod name="dxf_file_format_viewer" vendor="dxfscope">
        <vers num="0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1272" seq="2004-1272" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the save_embedded_address function in filter.c for elm/bolthole filter 2.6.1 allows remote attackers to execute arbitrary code via a crafted email message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/elm-bolthole-filter.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/elm-bolthole-filter.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18607">elm-bolthole-bo(18607)</ref>
    </refs>
    <vuln_soft>
      <prod name="filter" vendor="bolthole">
        <vers num="2.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1273" seq="2004-1273" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the DownloadLoop function in main.c for greed 0.81p allows remote attackers to execute arbitrary code via a GRX file containing a long filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/greed.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/greed.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18633">greed-downloadloop-bo(18633)</ref>
    </refs>
    <vuln_soft>
      <prod name="greed" vendor="greed">
        <vers num="0.81p"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1274" seq="2004-1274" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The DownloadLoop function in main.c for greed 0.81p allows remote attackers to execute arbitrary code via a GRX file containing a filename with shell metacharacters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/greed.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/greed.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18634">greed-downloadloop-command-execution(18634)</ref>
    </refs>
    <vuln_soft>
      <prod name="greed" vendor="greed">
        <vers num="0.81p"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1275" seq="2004-1275" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the remove_quote function in convert.c for html2hdml 1.0.3 allows remote attackers to execute arbitrary code via a crafted HTML file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/html2hdml.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/html2hdml.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18556">html2hdml-removequote-bo(18556)</ref>
    </refs>
    <vuln_soft>
      <prod name="html2hdml" vendor="html2hdml">
        <vers num="1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1276" seq="2004-1276" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">IglooFTP 0.6.1, when recursively uploading a directory, allows local users to overwrite the files that are being uploaded by creating temporary files with names generated by the tmpnam function, before the files are opened by IglooFTP.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/iglooftp.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/iglooftp.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18632">iglooftp-file-overwrites(18632)</ref>
    </refs>
    <vuln_soft>
      <prod name="iglooftp" vendor="iglooftp">
        <vers num="0.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1277" seq="2004-1277" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The download_selection_recursive() function in ftplist.c for IglooFTP 0.6.1 allows remote malicious FTP servers to overwrite arbitrary files via filenames that contain / (slash) characters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/iglooftp2.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/iglooftp2.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18561">iglooftp-file-overwrite(18561)</ref>
    </refs>
    <vuln_soft>
      <prod name="iglooftp" vendor="iglooftp">
        <vers num="0.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1278" seq="2004-1278" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the switch_voice function in parse.c for jcabc2ps 20040902 allows remote attackers to execute arbitrary code via a crafted ABC file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/jcabc2ps.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/jcabc2ps.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18563">jcabc2ps-switchvoice-bo(18563)</ref>
    </refs>
    <vuln_soft>
      <prod name="abc2ps" vendor="abc2ps">
        <vers num="1.2"/>
      </prod>
      <prod name="jcabc2ps" vendor="john_chambers">
        <vers num="2004-09-02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1279" seq="2004-1279" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the get_file_list_stdin function in jpegtoavi 1.5 allows remote attackers to execute arbitrary code via a crafted set of JPEG files and filenames.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/jpegtoavi.txt">http://tigger.uic.edu/~jlongs2/holes/jpegtoavi.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18565">jpegtoavi-getfileliststdin-bo(18565)</ref>
    </refs>
    <vuln_soft>
      <prod name="jpegtoavi" vendor="jpegtoavi">
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1280" seq="2004-1280" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The gui_popup_view_fly function in gui_tview_popup.c for junkie 0.3.1 allows remote malicious FTP servers to execute arbitrary commands via shell metacharacters in a filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/junkie.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/junkie.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18567">junkie-command-execution(18567)</ref>
    </refs>
    <vuln_soft>
      <prod name="junkie_ftp_client" vendor="junkie">
        <vers num="0.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1281" seq="2004-1281" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The ftp_retr function in junkie 0.3.1 allows remote malicious FTP servers to overwrite arbitrary files via .. (dot dot) sequences in a filename.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/junkie.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/junkie.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18568">junkie-ftpretr-command-execution(18568)</ref>
    </refs>
    <vuln_soft>
      <prod name="junkie_ftp_client" vendor="junkie">
        <vers num="0.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1282" seq="2004-1282" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the strexpand function in string.c for LinPopUp 1.2.0 allows remote attackers to execute arbitrary code via a crafted message that is not properly handled during a Reply operation.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/linpopup.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/linpopup.txt</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-632">DSA-632</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18627">linpopup-strexpand-bo(18627)</ref>
    </refs>
    <vuln_soft>
      <prod name="linpopup" vendor="linpopup">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1283" seq="2004-1283" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the Mesh::type method in mesh.c for the mview program in Mesh Viewer 0.2.2 allows remote attackers to execute arbitrary code via crafted mesh files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/meshviewer.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/meshviewer.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18616">mesh-type-bo(18616)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1284" seq="2004-1284" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the find_next_file function in playlist.c for mpg123 0.59r allows remote attackers to execute arbitrary code via a crafted MP3 playlist.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/mpg123.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/mpg123.txt</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_01_sr.html">SUSE-SR:2005:001</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18626">mpg123-findnextfile-bo(18626)</ref>
    </refs>
    <vuln_soft>
      <prod name="mpg123" vendor="mpg123">
        <vers num="0.59m"/>
        <vers num="0.59n"/>
        <vers num="0.59o"/>
        <vers num="0.59p"/>
        <vers num="0.59q"/>
        <vers num="0.59r"/>
        <vers num="pre0.59s"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1285" seq="2004-1285" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the get_header function in asf_mmst_streaming.c for MPlayer 1.0pre5 allows remote attackers to execute arbitrary code via a crafted ASF video stream.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/mplayer.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/mplayer.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18631">mplayer-getdata-bo(18631)</ref>
    </refs>
    <vuln_soft>
      <prod name="mplayer" vendor="mplayer">
        <vers num="0.90"/>
        <vers num="0.91"/>
        <vers num="0.92"/>
        <vers num="0.92.1"/>
        <vers num="1.0_pre1"/>
        <vers num="1.0_pre2"/>
        <vers num="1.0_pre3"/>
        <vers num="1.0_pre3try2"/>
        <vers num="1.0_pre4"/>
        <vers num="1.0_pre5"/>
        <vers num="1.0_pre5try1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1286" seq="2004-1286" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the auto_filter_extern function in auto.c for NapShare 1.2, with the extern filter enabled, allows remote attackers to execute arbitrary code via a crafted gnutella response.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/napshare.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/napshare.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18630">napshare-autofilterextern-bo(18630)</ref>
    </refs>
    <vuln_soft>
      <prod name="napshare" vendor="napshare">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1287" seq="2004-1287" published="2005-01-10" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the error function in preproc.c for NASM 0.98.38 1.2 allows attackers to execute arbitrary code via a crafted asm file, a different vulnerability than CVE-2005-1194.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/nasm.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/nasm.txt</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-381.html">RHSA-2005:381</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18540">nasm-preprocc-bo(18540)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11299">oval:org.mitre.oval:def:11299</ref>
    </refs>
    <vuln_soft>
      <prod name="netwide_assembler" vendor="nasm">
        <vers num="0.98.38"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1288" seq="2004-1288" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the parse_html function in o3read.c for o3read 0.0.3 allows remote attackers to execute arbitrary code via a crafted SXW file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/o3read.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/o3read.txt</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200501-20.xml">GLSA-200501-20</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18547">o3read-parsehtml-bo(18547)</ref>
    </refs>
    <vuln_soft>
      <prod name="o3read" vendor="siag">
        <vers num=".3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1289" seq="2004-1289" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in (1) the getline function in pcalutil.c and (2) the get_holiday function in readfile.c for pcal 4.7.1 allow remote attackers to execute arbitrary code via a crafted calendar file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/pcal.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/pcal.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18552">pcal-getline-pcalutil-bo(18552)</ref>
    </refs>
    <vuln_soft>
      <prod name="pcal" vendor="pcal">
        <vers num="4.1.0"/>
        <vers num="4.3.0"/>
        <vers num="4.5.0"/>
        <vers num="4.6.0"/>
        <vers num="4.7.0"/>
        <vers num="4.7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1290" seq="2004-1290" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the process_moves function in pgn2web.c for pgn2web 0.3 allows remote attackers to execute arbitrary code via a crafted PGN file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/pgn2web.txt">http://tigger.uic.edu/~jlongs2/holes/pgn2web.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18554">pgn2web-pgn2webc-bo(18554)</ref>
    </refs>
    <vuln_soft>
      <prod name="pgn2web" vendor="william_hoggarth">
        <vers num="0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1291" seq="2004-1291" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in qwik-smtpd allows remote attackers to use the server as an SMTP spam relay via a long HELO command, which overwrites the adjacent localIP data buffer.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/qwik-smtpd.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/qwik-smtpd.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18555">qwilmail-smtp-helo-open-relay(18555)</ref>
    </refs>
    <vuln_soft>
      <prod name="qwik_smtpd" vendor="amir_malik">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1292" seq="2004-1292" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the parse_emelody function in parse_emelody.c for ringtonetools 2.22 allows remote attackers to execute arbitrary code via a crafted eMelody file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/ringtonetools.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/ringtonetools.txt</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200503-18.xml">GLSA-200503-18</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18557">ringtonetools-parseemelody-bo(18557)</ref>
    </refs>
    <vuln_soft>
      <prod name="ringtonetools" vendor="michael_kohn">
        <vers num="2.22"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1293" seq="2004-1293" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the ReadFontTbl function in reader.c for rtf2latex2e 1.0fc2 allows remote attackers to execute arbitrary code via a crafted RTF file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/rtf2latex2e.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/rtf2latex2e.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18559">rtf2latex2e-reader-bo(18559)</ref>
    </refs>
    <vuln_soft>
      <prod name="rtf2latex2e" vendor="rtf2latex2e">
        <vers num="1.0_fc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1294" seq="2004-1294" published="2005-01-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The mget function in cmds.c for tnftp 20030825 allows remote FTP servers to overwrite arbitrary files via FTP responses containing file names with / (slash) characters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/tnftp.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/tnftp.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18560">tnftp-mget-cmds-file-overwrite(18560)</ref>
    </refs>
    <vuln_soft>
      <prod name="tnftp" vendor="luke_mewburn">
        <vers num="2003-08-25"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1295" seq="2004-1295" published="2005-01-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The slip_down function in slip.c for the uml_net program in uml-utilities 20030903, when uml_net is installed setuid root, does not verify whether the calling user has sufficient permission to disable an interface, which allows local users to cause a denial of service (network service disabled).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/uml-utilites.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/uml-utilites.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18562">umlutilities-umtnet-slipdown-dos(18562)</ref>
    </refs>
    <vuln_soft>
      <prod name="uml-utilities" vendor="uml-utilities">
        <vers num="2003-09-03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1296" seq="2004-1296" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The (1) eqn2graph and (2) pic2graph scripts in groff 1.18.1 allow local users to overwrite arbitrary files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286371">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286371</ref>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286372">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286372</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110358225615424&amp;w=2">20041220 [USN-43-1] groff utility vulnerabilities</ref>
      <ref source="MANDRIVA" url="http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038">MDKSA-2006:038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18660">groff-eqn2graph-pic2graph-symlink(18660)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1297" seq="2004-1297" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the process_font_table function in convert.c for unrtf 0.19.3 allows remote attackers to execute arbitrary code via a crafted RTF file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/unrtf.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/unrtf.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18566">unrtf-processfonttable-convert-bo(18566)</ref>
    </refs>
    <vuln_soft>
      <prod name="unrtf" vendor="zack_smith">
        <vers num="0.19.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1298" seq="2004-1298" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the parse function in vb2c.c for vb2c 0.02 allows remote attackers to execute arbitrary code via a crafted FRM file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/vb2c.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/vb2c.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18605">vb2c-gettoken-bo(18605)</ref>
    </refs>
    <vuln_soft>
      <prod name="vb2c" vendor="michael_kohn">
        <vers num="0.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1299" seq="2004-1299" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the get_attr function in html.c for vilistextum 2.6.6 allows remote attackers to execute arbitrary code via a crafted web page.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/vilistextum.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/vilistextum.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18610">vilistextum-getattr-bo(18610)</ref>
    </refs>
    <vuln_soft>
      <prod name="vilistextum" vendor="vilistextum">
        <vers num="2.6.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1300" seq="2004-1300" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the open_aiff_file function in demux_aiff.c for xine-lib (libxine) 1-rc7 allows remote attackers to execute arbitrary code via a crafted AIFF file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:011">MDKSA-2005:011</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18611">xine-openaifffile-bo(18611)</ref>
    </refs>
    <vuln_soft>
      <prod name="xine-lib" vendor="xine">
        <vers num="1_rc7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1301" seq="2004-1301" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the book_format_sql function in format.c for xlreader 0.9.0 allows remote attackers to execute arbitrary code via a crafted Excel (XLS) file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/xlreader.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/xlreader.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18612">xlreader-bookformatsql-bo(18612)</ref>
    </refs>
    <vuln_soft>
      <prod name="xlreader" vendor="xlreader">
        <vers num="0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1302" seq="2004-1302" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The id3tag_sort function in id3tag.c for YAMT 0.5 allows remote attackers to execute arbitrary commands via an MP3 file with double quotes in the Artist tag.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://rpmfind.net/linux/RPM/suse/updates/8.2/i386/rpm/i586/yamt-0.5-1277.i586.html">http://rpmfind.net/linux/RPM/suse/updates/8.2/i386/rpm/i586/yamt-0.5-1277.i586.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012583">1012583</ref>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/yamt.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/yamt.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11999">11999</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18614">yamt-id3tagsort-bo(18614)</ref>
    </refs>
    <vuln_soft>
      <prod name="yamt" vendor="yamt">
        <vers num="0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1303" seq="2004-1303" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the get function in get.c for Yanf 0.4 allows remote malicious web servers to execute arbitrary code via crafted HTTP responses.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://tigger.uic.edu/~jlongs2/holes/yanf.txt" adv="1">http://tigger.uic.edu/~jlongs2/holes/yanf.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18615">yanf-get-bo(18615)</ref>
    </refs>
    <vuln_soft>
      <prod name="yanf" vendor="yanf">
        <vers num="0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1304" seq="2004-1304" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the ELF header parsing code in file before 4.12 allows attackers to execute arbitrary code via a crafted ELF file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012433">1012433</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-07.xml">GLSA-200412-07</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11771" adv="1" patch="1">11771</ref>
      <ref source="TRUSTIX" url="http://www.trustix.net/errata/2004/0063/">2004-0063</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18368">file-elf-header-bo(18368)</ref>
    </refs>
    <vuln_soft>
      <prod name="file" vendor="file">
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.4"/>
        <vers num="4.5"/>
        <vers num="4.6"/>
        <vers num="4.7"/>
        <vers num="4.8"/>
        <vers num="4.9"/>
        <vers num="4.10"/>
        <vers num="4.11"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1305" seq="2004-1305" published="2004-12-23" modified="2019-04-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382854111833&amp;w=2">20041223 Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/177584" adv="1" patch="1">VU#177584</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/697136" adv="1" patch="1">VU#697136</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA05-012A.html" adv="1" patch="1">TA05-012A</ref>
      <ref source="MISC" url="http://www.xfocus.net/flashsky/icoExp/" adv="1">http://www.xfocus.net/flashsky/icoExp/</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002">MS05-002</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18667">win-ani-ratenumber-dos(18667)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304">oval:org.mitre.oval:def:1304</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580">oval:org.mitre.oval:def:2580</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216">oval:org.mitre.oval:def:3216</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957">oval:org.mitre.oval:def:3957</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712">oval:org.mitre.oval:def:712</ref>
    </refs>
    <vuln_soft>
      <prod name="ip_softphone_2050" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="media_communication_server_5100" vendor="nortel">
        <vers num="3.0"/>
      </prod>
      <prod name="media_communication_server_5200" vendor="nortel">
        <vers num="3.0"/>
      </prod>
      <prod name="media_processing_server" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="periphonics" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="symposium_agent" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="symposium_network_control_center" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="symposium_tapi_service_provider" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="symposium_web_centre_portal" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="symposium_web_client" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="symposium_call_center_server" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="symposium_express_call_center" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise_64-bit"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="web"/>
      </prod>
      <prod name="windows_98" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
      <prod name="windows_98se" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_me" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition=":enterprise_server"/>
        <vers num="4.0" edition=":server"/>
        <vers num="4.0" edition=":terminal_server"/>
        <vers num="4.0" edition=":workstation"/>
        <vers num="4.0" edition="sp1:enterprise_server"/>
        <vers num="4.0" edition="sp1:server"/>
        <vers num="4.0" edition="sp1:terminal_server"/>
        <vers num="4.0" edition="sp1:workstation"/>
        <vers num="4.0" edition="sp2:enterprise_server"/>
        <vers num="4.0" edition="sp2:server"/>
        <vers num="4.0" edition="sp2:terminal_server"/>
        <vers num="4.0" edition="sp2:workstation"/>
        <vers num="4.0" edition="sp3:enterprise_server"/>
        <vers num="4.0" edition="sp3:server"/>
        <vers num="4.0" edition="sp3:terminal_server"/>
        <vers num="4.0" edition="sp3:workstation"/>
        <vers num="4.0" edition="sp4:enterprise_server"/>
        <vers num="4.0" edition="sp4:server"/>
        <vers num="4.0" edition="sp4:terminal_server"/>
        <vers num="4.0" edition="sp4:workstation"/>
        <vers num="4.0" edition="sp5:enterprise_server"/>
        <vers num="4.0" edition="sp5:server"/>
        <vers num="4.0" edition="sp5:terminal_server"/>
        <vers num="4.0" edition="sp5:workstation"/>
        <vers num="4.0" edition="sp6:enterprise_server"/>
        <vers num="4.0" edition="sp6:server"/>
        <vers num="4.0" edition="sp6:terminal_server"/>
        <vers num="4.0" edition="sp6:workstation"/>
        <vers num="4.0" edition="sp6a:enterprise_server"/>
        <vers num="4.0" edition="sp6a:server"/>
        <vers num="4.0" edition="sp6a:workstation"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":embedded"/>
        <vers num="" edition=":home"/>
        <vers num="" edition=":media_center"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:embedded"/>
        <vers num="" edition="sp1:home"/>
        <vers num="" edition="sp1:media_center"/>
        <vers num="" edition="sp2:tablet_pc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1306" seq="2004-1306" published="2004-12-31" modified="2019-04-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a crafted .hlp file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110383690219440&amp;w=2">20041223 Microsoft Windows winhlp32.exe Heap Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12092">12092</ref>
      <ref source="MISC" url="http://www.xfocus.net/flashsky/icoExp/">http://www.xfocus.net/flashsky/icoExp/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18678">win-winhlp32-bo(18678)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="datacenter_64-bit" edition="sp1_beta_1"/>
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise" edition="sp1_beta_1"/>
        <vers num="enterprise_64-bit" edition="sp1_beta_1"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="r2" edition="sp1_beta_1"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="standard" edition="sp1_beta_1"/>
        <vers num="web" edition="sp1_beta_1"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition=":enterprise_server"/>
        <vers num="4.0" edition=":server"/>
        <vers num="4.0" edition=":terminal_server"/>
        <vers num="4.0" edition=":workstation"/>
        <vers num="4.0" edition="sp1:enterprise_server"/>
        <vers num="4.0" edition="sp1:server"/>
        <vers num="4.0" edition="sp1:terminal_server"/>
        <vers num="4.0" edition="sp1:workstation"/>
        <vers num="4.0" edition="sp2:enterprise_server"/>
        <vers num="4.0" edition="sp2:server"/>
        <vers num="4.0" edition="sp2:terminal_server"/>
        <vers num="4.0" edition="sp2:workstation"/>
        <vers num="4.0" edition="sp3:enterprise_server"/>
        <vers num="4.0" edition="sp3:server"/>
        <vers num="4.0" edition="sp3:terminal_server"/>
        <vers num="4.0" edition="sp3:workstation"/>
        <vers num="4.0" edition="sp4:enterprise_server"/>
        <vers num="4.0" edition="sp4:server"/>
        <vers num="4.0" edition="sp4:terminal_server"/>
        <vers num="4.0" edition="sp4:workstation"/>
        <vers num="4.0" edition="sp5:enterprise_server"/>
        <vers num="4.0" edition="sp5:server"/>
        <vers num="4.0" edition="sp5:terminal_server"/>
        <vers num="4.0" edition="sp5:workstation"/>
        <vers num="4.0" edition="sp6:enterprise_server"/>
        <vers num="4.0" edition="sp6:server"/>
        <vers num="4.0" edition="sp6:terminal_server"/>
        <vers num="4.0" edition="sp6:workstation"/>
        <vers num="4.0" edition="sp6a:enterprise_server"/>
        <vers num="4.0" edition="sp6a:server"/>
        <vers num="4.0" edition="sp6a:terminal_server"/>
        <vers num="4.0" edition="sp6a:workstation"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":home"/>
        <vers num="" edition=":media_center"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:home"/>
        <vers num="" edition="sp1:media_center"/>
        <vers num="" edition="sp2:home"/>
        <vers num="" edition="sp2:media_center"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1307" seq="2004-1307" published="2004-12-21" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/May/msg00001.html" adv="1" patch="1">APPLE-SA-2005-05-03</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1">101677</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1">201072</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=173&amp;type=vulnerabilities&amp;flashstatus=true" adv="1" patch="1">20041221 libtiff STRIPOFFSETS Integer Overflow Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/539110" adv="1" patch="1">VU#539110</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA05-136A.html">TA05-136A</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11175">oval:org.mitre.oval:def:11175</ref>
    </refs>
    <vuln_soft>
      <prod name="call_management_system_server" vendor="avaya">
        <vers num="8.0"/>
        <vers num="9.0"/>
        <vers num="11.0"/>
        <vers num="12.0"/>
        <vers num="13.0"/>
      </prod>
      <prod name="cvlan" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="integrated_management" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="interactive_response" vendor="avaya">
        <vers num="1.2.1"/>
        <vers num="1.3"/>
      </prod>
      <prod name="intuity_audix_lx" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="mn100" vendor="avaya">
        <vers num=""/>
      </prod>
      <prod name="icontrol_service_manager" vendor="f5">
        <vers num="1.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
        <vers num="1.3.6"/>
      </prod>
      <prod name="libtiff" vendor="libtiff">
        <vers num="3.4"/>
        <vers num="3.5.1"/>
        <vers num="3.5.2"/>
        <vers num="3.5.3"/>
        <vers num="3.5.4"/>
        <vers num="3.5.5"/>
        <vers num="3.5.7"/>
        <vers num="3.6.0"/>
        <vers num="3.6.1"/>
        <vers num="3.7.0"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="3.0"/>
      </prod>
      <prod name="mac_os_x" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
        <vers num="10.3.7"/>
        <vers num="10.3.8"/>
        <vers num="10.3.9"/>
      </prod>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.3"/>
        <vers num="10.3.1"/>
        <vers num="10.3.2"/>
        <vers num="10.3.3"/>
        <vers num="10.3.4"/>
        <vers num="10.3.5"/>
        <vers num="10.3.6"/>
        <vers num="10.3.7"/>
        <vers num="10.3.8"/>
        <vers num="10.3.9"/>
      </prod>
      <prod name="modular_messaging_message_storage_server" vendor="avaya">
        <vers num="1.1"/>
        <vers num="2.0"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="9.0"/>
        <vers num="10.0"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="10.0" edition=":amd64"/>
        <vers num="10.1" edition=":x86_64"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="3.0" edition=":x86_64"/>
      </prod>
      <prod name="unixware" vendor="sco">
        <vers num="7.1.4"/>
      </prod>
      <prod name="solaris" vendor="sun">
        <vers num="7.0" edition=":x86"/>
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
        <vers num="9.0" edition="x86_update_2"/>
        <vers num="10.0" edition=":sparc"/>
        <vers num="10.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.7"/>
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1308" seq="2004-1308" published="2005-01-10" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in (1) tif_dirread.c and (2) tif_fax3.c for libtiff 3.5.7 and 3.7.0 allows remote attackers to execute arbitrary code via a TIFF file containing a TIFF_ASCII or TIFF_UNDEFINED directory entry with a -1 entry count, which leads to a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000920">CLA-2005:920</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/May/msg00001.html">APPLE-SA-2005-05-03</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1">101677</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1">201072</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2004/dsa-617">DSA-617</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=174&amp;type=vulnerabilities" adv="1" patch="1">20041221 libtiff Directory Entry Count Integer Overflow Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/125598">VU#125598</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:052">MDKSA-2005:052</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_01_libtiff_tiff.html">SUSE-SA:2005:001</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-019.html">RHSA-2005:019</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-035.html">RHSA-2005:035</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA05-136A.html">TA05-136A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18637">libtiff-tiff-tdircount-bo(18637)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100117">oval:org.mitre.oval:def:100117</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9392">oval:org.mitre.oval:def:9392</ref>
    </refs>
    <vuln_soft>
      <prod name="libtiff" vendor="libtiff">
        <vers num="3.4"/>
        <vers num="3.5.1"/>
        <vers num="3.5.2"/>
        <vers num="3.5.3"/>
        <vers num="3.5.4"/>
        <vers num="3.5.5"/>
        <vers num="3.5.7"/>
        <vers num="3.6.0"/>
        <vers num="3.6.1"/>
        <vers num="3.7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1309" seq="2004-1309" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the demux_open_bmp function in demux_bmp.c for Unix MPlayer 1.0pre5 allows remote attackers to execute arbitrary code via a bitmap (BMP) file containing a large biClrUsed field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=168" adv="1">20041216 MPlayer Bitmap Parsing Remote Heap Overflow Vulnerability</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:157">MDKSA-2004:157</ref>
      <ref source="CONFIRM" url="http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog">http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18527">mplayer-bitmap-bo(18527)</ref>
    </refs>
    <vuln_soft>
      <prod name="unix_mplayer" vendor="mplayer">
        <vers num="1.0_pre5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1310" seq="2004-1310" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the asf_mmst_streaming.c functionality for MPlayer 1.0pre5 allows remote attackers to execute arbitrary code via a large MMST stream packet.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=167" adv="1">20041216 MPlayer MMST Streaming Stack Overflow Vulnerability</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:157">MDKSA-2004:157</ref>
      <ref source="CONFIRM" url="http://www1.mplayerhq.hu/MPlayer/patches/mmst_fix_20041215.diff">http://www1.mplayerhq.hu/MPlayer/patches/mmst_fix_20041215.diff</ref>
      <ref source="CONFIRM" url="http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog">http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18526">mplayer-mmst-bo(18526)</ref>
    </refs>
    <vuln_soft>
      <prod name="mplayer" vendor="mplayer">
        <vers num="1.0_pre5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1311" seq="2004-1311" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the real_setup_and_get_header function in real.c for Unix MPlayer 1.0pre5 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a Real RTSP streaming media file with a -1 content-length field, which leads to a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=166" adv="1">20041216 MPlayer Remote RTSP Heap Overflow Vulnerability</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:157">MDKSA-2004:157</ref>
      <ref source="CONFIRM" url="http://www1.mplayerhq.hu/MPlayer/patches/rtsp_fix_20041215.diff">http://www1.mplayerhq.hu/MPlayer/patches/rtsp_fix_20041215.diff</ref>
      <ref source="CONFIRM" url="http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog">http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18525">mplayer-rtsp-bo(18525)</ref>
    </refs>
    <vuln_soft>
      <prod name="mplayer" vendor="mplayer">
        <vers num="1.0_pre5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1312" seq="2004-1312" published="2005-01-03" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">A bug in the HTML parser in a certain Microsoft HTML library, as used in various third party products, may allow remote attackers to cause a denial of service via certain strings, as reported in GFI MailEssentials for Exchange 9 and 10, and GFI MailSecurity for Exchange 8, which causes emails to remain in IIS or Exchange mail queues.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://kbase.gfi.com/showarticle.asp?id=KBID002249" adv="1" patch="1">http://kbase.gfi.com/showarticle.asp?id=KBID002249</ref>
      <ref source="MISC" url="http://www.csis.dk/default.asp?m=1&amp;a=194" adv="1">http://www.csis.dk/default.asp?m=1&amp;a=194</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12148">12148</ref>
    </refs>
    <vuln_soft>
      <prod name="mailessentials" vendor="gfi">
        <vers num="9.0" edition=":exchange_smtp"/>
        <vers num="10.0" edition=":exchange_smtp"/>
        <vers num="10.1" edition=":exchange_smtp"/>
      </prod>
      <prod name="mailsecurity" vendor="gfi">
        <vers num="8.0" edition=":exchange_smtp"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1313" seq="2004-1313" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Smc.exe process in My Firewall Plus 5.0 build 1117, and possibly other versions, does not drop privileges before invoking help, which allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18622">my-firewall-plus-gain-privileges(18622)</ref>
    </refs>
    <vuln_soft>
      <prod name="my_firewall_plus" vendor="webroot_software">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1314" seq="2004-1314" published="2005-01-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Safari 1.x allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability, a different vulnerability than CVE-2004-1122.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html">APPLE-SA-2005-01-25</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18397">web-browser-popup-spoofing(18397)</ref>
    </refs>
    <vuln_soft>
      <prod name="safari" vendor="apple">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="beta2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1315" seq="2004-1315" published="2004-11-12" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">viewtopic.php in phpBB 2.x before 2.0.11 improperly URL decodes the highlight parameter when extracting words and phrases to highlight, which allows remote attackers to execute arbitrary PHP code by double-encoding the highlight value so that special characters are inserted into the result, which is then processed by PHP exec, as exploited by the Santy.A worm.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110029415208724&amp;w=2">20041112 phpBB Code EXEC (v2.0.10)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110365752909029&amp;w=2">20041220 phpBB Worm</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?t=110079440800004&amp;r=1&amp;w=2">20041118 EXEC exploit in phpBB - fix</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/497400" adv="1" patch="1">VU#497400</ref>
      <ref source="CONFIRM" url="http://www.phpbb.com/phpBB/viewtopic.php?t=240513" adv="1">http://www.phpbb.com/phpBB/viewtopic.php?t=240513</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/385208">20041222 Re: phpBB Worm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10701">10701</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-356A.html" adv="1" patch="1">TA04-356A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18052">phpbb-view-sql-injection(18052)</ref>
      <ref source="GENTOO" url="https://security.gentoo.org/glsa/200411-32">GLSA-200411-32</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb_group">
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.4.0"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.4"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.6c"/>
        <vers num="2.0.6d"/>
        <vers num="2.0.7"/>
        <vers num="2.0.7a"/>
        <vers num="2.0.8"/>
        <vers num="2.0.8a"/>
        <vers num="2.0.9"/>
        <vers num="2.0.10"/>
        <vers num="2.0_beta1"/>
        <vers num="2.0_rc1"/>
        <vers num="2.0_rc2"/>
        <vers num="2.0_rc3"/>
        <vers num="2.0_rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1316" seq="2004-1316" published="2004-12-29" modified="2018-05-02" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://isec.pl/vulnerabilities/isec-0020-mozilla.txt" adv="1">http://isec.pl/vulnerabilities/isec-0020-mozilla.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110436284718949&amp;w=2">20041229 Heap overflow in Mozilla Browser &lt;= 1.7.3 NNTP code.</ref>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=110780717916478&amp;w=2">HPSBTU01114</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/mfsa2005-06.html" adv="1" patch="1">http://www.mozilla.org/security/announce/mfsa2005-06.html</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2006_04_25.html">SUSE-SA:2006:004</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-038.html" adv="1">RHSA-2005:038</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12131">12131</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18711">mozilla-nntp-bo(18711)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100052">oval:org.mitre.oval:def:100052</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9808">oval:org.mitre.oval:def:9808</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.3"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4.1"/>
        <vers num="1.5" edition="alpha"/>
        <vers num="1.5" edition="rc1"/>
        <vers num="1.5" edition="rc2"/>
        <vers num="1.5.1"/>
        <vers num="1.6" edition="alpha"/>
        <vers num="1.6" edition="beta"/>
        <vers num="1.7" edition="alpha"/>
        <vers num="1.7" edition="beta"/>
        <vers num="1.7" edition="rc1"/>
        <vers num="1.7" edition="rc2"/>
        <vers num="1.7" edition="rc3"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="1.7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1317" seq="2004-1317" published="2004-12-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in doexec.c in Netcat for Windows 1.1, when running with the -e option, allows remote attackers to execute arbitrary code via a long DNS command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110425875504586&amp;w=2">20041227 [HAT-SQUAD] NetCat Remote Critical Vulnerability, Poc included</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110426936423890&amp;w=2">20041228 Netcat v1.11 For Windows , New fixed version</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110429204712327&amp;w=2">20041228 Re: [HAT-SQUAD] NetCat Remote Critical Vulnerability, Poc included</ref>
      <ref source="MISC" url="http://www.hat-squad.com/en/000142.html" adv="1">http://www.hat-squad.com/en/000142.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18681">netcat-doexec-bo(18681)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1318" seq="2004-1318" published="2005-01-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in namazu.cgi for Namazu 2.0.13 and earlier allows remote attackers to inject arbitrary HTML and web script via a query that starts with a tab ("%09") character, which prevents the rest of the query from being properly sanitized.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://jvn.jp/jp/JVN%23904429FE.html" adv="1">http://jvn.jp/jp/JVN%23904429FE.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2005/Jan/1012802.html">1012802</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2005/Jan/1012805.html">1012805</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-627" adv="1">DSA-627</ref>
      <ref source="FEDORA" url="http://www.linuxsecurity.com/content/view/117604/102/">FEDORA-2004-557</ref>
      <ref source="CONFIRM" url="http://www.namazu.org/security.html.en#xss-tab" adv="1" patch="1">http://www.namazu.org/security.html.en#xss-tab</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_01_sr.html">SUSE-SR:2005:001</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/9028">HPSBMA01212</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12053">12053</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18623">namazu-tab-query-xss(18623)</ref>
    </refs>
    <vuln_soft>
      <prod name="namazu" vendor="namazu">
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.13"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1319" seq="2004-1319" published="2004-12-15" modified="2019-04-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by "AbusiveParent" in Internet Explorer 6.0.2900.2180.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-12/0167.html" adv="1">20041215 MSIE DHTML Edit Control Cross Site Scripting Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/356600" adv="1" patch="1">VU#356600</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11950" adv="1" patch="1">11950</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA05-039A.html" adv="1" patch="1">TA05-039A</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-013">MS05-013</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18504">ie-dhtml-xss(18504)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1114">oval:org.mitre.oval:def:1114</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1701">oval:org.mitre.oval:def:1701</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3464">oval:org.mitre.oval:def:3464</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3851">oval:org.mitre.oval:def:3851</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4758">oval:org.mitre.oval:def:4758</ref>
    </refs>
    <vuln_soft>
      <prod name="ip_softphone_2050" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="mobile_voice_client_2050" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="optivity_telephony_manager" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise_64-bit"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="web"/>
      </prod>
      <prod name="windows_98" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
      <prod name="windows_98se" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_me" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":home"/>
        <vers num="" edition=":media_center"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:home"/>
        <vers num="" edition="sp1:media_center"/>
        <vers num="" edition="sp2:home"/>
        <vers num="" edition="sp2:media_center"/>
        <vers num="" edition="sp2:tablet_pc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1320" seq="2004-1320" published="2004-12-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Asante FM2008 running firmware 1.06 is shipped with a default username and password, which could allow remote attackers to gain unauthorized access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110312733624864&amp;w=2">20041215 Asante FM2008 10/100 Ethernet switch backdoor login</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11947" adv="1">11947</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18521">asante-fm2008-default-account(18521)</ref>
    </refs>
    <vuln_soft>
      <prod name="fm2008_managed_ethernet_switch" vendor="asante">
        <vers num="1.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1321" seq="2004-1321" published="2004-12-15" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The configuration backup in Asante FM2008 running firmware 1.06 stores the username and password in cleartext, which could allow remote attackers to gain unauthorized access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110312733624864&amp;w=2">20041215 Asante FM2008 10/100 Ethernet switch backdoor login</ref>
    </refs>
    <vuln_soft>
      <prod name="fm2008_managed_ethernet_switch" vendor="asante">
        <vers num="1.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1322" seq="2004-1322" published="2004-12-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cisco Unity 2.x, 3.x, and 4.x, when integrated with Microsoft Exchange, has several hard coded usernames and passwords, which allows remote attackers to gain unauthorized access and change configuration settings or read outgoing or incoming e-mail messages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-060.shtml" adv="1" patch="1">P-060</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20041215-unity.shtml" adv="1" patch="1">20041215 Cisco Unity Integrated with Exchange Has Default Passwords</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11954" adv="1" patch="1">11954</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18489">cisco-unity-exchange-default-accounts(18489)</ref>
    </refs>
    <vuln_soft>
      <prod name="unity_server" vendor="cisco">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="2.46"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1323" seq="2004-1323" published="2004-12-16" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple syscalls in the compat subsystem for NetBSD before 2.0 allow local users to cause a denial of service (kernel crash) via a large signal number to (1) xxx_sys_kill, (2) xxx_sys_sigaction, and possibly other translation functions.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://gleg.net/advisory_netbsd2.shtml" adv="1" patch="1">http://gleg.net/advisory_netbsd2.shtml</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18564">netbsd-compat-gain-privileges(18564)</ref>
    </refs>
    <vuln_soft>
      <prod name="netbsd" vendor="netbsd">
        <vers num="1.5"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3"/>
        <vers num="1.6"/>
        <vers num="1.6.1"/>
        <vers num="1.6.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1324" seq="2004-1324" published="2004-12-18" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The Microsoft Windows Media Player 9.0 ActiveX control may allow remote attackers to execute arbitrary web script in the Local computer zone via the (1) artist or (2) song fields of a music file, if the file is processed using Internet Explorer.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110352518211306&amp;w=2">20041218 MS Windows Media Player 9 Vulns (2)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12031" adv="1" patch="1">12031</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18576">mediaplayer-mp3-code-execution(18576)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_media_player" vendor="microsoft">
        <vers num="9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1325" seq="2004-1325" published="2004-12-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The getItemInfoByAtom function in the ActiveX control for Microsoft Windows Media Player 9.0 returns a 0 if the file does not exist and the size of the file if the file exists, which allows remote attackers to determine the existence of files on the local system.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110352518211306&amp;w=2">20041218 MS Windows Media Player 9 Vulns (2)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12032" adv="1" patch="1">12032</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18587">mediaplayer-activex-information-disclosure(18587)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_media_player" vendor="microsoft">
        <vers num="9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1326" seq="2004-1326" published="2004-12-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in dxterm in Ultrix 4.5 allows local users to execute arbitrary code via a long -setup parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110356470029424&amp;w=2">20041219 Exploit for Ultrix 4.5 dxterm</ref>
      <ref source="MISC" url="http://www.frsirt.com/exploits/20041220.ultrix_dxterm_4.5_exploit.c.php" adv="1">http://www.frsirt.com/exploits/20041220.ultrix_dxterm_4.5_exploit.c.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12049" adv="1">12049</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18613">ultrix-dxterm-bo(18613)</ref>
    </refs>
    <vuln_soft>
      <prod name="dxterm" vendor="ultrix">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1327" seq="2004-1327" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Crystal FTP Client 2.8 allows remote malicious servers to execute arbitrary code via a response to a LIST command that contains a file name with a long extension.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110356203624337&amp;w=2">20041220 Crystal FTP Pro Client Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12038">12038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18594">crystal-ftp-list-bo(18594)</ref>
    </refs>
    <vuln_soft>
      <prod name="crystal_ftp" vendor="crystal_art_software">
        <vers num="2.4"/>
        <vers num="2.5"/>
        <vers num="2.6"/>
        <vers num="2.7"/>
        <vers num="2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1328" seq="2004-1328" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in newgrp in HP-UX B.11.00, B.11.04, and B.11.11 allows local users to gain elevated privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=110355911415320&amp;w=2">SSRT4687</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12029" patch="1">12029</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18577">hp-newgrp-gain-privileges(18577)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5622">oval:org.mitre.oval:def:5622</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.00"/>
        <vers num="11.4"/>
        <vers num="11.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1329" seq="2004-1329" published="2004-12-20" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Untrusted execution path vulnerability in the diag commands (1) lsmcode, (2) diag_exec, (3) invscout, and (4) invscoutd in AIX 5.1 through 5.3 allows local users to execute arbitrary programs by modifying the DIAGNOSTICS environment variable to point to a malicious Dctrl program.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110355931920123&amp;w=2">20041220 AIX 5.1/5.2/5.3 local root exploits</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/464276/100/0/threaded">20070330 AIX 4.3 lsmcode local root command execution</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/464481/100/0/threaded">20070402 Re: AIX 4.3 lsmcode local root command execution</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12041" adv="1" patch="1">12041</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IY64277&amp;apar=only" adv="1" patch="1">IY64277</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IY64389&amp;apar=only" adv="1" patch="1">IY64389</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18620">aix-diagnostics-gain-privileges(18620)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/701">701</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.1"/>
        <vers num="5.1l"/>
        <vers num="5.2"/>
        <vers num="5.2.2"/>
        <vers num="5.2_l"/>
        <vers num="5.3"/>
        <vers num="5.3_l"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1330" seq="2004-1330" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in paginit in AIX 5.1 through 5.3 allows local users to execute arbitrary code via a long username.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110355931920123&amp;w=2">20041220 AIX 5.1/5.2/5.3 local root exploits</ref>
      <ref source="MISC" url="http://www.frsirt.com/exploits/20041220.paginit.c.php">http://www.frsirt.com/exploits/20041220.paginit.c.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12043" patch="1">12043</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IY64312&amp;apar=only" adv="1">IY64312</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IY64358&amp;apar=only" adv="1">IY64358</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IY64522&amp;apar=only" adv="1">IY64522</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18618">aix-paginit-username-bo(18618)</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="5.2"/>
        <vers num="5.2.2"/>
        <vers num="5.2_l"/>
        <vers num="5.3"/>
        <vers num="5.3_l"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1331" seq="2004-1331" published="2004-11-16" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The execCommand method in Microsoft Internet Explorer 6.0 SP2 allows remote attackers to bypass the "File Download - Security Warning" dialog and save arbitrary files with arbitrary extensions via the SaveAs command.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-11/0260.html" adv="1">20041119 Microsoft Internet Explorer 6 SP2 Vulnerabilities / Full disclosure Vs. Security by Obscurity...</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3220">3220</ref>
      <ref source="MISC" url="http://www.frsirt.com/exploits/20041119.IESP2Unpatched.php" adv="1">http://www.frsirt.com/exploits/20041119.IESP2Unpatched.php</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/743974" adv="1">VU#743974</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11686" adv="1">11686</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18181">ie-execommand-warning-bypass(18181)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1332" seq="2004-1332" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote attackers to execute arbitrary code via a long command request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=110797179710695&amp;w=2">HPSBUX01118</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012650">1012650</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=175&amp;type=vulnerabilities&amp;flashstatus=false">20041221 Hewlett Packard HP-UX ftpd Remote Buffer Overflow Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/647438" adv="1" patch="1">VU#647438</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12077" patch="1">12077</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18636">hp-ftpd-bo(18636)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701">oval:org.mitre.oval:def:5701</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="10.01"/>
        <vers num="10.10"/>
        <vers num="10.20"/>
        <vers num="10.24"/>
        <vers num="11.00"/>
        <vers num="11.4"/>
        <vers num="11.11"/>
        <vers num="11.11i"/>
        <vers num="11.22"/>
        <vers num="11.23"/>
      </prod>
      <prod name="hp-ux_series_700" vendor="hp">
        <vers num="10.20"/>
      </prod>
      <prod name="hp-ux_series_800" vendor="hp">
        <vers num="10.20"/>
      </prod>
      <prod name="sis" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="vvos" vendor="hp">
        <vers num="10.24"/>
        <vers num="11.04"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1333" seq="2004-1333" published="2004-12-15" modified="2018-10-03" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="MISC" url="http://www.guninski.com/where_do_you_want_billg_to_go_today_2.html" adv="1" patch="1">http://www.guninski.com/where_do_you_want_billg_to_go_today_2.html</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:218">MDKSA-2005:218</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:219">MDKSA-2005:219</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_18_kernel.html" adv="1" patch="1">SUSE-SA:2005:018</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11956" adv="1" patch="1">11956</ref>
      <ref source="FEDORA" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532" adv="1" patch="1">FLSA:152532</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18523">linux-vcresize-dos(18523)</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/47-1/">USN-47-1</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.4.28"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="7.3" edition=":i386"/>
        <vers num="7.3" edition=":i686"/>
        <vers num="9.0" edition=":i386"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1334" seq="2004-1334" published="2004-12-15" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (kernel crash) via a cmsg_len that contains a -1, which leads to a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110383108211524&amp;w=2">20041215 [USN-47-1] Linux kernel vulnerabilities</ref>
      <ref source="MISC" url="http://www.guninski.com/where_do_you_want_billg_to_go_today_2.html" adv="1" patch="1">http://www.guninski.com/where_do_you_want_billg_to_go_today_2.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11956" adv="1" patch="1">11956</ref>
      <ref source="FULLDISC" url="http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0323.html" adv="1" patch="1">20041215 fun with linux kernel</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18522">linux-ipoptionsget-dos(18522)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1335" seq="2004-1335" published="2004-12-15" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110383108211524&amp;w=2">20041215 [USN-47-1] Linux kernel vulnerabilities</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1067">DSA-1067</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1069">DSA-1069</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1070">DSA-1070</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1082">DSA-1082</ref>
      <ref source="MISC" url="http://www.guninski.com/where_do_you_want_billg_to_go_today_2.html" adv="1" patch="1">http://www.guninski.com/where_do_you_want_billg_to_go_today_2.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-016.html">RHSA-2005:016</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-017.html">RHSA-2005:017</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11956" adv="1" patch="1">11956</ref>
      <ref source="FULLDISC" url="http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0323.html" adv="1" patch="1">20041215 fun with linux kernel</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18524">linux-ipoptionsget-memory-leak(18524)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11085">oval:org.mitre.oval:def:11085</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.4.28"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
        <vers num="core_2.0"/>
        <vers num="core_3.0"/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="7.3" edition=":i386"/>
        <vers num="7.3" edition=":i686"/>
        <vers num="9.0" edition=":i386"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1336" seq="2004-1336" published="2004-12-23" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The xdvizilla script in tetex-bin 2.0.2 creates temporary files with predictable file names, which allows local users to overwrite arbitrary files via a symlink attack.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286370" adv="1">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286370</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110383942014839&amp;w=2">20041223 [USN-51-1] teTeX auxiliary script vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12100" adv="1" patch="1">12100</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18708">xdvizilla-symlink(18708)</ref>
    </refs>
    <vuln_soft>
      <prod name="tetex-bin" vendor="debian">
        <vers num="2.0.2"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1337" seq="2004-1337" published="2004-12-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/index.php?id=a&amp;anuncio=000930" adv="1">CLA-2005:930</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110384535113035&amp;w=2">20041223 Linux 2.6  Kernel Capability LSM Module Local Privilege Elevation</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12093" adv="1" patch="1">12093</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18673">linux-security-module-gain-privileges(18673)</ref>
    </refs>
    <vuln_soft>
      <prod name="realtime_linux_security_module" vendor="gnu">
        <vers num="0.8.7"/>
      </prod>
      <prod name="linux" vendor="conectiva">
        <vers num="10.0"/>
      </prod>
      <prod name="ubuntu_linux" vendor="ubuntu">
        <vers num="4.1" edition=":ia64"/>
        <vers num="4.1" edition=":ppc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1338" seq="2004-1338" published="2004-12-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The triggers in Oracle 9i and 10g allow local users to gain privileges by using a sequence of partially privileged actions: using CCBKAPPLROWTRIG or EXEC_CBK_FN_DML to add arbitrary functions to the SDO_CMT_DBK_FN_TABLE and SDO_CMT_CBK_DML_TABLE, then performing a DELETE on the SDO_TXN_IDX_INSERTS table, which causes the SDO_CMT_CBK_TRIG trigger to execute the user-supplied functions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382230614420&amp;w=2" adv="1">20041223 Oracle Trigger Abuse (#NISR2122004I)</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/oracle23122004I.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/oracle23122004I.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18655">oracle-triggers-gain-privileges(18655)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_server" vendor="oracle">
        <vers num="10.2.1" edition="r2"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="9.0"/>
        <vers num="9.0.1"/>
        <vers num="9.0.1.2"/>
        <vers num="9.0.1.3"/>
        <vers num="9.0.1.4"/>
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.2.0.1"/>
        <vers num="9.2.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1339" seq="2004-1339" published="2004-12-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the (1) MDSYS.SDO_GEOM_TRIG_INS1 and (2) MDSYS.SDO_LRS_TRIG_INS default triggers in Oracle 9i and 10g allows remote attackers to execute arbitrary SQL commands via the new.table_name or new.column_name parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382230614420&amp;w=2">20041223 Oracle Trigger Abuse (#NISR2122004I)</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/oracle23122004I.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/oracle23122004I.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18655">oracle-triggers-gain-privileges(18655)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_server" vendor="oracle">
        <vers num="10.2.1" edition="r2"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="9.0"/>
        <vers num="9.0.1"/>
        <vers num="9.0.1.2"/>
        <vers num="9.0.1.3"/>
        <vers num="9.0.1.4"/>
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.2.0.1"/>
        <vers num="9.2.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1340" seq="2004-1340" published="2005-01-26" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Debian GNU/Linux 3.0 installs the libpam-radius-auth package with the pam_radius_auth.conf set to be world-readable, which allows local users to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1013030">1013030</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-659" adv="1" patch="1">DSA-659</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19087">libpamradiusauth-insecure-permission(19087)</ref>
    </refs>
    <vuln_soft>
      <prod name="debian_linux" vendor="debian">
        <vers num="3.0" edition=":alpha"/>
        <vers num="3.0" edition=":arm"/>
        <vers num="3.0" edition=":hppa"/>
        <vers num="3.0" edition=":ia-32"/>
        <vers num="3.0" edition=":ia-64"/>
        <vers num="3.0" edition=":m68k"/>
        <vers num="3.0" edition=":mips"/>
        <vers num="3.0" edition=":mipsel"/>
        <vers num="3.0" edition=":ppc"/>
        <vers num="3.0" edition=":s-390"/>
        <vers num="3.0" edition=":sparc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1341" seq="2004-1341" published="2005-04-19" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in info2www before 1.2.2.9 allows remote attackers to inject arbitrary web script or HTML via the arguments to info2www.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-711" adv="1" patch="1">DSA-711</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/20179">info2www-url-xss(20179)</ref>
    </refs>
    <vuln_soft>
      <prod name="info2www" vendor="roar_smith">
        <vers num="1.2.2_.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1342" seq="2004-1342" published="2005-04-27" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">CVS 1.12 and earlier on Debian GNU/Linux, when using the repouid patch, allows remote attackers to bypass authentication via the pserver access method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-715" adv="1" patch="1">DSA-715</ref>
    </refs>
    <vuln_soft>
      <prod name="cvs" vendor="cvs">
        <vers num="1.10"/>
        <vers num="1.10.6"/>
        <vers num="1.10.7"/>
        <vers num="1.10.8"/>
        <vers num="1.11"/>
        <vers num="1.11.1"/>
        <vers num="1.11.1_p1"/>
        <vers num="1.11.2"/>
        <vers num="1.11.3"/>
        <vers num="1.11.4"/>
        <vers num="1.11.5"/>
        <vers num="1.11.6"/>
        <vers num="1.11.10"/>
        <vers num="1.11.11"/>
        <vers num="1.11.14"/>
        <vers num="1.11.15"/>
        <vers num="1.11.16"/>
        <vers num="1.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1343" seq="2004-1343" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">CVS 1.12 and earlier on Debian GNU/Linux does not properly handle when a mapping for the current repository does not exist in the cvs-repouids file, which allows remote attackers to cause a denial of service (server crash).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-715" adv="1" patch="1">DSA-715</ref>
    </refs>
    <vuln_soft>
      <prod name="cvs" vendor="cvs">
        <vers num="1.10"/>
        <vers num="1.10.6"/>
        <vers num="1.10.7"/>
        <vers num="1.10.8"/>
        <vers num="1.11"/>
        <vers num="1.11.1"/>
        <vers num="1.11.1_p1"/>
        <vers num="1.11.2"/>
        <vers num="1.11.3"/>
        <vers num="1.11.4"/>
        <vers num="1.11.5"/>
        <vers num="1.11.6"/>
        <vers num="1.11.10"/>
        <vers num="1.11.11"/>
        <vers num="1.11.14"/>
        <vers num="1.11.15"/>
        <vers num="1.11.16"/>
        <vers num="1.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1344" seq="2004-1344" published="2017-05-11" modified="2017-05-11" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-1345" seq="2004-1345" published="2004-06-21" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Sun StorEdge Enterprise Storage Manager (ESM) 2.1 for Solaris 8 and Solaris 9 allows local users with the "ESMUser" role to gain root access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57581-1&amp;searchclause=security" adv="1" patch="1">57581</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-166.shtml" adv="1" patch="1">O-166</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/976470" adv="1" patch="1">VU#976470</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10580" adv="1" patch="1">10580</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16463">esm-esmuser-gain-privileges(16463)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1707">oval:org.mitre.oval:def:1707</ref>
    </refs>
    <vuln_soft>
      <prod name="enterprise_storage_manager" vendor="sun">
        <vers num="2.1"/>
      </prod>
      <prod name="storedge_3310_scsi_array" vendor="sun">
        <vers num=""/>
      </prod>
      <prod name="storedge_3510_fc_array" vendor="sun">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1346" seq="2004-1346" published="2004-06-19" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Sun Solaris Volume Manager (SVM) on Solaris 9 allows local users to cause a denial of service (kernel panic) via a malformed probe request to the SVM.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57598-1&amp;searchclause=security" adv="1" patch="1">57598</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4253" adv="1" patch="1">ESB-2004.0463</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/390742" adv="1" patch="1">VU#390742</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10747" adv="1" patch="1">10747</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16729">solaris-svm-dos(16729)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3465">oval:org.mitre.oval:def:3465</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1347" seq="2004-1347" published="2004-08-10" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">X Display Manager (XDM) on Solaris 8 allows remote attackers to cause a denial of service (XDM crash) via an invalid X Display Manager Control Protocol (XDMCP) request.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101549-1">101549</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57619-1&amp;searchclause=security" adv="1" patch="1">57619</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/139504" adv="1" patch="1">VU#139504</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10911" adv="1" patch="1">10911</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16940">xdm-xdmcp-dos(16940)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100113">oval:org.mitre.oval:def:100113</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1348" seq="2004-1348" published="2004-09-06" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in in.named on Solaris 8 allows remote attackers to cause a denial of service (process crash).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57614-1" adv="1" patch="1">57614</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4369" adv="1" patch="1">ESB-2004.0565</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11118" adv="1" patch="1">11118</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17269">solaris-innamed-dynamic-dos(17269)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3960">oval:org.mitre.oval:def:3960</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="8.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1349" seq="2004-1349" published="2004-10-04" modified="2018-10-30" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57600-1&amp;searchclause=security" adv="1" patch="1">57600</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/635998" adv="1" patch="1">VU#635998</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11318" adv="1" patch="1">11318</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17577">solaris-gzip-modify-privileges(17577)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1654">oval:org.mitre.oval:def:1654</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1350" seq="2004-1350" published="2004-10-30" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Sun Java System Web Proxy Server (formerly Sun ONE Proxy Server) 3.6 through 3.6 SP4 allow remote attackers to execute arbitrary code via unknown vectors, possibly CONNECT requests.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012005" adv="1" patch="1">1012005</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1&amp;searchclause=security">57606</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4516">ESB-2004.0691</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-027.shtml">P-027</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/964401">VU#964401</ref>
      <ref source="MISC" url="http://www.pentest.co.uk/documents/ptl-2004-06.html">http://www.pentest.co.uk/documents/ptl-2004-06.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11566" adv="1" patch="1">11566</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17920">sun-web-proxy-bo(17920)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_system_web_proxy_server" vendor="sun">
        <vers num="3.6" edition="sp1"/>
        <vers num="3.6" edition="sp2"/>
        <vers num="3.6" edition="sp3"/>
        <vers num="3.6" edition="sp4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1351" seq="2004-1351" published="2004-12-07" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in the rwho daemon (in.rwhod) for Solaris 7 through 9 allows remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57659-1&amp;searchclause=%22category:security%22%20%22availability,%20security%22" adv="1" patch="1">57659</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4597" adv="1" patch="1">ESB-2004.0759</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-050.shtml" adv="1" patch="1">P-050</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11840" adv="1" patch="1">11840</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18385">solaris-inrwhod-command-execution(18385)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A592">oval:org.mitre.oval:def:592</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="7.0" edition=":x86"/>
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.7"/>
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1352" seq="2004-1352" published="2004-12-01" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the ping daemon of Sun Solaris 7 through 9 may allow local users to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012368" adv="1" patch="1">1012368</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57675-1&amp;searchclause=%22category:security%22%20%22availability,%20security%22">57675</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4586">ESB-2004.0749</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-045.shtml">P-045</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11782" adv="1" patch="1">11782</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18310">solaris-ping-bo(18310)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3400">oval:org.mitre.oval:def:3400</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="7.0" edition=":x86"/>
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.7"/>
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1353" seq="2004-1353" published="2004-10-19" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in LDAP on Sun Solaris 8 and 9, when using Role Based Access Control (RBAC), allows local users to execute certain commands with additional privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011789" adv="1" patch="1">1011789</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57657-1&amp;searchclause=%22category:security%22%20%22availability,%20security%22" adv="1" patch="1">57657</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4482" adv="1" patch="1">ESB-2004.0661</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-017.shtml" adv="1" patch="1">P-017</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11459" adv="1" patch="1">11459</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17757">solaris-ldap-rbac-gain-priv(17757)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4834">oval:org.mitre.oval:def:4834</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1354" seq="2004-1354" published="2004-05-14" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Solaris Management Console (SMC) in Sun Solaris 8 and 9 generates different 404 error messages when a file does not exist versus when a file exists but is otherwise inaccessible, which could allow remote attackers to obtain sensitive information in conjunction with a directory traversal (..) attack.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://spoofed.org/files/text/solaris-smc-advisory.txt" patch="1">http://spoofed.org/files/text/solaris-smc-advisory.txt</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57559-1&amp;searchclause=%22category:security%22%20%20111313-02" adv="1" patch="1">57559</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4105" adv="1" patch="1">ESB-2004.0347</ref>
      <ref source="MLIST" url="http://www.derkeiler.com/Mailing-Lists/securityfocus/focus-sun/2003-10/0032.html">[focus-sun] 20031022 Information disclosure with SMC webserver on Solaris 9</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10349" patch="1">10349</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/8873">8873</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16146">smc-dotdot-directory-traversal(16146)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1482">oval:org.mitre.oval:def:1482</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
        <vers num="9.0" edition="x86_update_2"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1355" seq="2004-1355" published="2004-04-26" modified="2018-10-30" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the TCP/IP stack for Sun Solaris 8 and 9 allows local users to cause a denial of service (system panic) via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57545-1&amp;searchclause=%22category:security%22%20%20111313-02" adv="1" patch="1">57545</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4057" adv="1" patch="1">ESB-2004.0308</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10216" patch="1">10216</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15955">solaris-tcp-ip-dos(15955)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2972">oval:org.mitre.oval:def:2972</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num=""/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1356" seq="2004-1356" published="2004-04-23" modified="2018-10-30" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the sendfilev function in Sun Solaris 8 and 9 allows local users to cause a denial of service (system panic) via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57470-1&amp;searchclause=%22category:security%22%20%20108528-27" adv="1" patch="1">57470</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4056" adv="1" patch="1">ESB-2004.0307</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10202" patch="1">10202</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15946">solaris-sendfilev-dos(15946)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1684">oval:org.mitre.oval:def:1684</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1357" seq="2004-1357" published="2004-04-07" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The Secure Shell (SSH) Daemon (SSHD) in Sun Solaris 9 does not properly log IP addresses when SSHD is configured with the ListenAddress as 0.0.0.0, which makes it easier for remote attackers to hide the source of their activities.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57538-1" adv="1" patch="1">57538</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4003" adv="1" patch="1">ESB-2004.0263</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/737548" adv="1" patch="1">VU#737548</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10080" patch="1">10080</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15784">solaris-sshd-log-bypass(15784)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3505">oval:org.mitre.oval:def:3505</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1358" seq="2004-1358" published="2004-03-12" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The patches (1) 114332-08 and (2) 114929-06 for Sun Solaris 9 disable the auditing functionality of the Basic Security Module (BSM), which allows attackers to avoid having their activity logged.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57478-1&amp;searchclause=%22category:security%22%20%20114332-08" adv="1" patch="1">57478</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=3788" adv="1" patch="1">ESB-2004.0069</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-099.shtml" adv="1" patch="1">O-099</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9852" patch="1">9852</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14918">solaris-patches-disable-bsm(14918)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3567">oval:org.mitre.oval:def:3567</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1359" seq="2004-1359" published="2004-03-04" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in uucp for Sun Solaris 2.6, 7, 8, and 9 allow local users to execute arbitrary code as the uucp user.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57508-1" adv="1" patch="1">57508</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=3935" adv="1" patch="1">ESB-2004.0201</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9837">9837</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15425">solaris-uucp-multiple-bo(15425)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1127">oval:org.mitre.oval:def:1127</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="2.6"/>
        <vers num="7.0" edition=":x86"/>
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="-"/>
        <vers num="5.7"/>
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1360" seq="2004-1360" published="2004-02-27" modified="2018-10-30" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in conv_fix in Sun Solaris 7 through 9, when invoked by conv_lpd, allows local users to overwrite arbitrary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57509-1" adv="1" patch="1">57509</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=3902" adv="1" patch="1">ESB-2004.0169</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-089.shtml" adv="1" patch="1">O-089</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/412566" adv="1" patch="1">VU#412566</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9759">9759</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15331">solaris-covfix-gain-privileges(15331)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1732">oval:org.mitre.oval:def:1732</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1361" seq="2004-1361" published="2004-12-23" modified="2019-04-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Integer underflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a malformed .hlp file, which leads to a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110383690219440&amp;w=2">20041223 Microsoft Windows winhlp32.exe Heap Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12091">12091</ref>
      <ref source="MISC" url="http://www.xfocus.net/flashsky/icoExp/">http://www.xfocus.net/flashsky/icoExp/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18678">win-winhlp32-bo(18678)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num="" edition="sp1"/>
        <vers num="" edition="sp2"/>
        <vers num="" edition="sp3"/>
        <vers num="" edition="sp4"/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="enterprise" edition=":64-bit"/>
        <vers num="enterprise" edition="sp1_beta_1"/>
        <vers num="enterprise_64-bit"/>
        <vers num="r2" edition=":64-bit"/>
        <vers num="r2" edition=":datacenter_64-bit"/>
        <vers num="r2" edition="sp1_beta_1"/>
        <vers num="standard" edition=":64-bit"/>
        <vers num="standard" edition="sp1_beta_1"/>
        <vers num="web" edition="sp1_beta_1"/>
      </prod>
      <prod name="windows_nt" vendor="microsoft">
        <vers num="4.0" edition=":enterprise_server"/>
        <vers num="4.0" edition=":server"/>
        <vers num="4.0" edition=":terminal_server"/>
        <vers num="4.0" edition=":workstation"/>
        <vers num="4.0" edition="sp1:enterprise_server"/>
        <vers num="4.0" edition="sp1:server"/>
        <vers num="4.0" edition="sp1:terminal_server"/>
        <vers num="4.0" edition="sp1:workstation"/>
        <vers num="4.0" edition="sp2:enterprise_server"/>
        <vers num="4.0" edition="sp2:server"/>
        <vers num="4.0" edition="sp2:terminal_server"/>
        <vers num="4.0" edition="sp2:workstation"/>
        <vers num="4.0" edition="sp3:enterprise_server"/>
        <vers num="4.0" edition="sp3:server"/>
        <vers num="4.0" edition="sp3:terminal_server"/>
        <vers num="4.0" edition="sp3:workstation"/>
        <vers num="4.0" edition="sp4:enterprise_server"/>
        <vers num="4.0" edition="sp4:server"/>
        <vers num="4.0" edition="sp4:terminal_server"/>
        <vers num="4.0" edition="sp4:workstation"/>
        <vers num="4.0" edition="sp5:enterprise_server"/>
        <vers num="4.0" edition="sp5:server"/>
        <vers num="4.0" edition="sp5:terminal_server"/>
        <vers num="4.0" edition="sp5:workstation"/>
        <vers num="4.0" edition="sp6:enterprise_server"/>
        <vers num="4.0" edition="sp6:server"/>
        <vers num="4.0" edition="sp6:terminal_server"/>
        <vers num="4.0" edition="sp6:workstation"/>
        <vers num="4.0" edition="sp6a:enterprise_server"/>
        <vers num="4.0" edition="sp6a:server"/>
        <vers num="4.0" edition="sp6a:terminal_server"/>
        <vers num="4.0" edition="sp6a:workstation"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":64-bit"/>
        <vers num="" edition=":home"/>
        <vers num="" edition=":media_center"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:64-bit"/>
        <vers num="" edition="sp1:home"/>
        <vers num="" edition="sp1:media_center"/>
        <vers num="" edition="sp2:home"/>
        <vers num="" edition="sp2:media_center"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1362" seq="2004-1362" published="2004-08-04" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The PL/SQL module for the Oracle HTTP Server in Oracle Application Server 10g, when using the WE8ISO8859P1 character set, does not perform character conversions properly, which allows remote attackers to bypass access restrictions for certain procedures via an encoded URL with "%FF" encoded sequences that are improperly converted to "Y" characters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382306006205&amp;w=2">20041223 Oracle Character Conversion Bugs (#NISR2122004G)</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1">101782</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/435974" adv="1">VU#435974</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/oracle23122004G.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/oracle23122004G.txt</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf" adv="1" patch="1">http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10871" patch="1">10871</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-245A.html" adv="1" patch="1">TA04-245A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18657">oracle-character-conversion-gain-privileges(18657)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.3"/>
        <vers num="9.0.3.1"/>
        <vers num="9.0.4"/>
        <vers num="9.0.4.0"/>
        <vers num="9.0.4.1"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="release_1"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.1"/>
        <vers num="11.5.2"/>
        <vers num="11.5.3"/>
        <vers num="11.5.4"/>
        <vers num="11.5.5"/>
        <vers num="11.5.6"/>
        <vers num="11.5.7"/>
        <vers num="11.5.8"/>
        <vers num="11.5.9"/>
      </prod>
      <prod name="enterprise_manager" vendor="oracle">
        <vers num="9"/>
        <vers num="9.0.1"/>
      </prod>
      <prod name="enterprise_manager_database_control" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="enterprise_manager_grid_control" vendor="oracle">
        <vers num="10.1.0.2"/>
      </prod>
      <prod name="oracle10g" vendor="oracle">
        <vers num="enterprise_9.0.4_.0"/>
        <vers num="enterprise_10.1.0.2"/>
        <vers num="personal_9.0.4_.0"/>
        <vers num="personal_10.1_.0.2"/>
        <vers num="standard_9.0.4_.0"/>
        <vers num="standard_10.1_.0.2"/>
      </prod>
      <prod name="oracle8i" vendor="oracle">
        <vers num="enterprise_8.0.5_.0.0"/>
        <vers num="enterprise_8.0.6_.0.0"/>
        <vers num="enterprise_8.0.6_.0.1"/>
        <vers num="enterprise_8.1.5_.0.0"/>
        <vers num="enterprise_8.1.5_.0.2"/>
        <vers num="enterprise_8.1.5_.1.0"/>
        <vers num="enterprise_8.1.6_.0.0"/>
        <vers num="enterprise_8.1.6_.1.0"/>
        <vers num="enterprise_8.1.7_.0.0"/>
        <vers num="enterprise_8.1.7_.1.0"/>
        <vers num="enterprise_8.1.7_.4"/>
        <vers num="standard_8.0.6"/>
        <vers num="standard_8.0.6_.3"/>
        <vers num="standard_8.1.5"/>
        <vers num="standard_8.1.6"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_8.1.7_.0.0"/>
        <vers num="standard_8.1.7_.1"/>
        <vers num="standard_8.1.7_.4"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="client_9.2.0.1"/>
        <vers num="client_9.2.0.2"/>
        <vers num="enterprise_8.1.7"/>
        <vers num="enterprise_9.0.1"/>
        <vers num="enterprise_9.0.1.4"/>
        <vers num="enterprise_9.0.1.5"/>
        <vers num="enterprise_9.2.0"/>
        <vers num="enterprise_9.2.0.1"/>
        <vers num="enterprise_9.2.0.2"/>
        <vers num="enterprise_9.2.0.3"/>
        <vers num="enterprise_9.2.0.4"/>
        <vers num="enterprise_9.2.0.5"/>
        <vers num="personal_8.1.7"/>
        <vers num="personal_9.0.1"/>
        <vers num="personal_9.0.1.4"/>
        <vers num="personal_9.0.1.5"/>
        <vers num="personal_9.2"/>
        <vers num="personal_9.2.0.1"/>
        <vers num="personal_9.2.0.2"/>
        <vers num="personal_9.2.0.3"/>
        <vers num="personal_9.2.0.4"/>
        <vers num="personal_9.2.0.5"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_9.0"/>
        <vers num="standard_9.0.1"/>
        <vers num="standard_9.0.1.2"/>
        <vers num="standard_9.0.1.3"/>
        <vers num="standard_9.0.1.4"/>
        <vers num="standard_9.0.1.5"/>
        <vers num="standard_9.0.2"/>
        <vers num="standard_9.2"/>
        <vers num="standard_9.2.0.1"/>
        <vers num="standard_9.2.0.2"/>
        <vers num="standard_9.2.0.3"/>
        <vers num="standard_9.2.0.4"/>
        <vers num="standard_9.2.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1363" seq="2004-1363" published="2004-08-04" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in extproc in Oracle 10g allows remote attackers to execute arbitrary code via environment variables in the library name, which are expanded after the length check is performed.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382345829397&amp;w=2">20041223 Oracle extproc buffer overflow (#NISR23122004A)</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1">101782</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/316206">VU#316206</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/oracle23122004.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/oracle23122004.txt</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf" adv="1" patch="1">http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10871" patch="1">10871</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-245A.html" adv="1" patch="1">TA04-245A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18659">oracle-extproc-library-bo(18659)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.3"/>
        <vers num="9.0.3.1"/>
        <vers num="9.0.4"/>
        <vers num="9.0.4.0"/>
        <vers num="9.0.4.1"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="release_1"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.1"/>
        <vers num="11.5.2"/>
        <vers num="11.5.3"/>
        <vers num="11.5.4"/>
        <vers num="11.5.5"/>
        <vers num="11.5.6"/>
        <vers num="11.5.7"/>
        <vers num="11.5.8"/>
        <vers num="11.5.9"/>
      </prod>
      <prod name="enterprise_manager" vendor="oracle">
        <vers num="9"/>
        <vers num="9.0.1"/>
      </prod>
      <prod name="enterprise_manager_database_control" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="enterprise_manager_grid_control" vendor="oracle">
        <vers num="10.1.0.2"/>
      </prod>
      <prod name="oracle10g" vendor="oracle">
        <vers num="enterprise_9.0.4_.0"/>
        <vers num="enterprise_10.1.0.2"/>
        <vers num="personal_9.0.4_.0"/>
        <vers num="personal_10.1_.0.2"/>
        <vers num="standard_9.0.4_.0"/>
        <vers num="standard_10.1_.0.2"/>
      </prod>
      <prod name="oracle8i" vendor="oracle">
        <vers num="enterprise_8.0.5_.0.0"/>
        <vers num="enterprise_8.0.6_.0.0"/>
        <vers num="enterprise_8.0.6_.0.1"/>
        <vers num="enterprise_8.1.5_.0.0"/>
        <vers num="enterprise_8.1.5_.0.2"/>
        <vers num="enterprise_8.1.5_.1.0"/>
        <vers num="enterprise_8.1.6_.0.0"/>
        <vers num="enterprise_8.1.6_.1.0"/>
        <vers num="enterprise_8.1.7_.0.0"/>
        <vers num="enterprise_8.1.7_.1.0"/>
        <vers num="enterprise_8.1.7_.4"/>
        <vers num="standard_8.0.6"/>
        <vers num="standard_8.0.6_.3"/>
        <vers num="standard_8.1.5"/>
        <vers num="standard_8.1.6"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_8.1.7_.0.0"/>
        <vers num="standard_8.1.7_.1"/>
        <vers num="standard_8.1.7_.4"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="client_9.2.0.1"/>
        <vers num="client_9.2.0.2"/>
        <vers num="enterprise_8.1.7"/>
        <vers num="enterprise_9.0.1"/>
        <vers num="enterprise_9.0.1.4"/>
        <vers num="enterprise_9.0.1.5"/>
        <vers num="enterprise_9.2.0"/>
        <vers num="enterprise_9.2.0.1"/>
        <vers num="enterprise_9.2.0.2"/>
        <vers num="enterprise_9.2.0.3"/>
        <vers num="enterprise_9.2.0.4"/>
        <vers num="enterprise_9.2.0.5"/>
        <vers num="personal_8.1.7"/>
        <vers num="personal_9.0.1"/>
        <vers num="personal_9.0.1.4"/>
        <vers num="personal_9.0.1.5"/>
        <vers num="personal_9.2"/>
        <vers num="personal_9.2.0.1"/>
        <vers num="personal_9.2.0.2"/>
        <vers num="personal_9.2.0.3"/>
        <vers num="personal_9.2.0.4"/>
        <vers num="personal_9.2.0.5"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_9.0"/>
        <vers num="standard_9.0.1"/>
        <vers num="standard_9.0.1.2"/>
        <vers num="standard_9.0.1.3"/>
        <vers num="standard_9.0.1.4"/>
        <vers num="standard_9.0.1.5"/>
        <vers num="standard_9.0.2"/>
        <vers num="standard_9.2"/>
        <vers num="standard_9.2.0.1"/>
        <vers num="standard_9.2.0.2"/>
        <vers num="standard_9.2.0.3"/>
        <vers num="standard_9.2.0.4"/>
        <vers num="standard_9.2.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1364" seq="2004-1364" published="2004-08-04" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="8.5" CVSS_base_score="8.5" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in extproc in Oracle 9i and 10g allows remote attackers to access arbitrary libraries outside of the $ORACLE_HOME\bin directory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382406002365&amp;w=2">20041223 Oracle extproc directory traversal (#NISR23122004B)</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1">101782</ref>
      <ref source="MISC" url="http://www.0xdeadbeef.info/exploits/raptor_oraextproc.sql">http://www.0xdeadbeef.info/exploits/raptor_oraextproc.sql</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/316206">VU#316206</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/oracle23122004B.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/oracle23122004B.txt</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf" adv="1" patch="1">http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/454861/100/0/threaded">20061219 Oracle &lt;= 9i / 10g (extproc) Local/Remote Command Execution Exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10871" patch="1">10871</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-245A.html" adv="1" patch="1">TA04-245A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18658">oracle-extproc-directory-traversal(18658)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.3"/>
        <vers num="9.0.3.1"/>
        <vers num="9.0.4"/>
        <vers num="9.0.4.0"/>
        <vers num="9.0.4.1"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="release_1"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.1"/>
        <vers num="11.5.2"/>
        <vers num="11.5.3"/>
        <vers num="11.5.4"/>
        <vers num="11.5.5"/>
        <vers num="11.5.6"/>
        <vers num="11.5.7"/>
        <vers num="11.5.8"/>
        <vers num="11.5.9"/>
      </prod>
      <prod name="enterprise_manager" vendor="oracle">
        <vers num="9"/>
        <vers num="9.0.1"/>
      </prod>
      <prod name="enterprise_manager_database_control" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="enterprise_manager_grid_control" vendor="oracle">
        <vers num="10.1.0.2"/>
      </prod>
      <prod name="oracle10g" vendor="oracle">
        <vers num="enterprise_9.0.4_.0"/>
        <vers num="enterprise_10.1.0.2"/>
        <vers num="personal_9.0.4_.0"/>
        <vers num="personal_10.1_.0.2"/>
        <vers num="standard_9.0.4_.0"/>
        <vers num="standard_10.1_.0.2"/>
      </prod>
      <prod name="oracle8i" vendor="oracle">
        <vers num="enterprise_8.0.5_.0.0"/>
        <vers num="enterprise_8.0.6_.0.0"/>
        <vers num="enterprise_8.0.6_.0.1"/>
        <vers num="enterprise_8.1.5_.0.0"/>
        <vers num="enterprise_8.1.5_.0.2"/>
        <vers num="enterprise_8.1.5_.1.0"/>
        <vers num="enterprise_8.1.6_.0.0"/>
        <vers num="enterprise_8.1.6_.1.0"/>
        <vers num="enterprise_8.1.7_.0.0"/>
        <vers num="enterprise_8.1.7_.1.0"/>
        <vers num="enterprise_8.1.7_.4"/>
        <vers num="standard_8.0.6"/>
        <vers num="standard_8.0.6_.3"/>
        <vers num="standard_8.1.5"/>
        <vers num="standard_8.1.6"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_8.1.7_.0.0"/>
        <vers num="standard_8.1.7_.1"/>
        <vers num="standard_8.1.7_.4"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="client_9.2.0.1"/>
        <vers num="client_9.2.0.2"/>
        <vers num="enterprise_8.1.7"/>
        <vers num="enterprise_9.0.1"/>
        <vers num="enterprise_9.0.1.4"/>
        <vers num="enterprise_9.0.1.5"/>
        <vers num="enterprise_9.2.0"/>
        <vers num="enterprise_9.2.0.1"/>
        <vers num="enterprise_9.2.0.2"/>
        <vers num="enterprise_9.2.0.3"/>
        <vers num="enterprise_9.2.0.4"/>
        <vers num="enterprise_9.2.0.5"/>
        <vers num="personal_8.1.7"/>
        <vers num="personal_9.0.1"/>
        <vers num="personal_9.0.1.4"/>
        <vers num="personal_9.0.1.5"/>
        <vers num="personal_9.2"/>
        <vers num="personal_9.2.0.1"/>
        <vers num="personal_9.2.0.2"/>
        <vers num="personal_9.2.0.3"/>
        <vers num="personal_9.2.0.4"/>
        <vers num="personal_9.2.0.5"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_9.0"/>
        <vers num="standard_9.0.1"/>
        <vers num="standard_9.0.1.2"/>
        <vers num="standard_9.0.1.3"/>
        <vers num="standard_9.0.1.4"/>
        <vers num="standard_9.0.1.5"/>
        <vers num="standard_9.0.2"/>
        <vers num="standard_9.2"/>
        <vers num="standard_9.2.0.1"/>
        <vers num="standard_9.2.0.2"/>
        <vers num="standard_9.2.0.3"/>
        <vers num="standard_9.2.0.4"/>
        <vers num="standard_9.2.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1365" seq="2004-1365" published="2004-08-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Extproc in Oracle 9i and 10g does not require authentication to load a library or execute a function, which allows local users to execute arbitrary commands as the Oracle user.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382471608835&amp;w=2">20041223 Oracle extproc local command execution (#NISR23122004C)</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1">101782</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/316206">VU#316206</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/oracle23122004C.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/oracle23122004C.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10871" patch="1">10871</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-245A.html" adv="1" patch="1">TA04-245A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18662">oracle-extproc-command-execution(18662)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.3"/>
        <vers num="9.0.3.1"/>
        <vers num="9.0.4"/>
        <vers num="9.0.4.0"/>
        <vers num="9.0.4.1"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="release_1"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.1"/>
        <vers num="11.5.2"/>
        <vers num="11.5.3"/>
        <vers num="11.5.4"/>
        <vers num="11.5.5"/>
        <vers num="11.5.6"/>
        <vers num="11.5.7"/>
        <vers num="11.5.8"/>
        <vers num="11.5.9"/>
      </prod>
      <prod name="enterprise_manager" vendor="oracle">
        <vers num="9"/>
        <vers num="9.0.1"/>
      </prod>
      <prod name="enterprise_manager_database_control" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="enterprise_manager_grid_control" vendor="oracle">
        <vers num="10.1.0.2"/>
      </prod>
      <prod name="oracle10g" vendor="oracle">
        <vers num="enterprise_9.0.4_.0"/>
        <vers num="enterprise_10.1.0.2"/>
        <vers num="personal_9.0.4_.0"/>
        <vers num="personal_10.1_.0.2"/>
        <vers num="standard_9.0.4_.0"/>
        <vers num="standard_10.1_.0.2"/>
      </prod>
      <prod name="oracle8i" vendor="oracle">
        <vers num="enterprise_8.0.5_.0.0"/>
        <vers num="enterprise_8.0.6_.0.0"/>
        <vers num="enterprise_8.0.6_.0.1"/>
        <vers num="enterprise_8.1.5_.0.0"/>
        <vers num="enterprise_8.1.5_.0.2"/>
        <vers num="enterprise_8.1.5_.1.0"/>
        <vers num="enterprise_8.1.6_.0.0"/>
        <vers num="enterprise_8.1.6_.1.0"/>
        <vers num="enterprise_8.1.7_.0.0"/>
        <vers num="enterprise_8.1.7_.1.0"/>
        <vers num="enterprise_8.1.7_.4"/>
        <vers num="standard_8.0.6"/>
        <vers num="standard_8.0.6_.3"/>
        <vers num="standard_8.1.5"/>
        <vers num="standard_8.1.6"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_8.1.7_.0.0"/>
        <vers num="standard_8.1.7_.1"/>
        <vers num="standard_8.1.7_.4"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="client_9.2.0.1"/>
        <vers num="client_9.2.0.2"/>
        <vers num="enterprise_8.1.7"/>
        <vers num="enterprise_9.0.1"/>
        <vers num="enterprise_9.0.1.4"/>
        <vers num="enterprise_9.0.1.5"/>
        <vers num="enterprise_9.2.0"/>
        <vers num="enterprise_9.2.0.1"/>
        <vers num="enterprise_9.2.0.2"/>
        <vers num="enterprise_9.2.0.3"/>
        <vers num="enterprise_9.2.0.4"/>
        <vers num="enterprise_9.2.0.5"/>
        <vers num="personal_8.1.7"/>
        <vers num="personal_9.0.1"/>
        <vers num="personal_9.0.1.4"/>
        <vers num="personal_9.0.1.5"/>
        <vers num="personal_9.2"/>
        <vers num="personal_9.2.0.1"/>
        <vers num="personal_9.2.0.2"/>
        <vers num="personal_9.2.0.3"/>
        <vers num="personal_9.2.0.4"/>
        <vers num="personal_9.2.0.5"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_9.0"/>
        <vers num="standard_9.0.1"/>
        <vers num="standard_9.0.1.2"/>
        <vers num="standard_9.0.1.3"/>
        <vers num="standard_9.0.1.4"/>
        <vers num="standard_9.0.1.5"/>
        <vers num="standard_9.0.2"/>
        <vers num="standard_9.2"/>
        <vers num="standard_9.2.0.1"/>
        <vers num="standard_9.2.0.2"/>
        <vers num="standard_9.2.0.3"/>
        <vers num="standard_9.2.0.4"/>
        <vers num="standard_9.2.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1366" seq="2004-1366" published="2004-08-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Oracle 10g Database Server stores the password for the SYSMAN account in cleartext in the world-readable emoms.properties file, which could allow local users to gain DBA privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1">101782</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/316206">VU#316206</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/oracle23122004D.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/oracle23122004D.txt</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf" adv="1" patch="1">http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/385323" patch="1">20041223 Oracle clear text passwords (#NISR2122004D)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10871" patch="1">10871</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-245A.html" adv="1" patch="1">TA04-245A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18661">oracle-sysman-password-plaintext(18661)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.3"/>
        <vers num="9.0.3.1"/>
        <vers num="9.0.4"/>
        <vers num="9.0.4.0"/>
        <vers num="9.0.4.1"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="release_1"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.1"/>
        <vers num="11.5.2"/>
        <vers num="11.5.3"/>
        <vers num="11.5.4"/>
        <vers num="11.5.5"/>
        <vers num="11.5.6"/>
        <vers num="11.5.7"/>
        <vers num="11.5.8"/>
        <vers num="11.5.9"/>
      </prod>
      <prod name="enterprise_manager" vendor="oracle">
        <vers num="9"/>
        <vers num="9.0.1"/>
      </prod>
      <prod name="enterprise_manager_database_control" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="enterprise_manager_grid_control" vendor="oracle">
        <vers num="10.1.0.2"/>
      </prod>
      <prod name="oracle10g" vendor="oracle">
        <vers num="enterprise_9.0.4_.0"/>
        <vers num="enterprise_10.1.0.2"/>
        <vers num="personal_9.0.4_.0"/>
        <vers num="personal_10.1_.0.2"/>
        <vers num="standard_9.0.4_.0"/>
        <vers num="standard_10.1_.0.2"/>
      </prod>
      <prod name="oracle8i" vendor="oracle">
        <vers num="enterprise_8.0.5_.0.0"/>
        <vers num="enterprise_8.0.6_.0.0"/>
        <vers num="enterprise_8.0.6_.0.1"/>
        <vers num="enterprise_8.1.5_.0.0"/>
        <vers num="enterprise_8.1.5_.0.2"/>
        <vers num="enterprise_8.1.5_.1.0"/>
        <vers num="enterprise_8.1.6_.0.0"/>
        <vers num="enterprise_8.1.6_.1.0"/>
        <vers num="enterprise_8.1.7_.0.0"/>
        <vers num="enterprise_8.1.7_.1.0"/>
        <vers num="enterprise_8.1.7_.4"/>
        <vers num="standard_8.0.6"/>
        <vers num="standard_8.0.6_.3"/>
        <vers num="standard_8.1.5"/>
        <vers num="standard_8.1.6"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_8.1.7_.0.0"/>
        <vers num="standard_8.1.7_.1"/>
        <vers num="standard_8.1.7_.4"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="client_9.2.0.1"/>
        <vers num="client_9.2.0.2"/>
        <vers num="enterprise_8.1.7"/>
        <vers num="enterprise_9.0.1"/>
        <vers num="enterprise_9.0.1.4"/>
        <vers num="enterprise_9.0.1.5"/>
        <vers num="enterprise_9.2.0"/>
        <vers num="enterprise_9.2.0.1"/>
        <vers num="enterprise_9.2.0.2"/>
        <vers num="enterprise_9.2.0.3"/>
        <vers num="enterprise_9.2.0.4"/>
        <vers num="enterprise_9.2.0.5"/>
        <vers num="personal_8.1.7"/>
        <vers num="personal_9.0.1"/>
        <vers num="personal_9.0.1.4"/>
        <vers num="personal_9.0.1.5"/>
        <vers num="personal_9.2"/>
        <vers num="personal_9.2.0.1"/>
        <vers num="personal_9.2.0.2"/>
        <vers num="personal_9.2.0.3"/>
        <vers num="personal_9.2.0.4"/>
        <vers num="personal_9.2.0.5"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_9.0"/>
        <vers num="standard_9.0.1"/>
        <vers num="standard_9.0.1.2"/>
        <vers num="standard_9.0.1.3"/>
        <vers num="standard_9.0.1.4"/>
        <vers num="standard_9.0.1.5"/>
        <vers num="standard_9.0.2"/>
        <vers num="standard_9.2"/>
        <vers num="standard_9.2.0.1"/>
        <vers num="standard_9.2.0.2"/>
        <vers num="standard_9.2.0.3"/>
        <vers num="standard_9.2.0.4"/>
        <vers num="standard_9.2.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1367" seq="2004-1367" published="2004-08-04" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Oracle 10g Database Server, when installed with a password that contains an exclamation point ("!") for the (1) DBSNMP or (2) SYSMAN user, generates an error that logs the password in the world-readable postDBCreation.log file, which could allow local users to obtain that password and use it against SYS or SYSTEM accounts, which may have been installed with the same password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382247308064&amp;w=2">20041223 Oracle clear text passwords (#NISR2122004D)</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1">101782</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/316206">VU#316206</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/oracle23122004D.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/oracle23122004D.txt</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf" adv="1" patch="1">http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-245A.html">TA04-245A</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.3"/>
        <vers num="9.0.3.1"/>
        <vers num="9.0.4"/>
        <vers num="9.0.4.0"/>
        <vers num="9.0.4.1"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="release_1"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.1"/>
        <vers num="11.5.2"/>
        <vers num="11.5.3"/>
        <vers num="11.5.4"/>
        <vers num="11.5.5"/>
        <vers num="11.5.6"/>
        <vers num="11.5.7"/>
        <vers num="11.5.8"/>
        <vers num="11.5.9"/>
      </prod>
      <prod name="enterprise_manager" vendor="oracle">
        <vers num="9"/>
        <vers num="9.0.1"/>
      </prod>
      <prod name="enterprise_manager_database_control" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="enterprise_manager_grid_control" vendor="oracle">
        <vers num="10.1.0.2"/>
      </prod>
      <prod name="oracle10g" vendor="oracle">
        <vers num="enterprise_9.0.4_.0"/>
        <vers num="enterprise_10.1.0.2"/>
        <vers num="personal_9.0.4_.0"/>
        <vers num="personal_10.1_.0.2"/>
        <vers num="standard_9.0.4_.0"/>
        <vers num="standard_10.1_.0.2"/>
      </prod>
      <prod name="oracle8i" vendor="oracle">
        <vers num="enterprise_8.0.5_.0.0"/>
        <vers num="enterprise_8.0.6_.0.0"/>
        <vers num="enterprise_8.0.6_.0.1"/>
        <vers num="enterprise_8.1.5_.0.0"/>
        <vers num="enterprise_8.1.5_.0.2"/>
        <vers num="enterprise_8.1.5_.1.0"/>
        <vers num="enterprise_8.1.6_.0.0"/>
        <vers num="enterprise_8.1.6_.1.0"/>
        <vers num="enterprise_8.1.7_.0.0"/>
        <vers num="enterprise_8.1.7_.1.0"/>
        <vers num="enterprise_8.1.7_.4"/>
        <vers num="standard_8.0.6"/>
        <vers num="standard_8.0.6_.3"/>
        <vers num="standard_8.1.5"/>
        <vers num="standard_8.1.6"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_8.1.7_.0.0"/>
        <vers num="standard_8.1.7_.1"/>
        <vers num="standard_8.1.7_.4"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="client_9.2.0.1"/>
        <vers num="client_9.2.0.2"/>
        <vers num="enterprise_8.1.7"/>
        <vers num="enterprise_9.0.1"/>
        <vers num="enterprise_9.0.1.4"/>
        <vers num="enterprise_9.0.1.5"/>
        <vers num="enterprise_9.2.0"/>
        <vers num="enterprise_9.2.0.1"/>
        <vers num="enterprise_9.2.0.2"/>
        <vers num="enterprise_9.2.0.3"/>
        <vers num="enterprise_9.2.0.4"/>
        <vers num="enterprise_9.2.0.5"/>
        <vers num="personal_8.1.7"/>
        <vers num="personal_9.0.1"/>
        <vers num="personal_9.0.1.4"/>
        <vers num="personal_9.0.1.5"/>
        <vers num="personal_9.2"/>
        <vers num="personal_9.2.0.1"/>
        <vers num="personal_9.2.0.2"/>
        <vers num="personal_9.2.0.3"/>
        <vers num="personal_9.2.0.4"/>
        <vers num="personal_9.2.0.5"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_9.0"/>
        <vers num="standard_9.0.1"/>
        <vers num="standard_9.0.1.2"/>
        <vers num="standard_9.0.1.3"/>
        <vers num="standard_9.0.1.4"/>
        <vers num="standard_9.0.1.5"/>
        <vers num="standard_9.0.2"/>
        <vers num="standard_9.2"/>
        <vers num="standard_9.2.0.1"/>
        <vers num="standard_9.2.0.2"/>
        <vers num="standard_9.2.0.3"/>
        <vers num="standard_9.2.0.4"/>
        <vers num="standard_9.2.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1368" seq="2004-1368" published="2004-08-04" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">ISQL*Plus in Oracle 10g Application Server allows remote attackers to execute arbitrary files via an absolute pathname in the file parameter to the load.uix script.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382264415387&amp;w=2">20041223 Oracle ISQLPlus file access vulnerability (#NISR2122004E)</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1">101782</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/435974">VU#435974</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/oracle23122004E.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/oracle23122004E.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10871" patch="1">10871</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-245A.html" adv="1" patch="1">TA04-245A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18656">oracle-isqlplus-file-access(18656)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.3"/>
        <vers num="9.0.3.1"/>
        <vers num="9.0.4"/>
        <vers num="9.0.4.0"/>
        <vers num="9.0.4.1"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="release_1"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.1"/>
        <vers num="11.5.2"/>
        <vers num="11.5.3"/>
        <vers num="11.5.4"/>
        <vers num="11.5.5"/>
        <vers num="11.5.6"/>
        <vers num="11.5.7"/>
        <vers num="11.5.8"/>
        <vers num="11.5.9"/>
      </prod>
      <prod name="enterprise_manager" vendor="oracle">
        <vers num="9"/>
        <vers num="9.0.1"/>
      </prod>
      <prod name="enterprise_manager_database_control" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="enterprise_manager_grid_control" vendor="oracle">
        <vers num="10.1.0.2"/>
      </prod>
      <prod name="oracle10g" vendor="oracle">
        <vers num="enterprise_9.0.4_.0"/>
        <vers num="enterprise_10.1.0.2"/>
        <vers num="personal_9.0.4_.0"/>
        <vers num="personal_10.1_.0.2"/>
        <vers num="standard_9.0.4_.0"/>
        <vers num="standard_10.1_.0.2"/>
      </prod>
      <prod name="oracle8i" vendor="oracle">
        <vers num="enterprise_8.0.5_.0.0"/>
        <vers num="enterprise_8.0.6_.0.0"/>
        <vers num="enterprise_8.0.6_.0.1"/>
        <vers num="enterprise_8.1.5_.0.0"/>
        <vers num="enterprise_8.1.5_.0.2"/>
        <vers num="enterprise_8.1.5_.1.0"/>
        <vers num="enterprise_8.1.6_.0.0"/>
        <vers num="enterprise_8.1.6_.1.0"/>
        <vers num="enterprise_8.1.7_.0.0"/>
        <vers num="enterprise_8.1.7_.1.0"/>
        <vers num="enterprise_8.1.7_.4"/>
        <vers num="standard_8.0.6"/>
        <vers num="standard_8.0.6_.3"/>
        <vers num="standard_8.1.5"/>
        <vers num="standard_8.1.6"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_8.1.7_.0.0"/>
        <vers num="standard_8.1.7_.1"/>
        <vers num="standard_8.1.7_.4"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="client_9.2.0.1"/>
        <vers num="client_9.2.0.2"/>
        <vers num="enterprise_8.1.7"/>
        <vers num="enterprise_9.0.1"/>
        <vers num="enterprise_9.0.1.4"/>
        <vers num="enterprise_9.0.1.5"/>
        <vers num="enterprise_9.2.0"/>
        <vers num="enterprise_9.2.0.1"/>
        <vers num="enterprise_9.2.0.2"/>
        <vers num="enterprise_9.2.0.3"/>
        <vers num="enterprise_9.2.0.4"/>
        <vers num="enterprise_9.2.0.5"/>
        <vers num="personal_8.1.7"/>
        <vers num="personal_9.0.1"/>
        <vers num="personal_9.0.1.4"/>
        <vers num="personal_9.0.1.5"/>
        <vers num="personal_9.2"/>
        <vers num="personal_9.2.0.1"/>
        <vers num="personal_9.2.0.2"/>
        <vers num="personal_9.2.0.3"/>
        <vers num="personal_9.2.0.4"/>
        <vers num="personal_9.2.0.5"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_9.0"/>
        <vers num="standard_9.0.1"/>
        <vers num="standard_9.0.1.2"/>
        <vers num="standard_9.0.1.3"/>
        <vers num="standard_9.0.1.4"/>
        <vers num="standard_9.0.1.5"/>
        <vers num="standard_9.0.2"/>
        <vers num="standard_9.2"/>
        <vers num="standard_9.2.0.1"/>
        <vers num="standard_9.2.0.2"/>
        <vers num="standard_9.2.0.3"/>
        <vers num="standard_9.2.0.4"/>
        <vers num="standard_9.2.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1369" seq="2004-1369" published="2004-08-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The TNS Listener in Oracle 10g allows remote attackers to cause a denial of service (listener crash) via a malformed service_register_NSGR request containing a value that is used as an invalid offset for a pointer that references incorrect memory.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382524401468&amp;w=2">20041223 Oracle TNS Listener DoS (#NISR2122004F)</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1">101782</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/316206">VU#316206</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/oracle23122004F.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/oracle23122004F.txt</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf" adv="1" patch="1">http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10871" patch="1">10871</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-245A.html" adv="1" patch="1">TA04-245A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18664">oracle-tnslsnr-nsgr-dos(18664)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.3"/>
        <vers num="9.0.3.1"/>
        <vers num="9.0.4"/>
        <vers num="9.0.4.0"/>
        <vers num="9.0.4.1"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="release_1"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.1"/>
        <vers num="11.5.2"/>
        <vers num="11.5.3"/>
        <vers num="11.5.4"/>
        <vers num="11.5.5"/>
        <vers num="11.5.6"/>
        <vers num="11.5.7"/>
        <vers num="11.5.8"/>
        <vers num="11.5.9"/>
      </prod>
      <prod name="enterprise_manager" vendor="oracle">
        <vers num="9"/>
        <vers num="9.0.1"/>
      </prod>
      <prod name="enterprise_manager_database_control" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="enterprise_manager_grid_control" vendor="oracle">
        <vers num="10.1.0.2"/>
      </prod>
      <prod name="oracle10g" vendor="oracle">
        <vers num="enterprise_9.0.4_.0"/>
        <vers num="enterprise_10.1.0.2"/>
        <vers num="personal_9.0.4_.0"/>
        <vers num="personal_10.1_.0.2"/>
        <vers num="standard_9.0.4_.0"/>
        <vers num="standard_10.1_.0.2"/>
      </prod>
      <prod name="oracle8i" vendor="oracle">
        <vers num="enterprise_8.0.5_.0.0"/>
        <vers num="enterprise_8.0.6_.0.0"/>
        <vers num="enterprise_8.0.6_.0.1"/>
        <vers num="enterprise_8.1.5_.0.0"/>
        <vers num="enterprise_8.1.5_.0.2"/>
        <vers num="enterprise_8.1.5_.1.0"/>
        <vers num="enterprise_8.1.6_.0.0"/>
        <vers num="enterprise_8.1.6_.1.0"/>
        <vers num="enterprise_8.1.7_.0.0"/>
        <vers num="enterprise_8.1.7_.1.0"/>
        <vers num="enterprise_8.1.7_.4"/>
        <vers num="standard_8.0.6"/>
        <vers num="standard_8.0.6_.3"/>
        <vers num="standard_8.1.5"/>
        <vers num="standard_8.1.6"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_8.1.7_.0.0"/>
        <vers num="standard_8.1.7_.1"/>
        <vers num="standard_8.1.7_.4"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="client_9.2.0.1"/>
        <vers num="client_9.2.0.2"/>
        <vers num="enterprise_8.1.7"/>
        <vers num="enterprise_9.0.1"/>
        <vers num="enterprise_9.0.1.4"/>
        <vers num="enterprise_9.0.1.5"/>
        <vers num="enterprise_9.2.0"/>
        <vers num="enterprise_9.2.0.1"/>
        <vers num="enterprise_9.2.0.2"/>
        <vers num="enterprise_9.2.0.3"/>
        <vers num="enterprise_9.2.0.4"/>
        <vers num="enterprise_9.2.0.5"/>
        <vers num="personal_8.1.7"/>
        <vers num="personal_9.0.1"/>
        <vers num="personal_9.0.1.4"/>
        <vers num="personal_9.0.1.5"/>
        <vers num="personal_9.2"/>
        <vers num="personal_9.2.0.1"/>
        <vers num="personal_9.2.0.2"/>
        <vers num="personal_9.2.0.3"/>
        <vers num="personal_9.2.0.4"/>
        <vers num="personal_9.2.0.5"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_9.0"/>
        <vers num="standard_9.0.1"/>
        <vers num="standard_9.0.1.2"/>
        <vers num="standard_9.0.1.3"/>
        <vers num="standard_9.0.1.4"/>
        <vers num="standard_9.0.1.5"/>
        <vers num="standard_9.0.2"/>
        <vers num="standard_9.2"/>
        <vers num="standard_9.2.0.1"/>
        <vers num="standard_9.2.0.2"/>
        <vers num="standard_9.2.0.3"/>
        <vers num="standard_9.2.0.4"/>
        <vers num="standard_9.2.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1370" seq="2004-1370" published="2004-08-04" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in PL/SQL procedures that run with definer rights in Oracle 9i and 10g allow remote attackers to execute arbitrary SQL commands and gain privileges via (1) DBMS_EXPORT_EXTENSION, (2) WK_ACL.GET_ACL, (3) WK_ACL.STORE_ACL, (4) WK_ADM.COMPLETE_ACL_SNAPSHOT, (5) WK_ACL.DELETE_ACLS_WITH_STATEMENT, or (6) DRILOAD.VALIDATE_STMT.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382596129607&amp;w=2">20041223 Oracle multiple PL/SQL injection vulnerabilities (#NISR2122004H)</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1">101782</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/316206">VU#316206</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/oracle23122004H.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/oracle23122004H.txt</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf" adv="1" patch="1">http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10871" patch="1">10871</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-245A.html" adv="1" patch="1">TA04-245A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18665">oracle-procedure-sql-injection(18665)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.3"/>
        <vers num="9.0.3.1"/>
        <vers num="9.0.4"/>
        <vers num="9.0.4.0"/>
        <vers num="9.0.4.1"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="release_1"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.1"/>
        <vers num="11.5.2"/>
        <vers num="11.5.3"/>
        <vers num="11.5.4"/>
        <vers num="11.5.5"/>
        <vers num="11.5.6"/>
        <vers num="11.5.7"/>
        <vers num="11.5.8"/>
        <vers num="11.5.9"/>
      </prod>
      <prod name="enterprise_manager" vendor="oracle">
        <vers num="9"/>
        <vers num="9.0.1"/>
      </prod>
      <prod name="enterprise_manager_database_control" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="enterprise_manager_grid_control" vendor="oracle">
        <vers num="10.1.0.2"/>
      </prod>
      <prod name="oracle10g" vendor="oracle">
        <vers num="enterprise_9.0.4_.0"/>
        <vers num="enterprise_10.1.0.2"/>
        <vers num="personal_9.0.4_.0"/>
        <vers num="personal_10.1_.0.2"/>
        <vers num="standard_9.0.4_.0"/>
        <vers num="standard_10.1_.0.2"/>
      </prod>
      <prod name="oracle8i" vendor="oracle">
        <vers num="enterprise_8.0.5_.0.0"/>
        <vers num="enterprise_8.0.6_.0.0"/>
        <vers num="enterprise_8.0.6_.0.1"/>
        <vers num="enterprise_8.1.5_.0.0"/>
        <vers num="enterprise_8.1.5_.0.2"/>
        <vers num="enterprise_8.1.5_.1.0"/>
        <vers num="enterprise_8.1.6_.0.0"/>
        <vers num="enterprise_8.1.6_.1.0"/>
        <vers num="enterprise_8.1.7_.0.0"/>
        <vers num="enterprise_8.1.7_.1.0"/>
        <vers num="enterprise_8.1.7_.4"/>
        <vers num="standard_8.0.6"/>
        <vers num="standard_8.0.6_.3"/>
        <vers num="standard_8.1.5"/>
        <vers num="standard_8.1.6"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_8.1.7_.0.0"/>
        <vers num="standard_8.1.7_.1"/>
        <vers num="standard_8.1.7_.4"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="client_9.2.0.1"/>
        <vers num="client_9.2.0.2"/>
        <vers num="enterprise_8.1.7"/>
        <vers num="enterprise_9.0.1"/>
        <vers num="enterprise_9.0.1.4"/>
        <vers num="enterprise_9.0.1.5"/>
        <vers num="enterprise_9.2.0"/>
        <vers num="enterprise_9.2.0.1"/>
        <vers num="enterprise_9.2.0.2"/>
        <vers num="enterprise_9.2.0.3"/>
        <vers num="enterprise_9.2.0.4"/>
        <vers num="enterprise_9.2.0.5"/>
        <vers num="personal_8.1.7"/>
        <vers num="personal_9.0.1"/>
        <vers num="personal_9.0.1.4"/>
        <vers num="personal_9.0.1.5"/>
        <vers num="personal_9.2"/>
        <vers num="personal_9.2.0.1"/>
        <vers num="personal_9.2.0.2"/>
        <vers num="personal_9.2.0.3"/>
        <vers num="personal_9.2.0.4"/>
        <vers num="personal_9.2.0.5"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_9.0"/>
        <vers num="standard_9.0.1"/>
        <vers num="standard_9.0.1.2"/>
        <vers num="standard_9.0.1.3"/>
        <vers num="standard_9.0.1.4"/>
        <vers num="standard_9.0.1.5"/>
        <vers num="standard_9.0.2"/>
        <vers num="standard_9.2"/>
        <vers num="standard_9.2.0.1"/>
        <vers num="standard_9.2.0.2"/>
        <vers num="standard_9.2.0.3"/>
        <vers num="standard_9.2.0.4"/>
        <vers num="standard_9.2.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1371" seq="2004-1371" published="2004-08-04" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Oracle 9i and 10g allows remote attackers to execute arbitrary code via a long token in the text of a wrapped procedure.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382570313035&amp;w=2">20041223 Oracle wrapped procedure overflow (#NISR2122004J)</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1">101782</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/316206">VU#316206</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/oracle23122004J.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/oracle23122004J.txt</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf" adv="1" patch="1">http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10871" patch="1">10871</ref>
      <ref source="CERT" url="http://www.us-cert.gov/cas/techalerts/TA04-245A.html" adv="1" patch="1">TA04-245A</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18666">oracle-wrapped-procedure-bo(18666)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.3"/>
        <vers num="9.0.3.1"/>
        <vers num="9.0.4"/>
        <vers num="9.0.4.0"/>
        <vers num="9.0.4.1"/>
      </prod>
      <prod name="collaboration_suite" vendor="oracle">
        <vers num="release_1"/>
      </prod>
      <prod name="database_server" vendor="oracle">
        <vers num="9i_application_server"/>
      </prod>
      <prod name="e-business_suite" vendor="oracle">
        <vers num="11.5.1"/>
        <vers num="11.5.2"/>
        <vers num="11.5.3"/>
        <vers num="11.5.4"/>
        <vers num="11.5.5"/>
        <vers num="11.5.6"/>
        <vers num="11.5.7"/>
        <vers num="11.5.8"/>
        <vers num="11.5.9"/>
      </prod>
      <prod name="enterprise_manager" vendor="oracle">
        <vers num="9"/>
        <vers num="9.0.1"/>
      </prod>
      <prod name="enterprise_manager_database_control" vendor="oracle">
        <vers num="10.1.2"/>
      </prod>
      <prod name="enterprise_manager_grid_control" vendor="oracle">
        <vers num="10.1.0.2"/>
      </prod>
      <prod name="oracle10g" vendor="oracle">
        <vers num="enterprise_9.0.4_.0"/>
        <vers num="enterprise_10.1.0.2"/>
        <vers num="personal_9.0.4_.0"/>
        <vers num="personal_10.1_.0.2"/>
        <vers num="standard_9.0.4_.0"/>
        <vers num="standard_10.1_.0.2"/>
      </prod>
      <prod name="oracle8i" vendor="oracle">
        <vers num="enterprise_8.0.5_.0.0"/>
        <vers num="enterprise_8.0.6_.0.0"/>
        <vers num="enterprise_8.0.6_.0.1"/>
        <vers num="enterprise_8.1.5_.0.0"/>
        <vers num="enterprise_8.1.5_.0.2"/>
        <vers num="enterprise_8.1.5_.1.0"/>
        <vers num="enterprise_8.1.6_.0.0"/>
        <vers num="enterprise_8.1.6_.1.0"/>
        <vers num="enterprise_8.1.7_.0.0"/>
        <vers num="enterprise_8.1.7_.1.0"/>
        <vers num="enterprise_8.1.7_.4"/>
        <vers num="standard_8.0.6"/>
        <vers num="standard_8.0.6_.3"/>
        <vers num="standard_8.1.5"/>
        <vers num="standard_8.1.6"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_8.1.7_.0.0"/>
        <vers num="standard_8.1.7_.1"/>
        <vers num="standard_8.1.7_.4"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="client_9.2.0.1"/>
        <vers num="client_9.2.0.2"/>
        <vers num="enterprise_8.1.7"/>
        <vers num="enterprise_9.0.1"/>
        <vers num="enterprise_9.0.1.4"/>
        <vers num="enterprise_9.0.1.5"/>
        <vers num="enterprise_9.2.0"/>
        <vers num="enterprise_9.2.0.1"/>
        <vers num="enterprise_9.2.0.2"/>
        <vers num="enterprise_9.2.0.3"/>
        <vers num="enterprise_9.2.0.4"/>
        <vers num="enterprise_9.2.0.5"/>
        <vers num="personal_8.1.7"/>
        <vers num="personal_9.0.1"/>
        <vers num="personal_9.0.1.4"/>
        <vers num="personal_9.0.1.5"/>
        <vers num="personal_9.2"/>
        <vers num="personal_9.2.0.1"/>
        <vers num="personal_9.2.0.2"/>
        <vers num="personal_9.2.0.3"/>
        <vers num="personal_9.2.0.4"/>
        <vers num="personal_9.2.0.5"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_9.0"/>
        <vers num="standard_9.0.1"/>
        <vers num="standard_9.0.1.2"/>
        <vers num="standard_9.0.1.3"/>
        <vers num="standard_9.0.1.4"/>
        <vers num="standard_9.0.1.5"/>
        <vers num="standard_9.0.2"/>
        <vers num="standard_9.2"/>
        <vers num="standard_9.2.0.1"/>
        <vers num="standard_9.2.0.2"/>
        <vers num="standard_9.2.0.3"/>
        <vers num="standard_9.2.0.4"/>
        <vers num="standard_9.2.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1372" seq="2004-1372" published="2004-09-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in IBM DB2 7.x and 8.1 allow local users to execute arbitrary code via (1) a long third argument to the rec2xml function or (2) a long filename argument to the generate_distfile procedure.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382462924162&amp;w=2">20041223 IBM DB2 generate_distfile buffer overflow vulnerability (#NISR2122004L)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382730431065&amp;w=2">20041223 IBM DB2 rec2xml buffer overflow vulnerability (#NISR2122004J)</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/db223122004K.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/db223122004K.txt</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/db223122004L.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/db223122004L.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11089" patch="1">11089</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18663">db2-generatedistfile-bo(18663)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18682">db2-rec2xml-bo(18682)</ref>
    </refs>
    <vuln_soft>
      <prod name="db2_universal_database" vendor="ibm">
        <vers num="7.0" edition=":linux"/>
        <vers num="7.1" edition=":linux"/>
        <vers num="7.2" edition=":linux"/>
        <vers num="8.1" edition=":aix"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1373" seq="2004-1373" published="2004-12-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in SHOUTcast 1.9.4 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via format string specifiers in a content URL, as demonstrated in the filename portion of a .mp3 file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110382975516003&amp;w=2">20041223 SHOUTcast remote format string vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110886444014745&amp;w=2">20050219 exwormshoucast  part of PTjob project: SHOUTcast v1.9.4 remote</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012675">1012675</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200501-04.xml" patch="1">GLSA-200501-04</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12096" patch="1">12096</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18669">shoutcast-format-string(18669)</ref>
    </refs>
    <vuln_soft>
      <prod name="shoutcast_server" vendor="nullsoft">
        <vers num="1.9.4" edition=":linux"/>
        <vers num="1.9.4" edition=":mac_os_x"/>
        <vers num="1.9.4" edition=":win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1374" seq="2004-1374" published="2004-12-18" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in NetBSD kernel may allow local users to execute arbitrary code and gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://gleg.net/advisory_netbsd2.shtml" adv="1">http://gleg.net/advisory_netbsd2.shtml</ref>
    </refs>
    <vuln_soft>
      <prod name="netbsd" vendor="netbsd">
        <vers num="2.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1375" seq="2004-1375" published="2004-12-23" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in System Administration Manager (SAM) in HP-UX B.11.00, B.11.11, B.11.22, and B.11.23 allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=110384155209555&amp;w=2">SSRT4699</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-085.shtml" adv="1" patch="1">P-085</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12098" patch="1">12098</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18674">hp-sam-gain-privileges(18674)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5435">oval:org.mitre.oval:def:5435</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.00"/>
        <vers num="11.4"/>
        <vers num="11.11"/>
        <vers num="11.22"/>
        <vers num="11.23" edition=":ia64_64-bit"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1376" seq="2004-1376" published="2004-12-30" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious FTP servers to overwrite arbitrary files via .. (dot dot) sequences in filenames returned from a LIST command.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110461358930103&amp;w=2">20041230 7a69Adv#17 - Internet Explorer FTP download path disclosure</ref>
      <ref source="MISC" url="http://www.7a69ezine.org/node/view/176" adv="1">http://www.7a69ezine.org/node/view/176</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.01"/>
        <vers num="5.5"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1377" seq="2004-1377" published="2004-12-27" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The (1) fixps (aka fixps.in) and (2) psmandup (aka psmandup.in) scripts in a2ps before 4.13 allow local users to overwrite arbitrary files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200501-02.xml" patch="1">GLSA-200501-02</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12108" patch="1">12108</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12109" patch="1">12109</ref>
      <ref source="CONFIRM" url="http://www.vuxml.org/freebsd/9168253c-5a6d-11d9-a9e7-0001020eed82.html">http://www.vuxml.org/freebsd/9168253c-5a6d-11d9-a9e7-0001020eed82.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18671">gnu-a2ps-fixpsin-symlink(18671)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18672">gnu-a2ps-psmanupin-symlink(18672)</ref>
    </refs>
    <vuln_soft>
      <prod name="a2ps" vendor="gnu">
        <vers num="4.13"/>
        <vers num="4.13b"/>
      </prod>
      <prod name="turbolinux_home" vendor="turbolinux">
        <vers num=""/>
      </prod>
      <prod name="turbolinux_server" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
      <prod name="turbolinux_workstation" vendor="turbolinux">
        <vers num="7.0"/>
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1378" seq="2004-1378" published="2004-09-21" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The expat XML parser code, as used in the open source Jabber (jabberd) 1.4.3 and earlier, jadc2s 0.9.0 and earlier, and possibly other packages, allows remote attackers to cause a denial of service (application crash) via a malformed packet to a socket that accepts XML connections.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://devel.amessage.info/jabberd14/" patch="1">http://devel.amessage.info/jabberd14/</ref>
      <ref source="MLIST" url="http://mail.jabber.org/pipermail/jabberd/2004-September/002004.html">[jabberd] 20040919 Jabberd 1.4 critical bug</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109583829122679&amp;w=2">20040920 Possible DoS attack against jabberd 1.4.3 and jadc2s 0.9.0</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011383">1011383</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011384">1011384</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-31.xml" patch="1">GLSA-200409-31</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11231" patch="1">11231</ref>
      <ref source="CONFIRM" url="http://www.vuxml.org/freebsd/2e25d38b-54d1-11d9-b612-000c6e8f12ef.html">http://www.vuxml.org/freebsd/2e25d38b-54d1-11d9-b612-000c6e8f12ef.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17466">jabberd-xml-dos(17466)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17467">jadc2s-xml-dos(17467)</ref>
    </refs>
    <vuln_soft>
      <prod name="jabberd" vendor="jabberstudio">
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.2a"/>
        <vers num="1.4.3"/>
      </prod>
      <prod name="jadc2s" vendor="jabberstudio">
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1379" seq="2004-1379" published="2004-09-16" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the DVD subpicture decoder in xine xine-lib 1-rc5 and earlier allows remote attackers to execute arbitrary code via a (1) DVD or (2) MPEG subpicture header where the second field reuses RLE data from the end of the first field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.320308" patch="1">SSA:2004-266</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-657" adv="1" patch="1">DSA-657</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-30.xml" patch="1">GLSA-200409-30</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/375482/2004-09-02/2004-09-08/0">20040906 XSA-2004-5: heap overflow in DVD subpicture decoder</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11205" patch="1">11205</ref>
      <ref source="CONFIRM" url="http://www.vuxml.org/freebsd/131bd7c4-64a3-11d9-829a-000a95bc6fae.html">http://www.vuxml.org/freebsd/131bd7c4-64a3-11d9-829a-000a95bc6fae.html</ref>
      <ref source="CONFIRM" url="http://xinehq.de/index.php/security/XSA-2004-5" adv="1" patch="1">http://xinehq.de/index.php/security/XSA-2004-5</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17423">xine-dvd-subpicture-bo(17423)</ref>
    </refs>
    <vuln_soft>
      <prod name="xine" vendor="xine">
        <vers num="1_alpha"/>
        <vers num="1_beta1"/>
        <vers num="1_beta2"/>
        <vers num="1_beta3"/>
        <vers num="1_beta4"/>
        <vers num="1_beta5"/>
        <vers num="1_beta6"/>
        <vers num="1_beta7"/>
        <vers num="1_beta8"/>
        <vers num="1_beta9"/>
        <vers num="1_beta10"/>
        <vers num="1_beta11"/>
        <vers num="1_beta12"/>
        <vers num="1_rc0"/>
        <vers num="1_rc0a"/>
        <vers num="1_rc1"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3"/>
        <vers num="1_rc3a"/>
        <vers num="1_rc3b"/>
        <vers num="1_rc4"/>
        <vers num="1_rc5"/>
      </prod>
      <prod name="xine-lib" vendor="xine">
        <vers num="0.9.8"/>
        <vers num="1_beta2"/>
        <vers num="1_beta3"/>
        <vers num="1_beta4"/>
        <vers num="1_beta5"/>
        <vers num="1_beta6"/>
        <vers num="1_beta7"/>
        <vers num="1_beta8"/>
        <vers num="1_beta9"/>
        <vers num="1_beta12"/>
        <vers num="1_rc0"/>
        <vers num="1_rc1"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3"/>
        <vers num="1_rc3a"/>
        <vers num="1_rc3b"/>
        <vers num="1_rc3c"/>
        <vers num="1_rc4"/>
        <vers num="1_rc5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1380" seq="2004-1380" published="2004-10-20" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Firefox before 1.0 and Mozilla before 1.7.5 allows inactive (background) tabs to launch dialog boxes, which can allow remote attackers to spoof the dialog boxes from web sites in other windows and facilitate phishing attacks, aka the "Dialog Box Spoofing Vulnerability."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/mfsa2005-05.html" adv="1" patch="1">http://www.mozilla.org/security/announce/mfsa2005-05.html</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-323.html" adv="1" patch="1">RHSA-2005:323</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-335.html" adv="1" patch="1">RHSA-2005:335</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18864">web-browser-modal-spoofing(18864)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100050">oval:org.mitre.oval:def:100050</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10211">oval:org.mitre.oval:def:10211</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9" edition="rc"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.3"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4.1"/>
        <vers num="1.5" edition="alpha"/>
        <vers num="1.5" edition="rc1"/>
        <vers num="1.5" edition="rc2"/>
        <vers num="1.5.1"/>
        <vers num="1.6" edition="alpha"/>
        <vers num="1.6" edition="beta"/>
        <vers num="1.7" edition="alpha"/>
        <vers num="1.7" edition="beta"/>
        <vers num="1.7" edition="rc1"/>
        <vers num="1.7" edition="rc2"/>
        <vers num="1.7" edition="rc3"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="1.7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1381" seq="2004-1381" published="2004-10-20" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Firefox before 1.0 and Mozilla before 1.7.5 allow inactive (background) tabs to focus on input being entered in the active tab, as originally reported using form fields, which allows remote attackers to steal sensitive data that is intended for other sites, which could facilitate phishing attacks.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.mozilla.org/security/announce/mfsa2005-05.html" adv="1" patch="1">http://www.mozilla.org/security/announce/mfsa2005-05.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17789">web-browser-inactive-info-disclosure(17789)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100053">oval:org.mitre.oval:def:100053</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9" edition="rc"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.3"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4.1"/>
        <vers num="1.5" edition="alpha"/>
        <vers num="1.5" edition="rc1"/>
        <vers num="1.5" edition="rc2"/>
        <vers num="1.5.1"/>
        <vers num="1.6" edition="alpha"/>
        <vers num="1.6" edition="beta"/>
        <vers num="1.7" edition="alpha"/>
        <vers num="1.7" edition="beta"/>
        <vers num="1.7" edition="rc1"/>
        <vers num="1.7" edition="rc2"/>
        <vers num="1.7" edition="rc3"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="1.7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1382" seq="2004-1382" published="2004-12-31" modified="2016-10-17" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The glibcbug script in glibc 2.3.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CVE-2004-0968.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109899903129801&amp;w=2">20041028 [USN-4-1] Standard C library script vulnerabilities</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-636" adv="1" patch="1">DSA-636</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:159">MDKSA-2004:159</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-261.html">RHSA-2005:261</ref>
    </refs>
    <vuln_soft>
      <prod name="glibc" vendor="gnu">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.1.6"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.3.10"/>
        <vers num="2.1.9"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.3"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="2.3.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1383" seq="2004-1383" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in phpGroupWare 0.9.16.003 and earlier allow remote attackers to execute arbitrary SQL statements via the (1) order, (2) project_id, (3) pro_main, or (4) hours_id parameters to index.php or (5) ticket_id to viewticket_details.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110312656029072&amp;w=2">20041215 Multiple phpGroupWare Vulnerabilities [ phpGroupWare 0.9.16.003 &amp;&amp; Earlier ]</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200501-08.xml" patch="1">GLSA-200501-08</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00054-12142004">http://www.gulftech.org/?node=research&amp;article_id=00054-12142004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11952" patch="1">11952</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18498">phpgroupware-projectid-sql-injection(18498)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.14.003"/>
        <vers num="0.9.14.005"/>
        <vers num="0.9.14.006"/>
        <vers num="0.9.14.007"/>
        <vers num="0.9.16.000"/>
        <vers num="0.9.16.002"/>
        <vers num="0.9.16.003"/>
        <vers num="0.9.16_rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1384" seq="2004-1384" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in phpGroupWare 0.9.16.003 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) kp3, (2) type, (3) msg, (4) forum_id, (5) pos, (6) cats_app, (7) cat_id, (8) msgball[msgnum], (9) fldball[acctnum] parameters to index.php or (10) ticket_id to viewticket_details.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110312656029072&amp;w=2">20041215 Multiple phpGroupWare Vulnerabilities [ phpGroupWare 0.9.16.003 &amp;&amp; Earlier ]</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200501-08.xml" patch="1">GLSA-200501-08</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00054-12142004">http://www.gulftech.org/?node=research&amp;article_id=00054-12142004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11952" patch="1">11952</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18496">phpgroupware-index-preferences-xss(18496)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.14.003"/>
        <vers num="0.9.14.005"/>
        <vers num="0.9.14.006"/>
        <vers num="0.9.14.007"/>
        <vers num="0.9.16.000"/>
        <vers num="0.9.16.002"/>
        <vers num="0.9.16.003"/>
        <vers num="0.9.16_rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1385" seq="2004-1385" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">phpGroupWare 0.9.16.003 and earlier allows remote attackers to gain sensitive information via (1) unexpected characters in the session ID such as shell metacharacters, (2) an invalid appname parameter to preferences.php or (3) an invalid menuaction parameter to index.php, which reveals the web server path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110312656029072&amp;w=2">20041215 Multiple phpGroupWare Vulnerabilities [ phpGroupWare 0.9.16.003 &amp;&amp; Earlier ]</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200501-08.xml" patch="1">GLSA-200501-08</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00054-12142004">http://www.gulftech.org/?node=research&amp;article_id=00054-12142004</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18497">phpgroupware-path-disclosure(18497)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.14.003"/>
        <vers num="0.9.14.005"/>
        <vers num="0.9.14.006"/>
        <vers num="0.9.14.007"/>
        <vers num="0.9.16.000"/>
        <vers num="0.9.16.002"/>
        <vers num="0.9.16.003"/>
        <vers num="0.9.16_rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1386" seq="2004-1386" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">TikiWiki before 1.8.4.1 does not properly verify uploaded images, which could allow remote attackers to upload and execute arbitrary PHP scripts, a different vulnerability than CVE-2005-0200.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012700">1012700</ref>
      <ref source="CONFIRM" url="http://tikiwiki.org/tiki-read_article.php?articleId=97" patch="1">http://tikiwiki.org/tiki-read_article.php?articleId=97</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-084.shtml">P-084</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200501-12.xml" patch="1">GLSA-200501-12</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12110" patch="1">12110</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18691">tikiwiki-image-command-execution(18691)</ref>
    </refs>
    <vuln_soft>
      <prod name="tikiwiki_cms/groupware" vendor="tiki">
        <vers num="1.6.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1387" seq="2004-1387" published="2004-12-31" modified="2018-10-03" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The check_forensic script in apache-utils package 1.3.31 allows local users to overwrite or create arbitrary files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.debian.org/debian-apache/2005/01/msg00076.html">[debian-apache] 20050119 Bug#290974: marked as done (apache: Temporary usage bugs that can be used in symlink attacks)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18993">apache-checkforensic-symlink(18993)</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/65-1/">USN-65-1</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="1.3.31"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1388" seq="2004-1388" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.berlios.de/pipermail/gpsd-announce/2005-January/000018.html" patch="1">[Gpsd-announce] 20050127 Announcing release 2.8 of gpsd</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110677341711505&amp;w=2">20050126 DMA[2005-0125a] - 'berlios gpsd format string vulnerability'</ref>
      <ref source="MISC" url="http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt">http://www.digitalmunition.com/DMA%5B2005-0125a%5D.txt</ref>
      <ref source="CONFIRM" url="http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html">http://www.mail-archive.com/debian-bugs-closed@lists.debian.org/msg02103.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19079">gpsd-format-string(19079)</ref>
    </refs>
    <vuln_soft>
      <prod name="gps_daemon" vendor="berlios">
        <vers num="1.9.0"/>
        <vers num="1.25"/>
        <vers num="1.26"/>
        <vers num="1.91"/>
        <vers num="1.92"/>
        <vers num="1.93"/>
        <vers num="1.94"/>
        <vers num="1.95"/>
        <vers num="1.96"/>
        <vers num="1.97"/>
        <vers num="1.98"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="2.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1389" seq="2004-1389" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="1.5" CVSS_vector="(AV:L/AC:H/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in the Veritas NetBackup Administrative Assistant interface for NetBackup BusinesServer 3.4, 3.4.1, and 4.5, DataCenter 3.4, 3.4.1, and 4.5, Enterprise Server 5.1, and NetBackup Server 5.0 and 5.1, allows attackers to execute arbitrary commands via the bpjava-susvc process, possibly related to the call-back feature.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://seer.support.veritas.com/docs/271727.htm" adv="1" patch="1">http://seer.support.veritas.com/docs/271727.htm</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-020.shtml" adv="1" patch="1">P-020</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/685456" adv="1" patch="1">VU#685456</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11494">11494</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17811">nebackup-bpjavasusvc-gain-privileges(17811)</ref>
    </refs>
    <vuln_soft>
      <prod name="netbackup" vendor="veritas">
        <vers num="3.4.0" edition=":businessserver"/>
        <vers num="3.4.0" edition=":datacenter"/>
        <vers num="3.4.1" edition=":businessserver"/>
        <vers num="3.4.1" edition=":datacenter"/>
        <vers num="4.5.0" edition=":businessserver"/>
        <vers num="4.5.0" edition=":datacenter"/>
        <vers num="5.0" edition=":server"/>
        <vers num="5.1" edition=":enterprise_server"/>
        <vers num="5.1" edition=":server"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1390" seq="2004-1390" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allow remote attackers to execute arbitrary code via a long argument to the (1) -F, (2) name, (3) en, (4) upscript, (5) downscript, (6) retries, (7) timeout, (8) scriptdetach, (9) noscript, (10) nodetach, (11) remote_mac, or (12) local_mac flags.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0155.html">20040903 [RLSA_01-2004] QNX PPPoEd local root vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/961686" adv="1">VU#961686</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11104">11104</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17280">Qnx-rtp-pppoed-flags-bo(17280)</ref>
    </refs>
    <vuln_soft>
      <prod name="rtos" vendor="qnx">
        <vers num="2.4"/>
        <vers num="4.25"/>
        <vers num="6.1.0"/>
        <vers num="6.2.0"/>
        <vers num="6.2.0a"/>
      </prod>
      <prod name="rtp" vendor="qnx">
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1391" seq="2004-1391" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Untrusted execution path vulnerability in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious mount program.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0155.html">20040903 [RLSA_01-2004] QNX PPPoEd local root vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/577566" adv="1">VU#577566</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11105">11105</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17284">qnx-rtp-mount-command-execute(17284)</ref>
    </refs>
    <vuln_soft>
      <prod name="rtos" vendor="qnx">
        <vers num="6.1.0"/>
        <vers num="6.1.0a"/>
        <vers num="6.2.0"/>
        <vers num="6.2.1a"/>
        <vers num="6.2.1b"/>
        <vers num="6.3.0"/>
      </prod>
      <prod name="rtp" vendor="qnx">
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1392" seq="2004-1392" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">PHP 4.0 with cURL functions allows remote attackers to bypass the open_basedir setting and read arbitrary files via a file: URL argument to the curl_init function.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109898213806099&amp;w=2">20041027 PHP4 cURL functions bypass open_basedir</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110625060220934&amp;w=2">20050120 [USN-66-1] PHP vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011984">1011984</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-405.html">RHSA-2005:405</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-406.html">RHSA-2005:406</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11557" patch="1">11557</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2344" patch="1">FLSA:2344</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17900">php-openbasedir-restriction-bypass(17900)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9279">oval:org.mitre.oval:def:9279</ref>
    </refs>
    <vuln_soft>
      <prod name="php" vendor="php">
        <vers num="4.0"/>
        <vers num="4.0.1" edition="patch1"/>
        <vers num="4.0.1" edition="patch2"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3" edition="patch1"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.6"/>
        <vers num="4.0.7" edition="rc1"/>
        <vers num="4.0.7" edition="rc2"/>
        <vers num="4.0.7" edition="rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1393" seq="2004-1393" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the tcsetattr function for Sun Solaris for SPARC 2.6, 7, and 8 allows local users to cause a denial of service (system hang).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57474-1" adv="1" patch="1">57474</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=3806" adv="1">ESB-2004.0085</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/379390" adv="1">VU#379390</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9548">9548</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14998">solaris-tcsetattr-dos(14998)</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="2.6"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.7"/>
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1394" seq="2004-1394" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The pfexec function for Sun Solaris 8 and 9 does not properly handle when a custom profile contains an invalid entry in the exec_attr database, which may allow local users with custom rights profiles to execute profile commands with additional privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57453-1" adv="1" patch="1">57453</ref>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=3800" adv="1">ESB-2004.0079</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9534">9534</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008893">1008893</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14988">solaris-pfexec-gain-privileges(14988)</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="9.0" edition=":sparc"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1395" seq="2004-1395" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Lithtech engine, as used in (1) Contract Jack 1.1 and earlier, (2) No one lives forever 2 1.3 and earlier, (3) Tron 2.0 1.042 and earlier, (4) F.E.A.R. (First Encounter Assault and Recon), and possibly other games, allows remote attackers to cause a denial of service (connection refused) via a UDP packet that causes recvfrom to generate a return code that causes the listening loop to exit, as demonstrated using zero byte packets or packets between 8193 and 12280 bytes, which result in conditions that are not "Operation would block."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/lithsock-adv.txt" patch="1">http://aluigi.altervista.org/adv/lithsock-adv.txt</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/029932.html" patch="1">20041213 Socket unreacheable in the Lithtech engine (new protocol)</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038095.html">20051021 F.E.A.R. 1.01 likes lithsock</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110297515500671&amp;w=2">20041213 Socket unreacheable in the Lithtech engine (new protocol)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11902">11902</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18456">lithtech-engine-communication-dos(18456)</ref>
    </refs>
    <vuln_soft>
      <prod name="contract_jack" vendor="monolith_productions">
        <vers num="1.1"/>
      </prod>
      <prod name="no_one_lives_forever_2" vendor="monolith_productions">
        <vers num="1.0.004"/>
        <vers num="1.3"/>
      </prod>
      <prod name="tron" vendor="monolith_productions">
        <vers num="2.0.1.0"/>
        <vers num="2.0.1.42"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1396" seq="2004-1396" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Winamp 5.07 and possibly other versions, allows remote attackers to cause a denial of service (application crash or CPU consumption) via (1) an mp4 or m4a playlist file that contains invalid tag data or (2) an invalid .nsv or .nsa file.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forums.winamp.com/showthread.php?s=&amp;threadid=202007">http://forums.winamp.com/showthread.php?s=&amp;threadid=202007</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110297310503541&amp;w=2">20041213 Winamp 5.07 (latest version) Remote Crash + other stupid shizle</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=110303988101973&amp;w=2">20041213 Winamp 5.07 (latest version) Remote Crash + other</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Dec/1012525.html">1012525</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/372968">VU#372968</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11909">11909</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18466">winamp-mp4-m4a-dos(18466)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18467">winamp-nsa-nsv-dos(18467)</ref>
    </refs>
    <vuln_soft>
      <prod name="winamp" vendor="nullsoft">
        <vers num="5.07"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1397" seq="2004-1397" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in UseModWiki 1.0 allows remote attackers to inject arbitrary web script or HTML via an argument to wiki.pl.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110305173302388&amp;w=2">20041214 STG Security Advisory: [SSA-20041209-13] UseModWiki XSS vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11924">11924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18458">usemodwiki-wiki-xss(18458)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1398" seq="2004-1398" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in prelink.c in kextload in Apple OS X, as used by TDIXSupport in Roxio Toast Titanium and possibly other products, allows local users to execute arbitrary code via format string specifiers in the extension argument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049452.html">20060913 [NETRAGARD-20060822 SECURITY ADVISORY] [ APPLE COMPUTER CORPORATION KEXTLOAD VULNERABILITY + ROXIO TOAST TITANUM 7 HELPER APP - LOCAL ROOT COMROMISE]</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110305083706943&amp;w=2">20041214 Possible local root vulnerability in Roxio Toast on Mac OS X</ref>
      <ref source="MISC" url="http://www.netragard.com/pdfs/research/apple-kext-tools-20060822.txt">http://www.netragard.com/pdfs/research/apple-kext-tools-20060822.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11926">11926</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/20031">20031</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18472">roxio-toast-tdixsupport-format-string(18472)</ref>
    </refs>
    <vuln_soft>
      <prod name="toast" vendor="roxio">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1399" seq="2004-1399" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the Attachment module 2.3.10 and earlier for phpBB allows remote attackers to read arbitrary files via a .. (dot dot) in the filename.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110304269031484&amp;w=2">20041214 phpBB Attachment Mod Directory Traversal HTTP POST Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11893" patch="1">11893</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18437">attachment-mod-directory-traversal(18437)</ref>
    </refs>
    <vuln_soft>
      <prod name="attachment_mod" vendor="opentools">
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
        <vers num="2.3.6"/>
        <vers num="2.3.7"/>
        <vers num="2.3.8"/>
        <vers num="2.3.9"/>
        <vers num="2.3.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1400" seq="2004-1400" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The control panel in ASP Calendar does not require authentication to access, which allows remote attackers to gain unauthorized access via a direct request to main.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110304839629822&amp;w=2">20041214 ASP Calendar Vulnerability &lt;www.ashiyane.com></ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11931">11931</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18474">asp-calendar-gain-access(18474)</ref>
    </refs>
    <vuln_soft>
      <prod name="asp_calendar" vendor="active_server_corner">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1401" seq="2004-1401" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in verify.asp in Asp-rider allows remote attackers to execute arbitrary SQL statements and bypass authentication via the username parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110305802005220&amp;w=2">20041214 ASP-rider is vulnerable to sql injection attack</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11933">11933</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18479">asp-rider-verify-sql-injection(18479)</ref>
    </refs>
    <vuln_soft>
      <prod name="asp-rider" vendor="asp-rider">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1402" seq="2004-1402" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">SQL injection vulnerability in iWebNegar allows remote attackers to execute arbitrary SQL commands via (1) the string parameter for index.php, (2) comments.php, or (3) the administrator login page.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110314454810163&amp;w=2">20041215 iwebnegar is vulnerable to all kind of sql injections</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11946">11946</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18505">iwebnegar-sql-injection(18505)</ref>
    </refs>
    <vuln_soft>
      <prod name="iwebnegar" vendor="iwebnegar">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1403" seq="2004-1403" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in index.php in GNUBoard 3.39 and earlier allows remote attackers to execute arbitrary PHP code by modifying the doc parameter to reference a URL on a remote web server that contains the code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110313585810712&amp;w=2">20041215 STG Security Advisory: [SSA-20041214-14] GNUBoard PHP injection vulnerability</ref>
      <ref source="MISC" url="http://sir.co.kr/?doc=bbs/gnuboard.php&amp;bo_table=pds&amp;page=1&amp;wr_id=1871">http://sir.co.kr/?doc=bbs/gnuboard.php&amp;bo_table=pds&amp;page=1&amp;wr_id=1871</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11948">11948</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18494">gnuboard-doc-index-file-include(18494)</ref>
    </refs>
    <vuln_soft>
      <prod name="gnuboard" vendor="sir">
        <vers num="3.30"/>
        <vers num="3.31"/>
        <vers num="3.32"/>
        <vers num="3.33"/>
        <vers num="3.34"/>
        <vers num="3.35"/>
        <vers num="3.36"/>
        <vers num="3.37"/>
        <vers num="3.38"/>
        <vers num="3.39"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1404" seq="2004-1404" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Attachment Mod 2.3.10 module for phpBB, when used with Apache mod_mime, does not properly handle files with multiple file extensions, such as .php.rar, which allows remote attackers to upload and execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110321557806215&amp;w=2">20041216 STG Security Advisory: [SSA-20041215-18] Vulnerability of uploading files with multiple extensions in phpBB Attachment Mod</ref>
      <ref source="CONFIRM" url="http://www.opentools.de/board/viewtopic.php?t=3590" patch="1">http://www.opentools.de/board/viewtopic.php?t=3590</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11893" patch="1">11893</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18438">attachment-mod-file-upload(18438)</ref>
    </refs>
    <vuln_soft>
      <prod name="attachment_mod" vendor="opentools">
        <vers num="2.3.4"/>
        <vers num="2.3.5"/>
        <vers num="2.3.6"/>
        <vers num="2.3.7"/>
        <vers num="2.3.8"/>
        <vers num="2.3.9"/>
        <vers num="2.3.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1405" seq="2004-1405" published="2004-12-31" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">MediaWiki 1.3.8 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.rar, which allows remote attackers to upload and execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110321710420059&amp;w=2">20041216 STG Security Advisory: [SSA-20041215-19] Vulnerability of uploading files with multiple extensions in MediaWiki</ref>
      <ref source="MISC" url="http://wikipedia.sourceforge.net/" patch="1">http://wikipedia.sourceforge.net/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11985" patch="1">11985</ref>
    </refs>
    <vuln_soft>
      <prod name="mediawiki" vendor="mediawiki">
        <vers num="1.3"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
        <vers num="1.3.6"/>
        <vers num="1.3.7"/>
        <vers num="1.3.8"/>
        <vers num="1.3.10"/>
        <vers num="1.3.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1406" seq="2004-1406" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in ikonboard.cgi in Ikonboard 3.1.0 through 3.1.3 allows remote attackers to inject arbitrary SQL commands via the (1) st or (2) keywords parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110321654705580&amp;w=2">20041216 [MaxPatrol] SQL-injection in Ikonboard 3.1.x</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11982" patch="1">11982</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18533">ikonboard-ikonboard-sql-injection(18533)</ref>
    </refs>
    <vuln_soft>
      <prod name="ikonboard" vendor="ikonboard.com">
        <vers num="3.0.1"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2a"/>
        <vers num="3.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1407" seq="2004-1407" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in singapore Image Gallery Web Application 0.9.10 allow remote attackers to (1) read arbitrary files via the showThumb method for thumb.php, or (2) delete arbitrary files via admin.class.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110323479715051&amp;w=2">20041216 [SIG^2 G-TEC] singapore Image Gallery Web Application v0.9.10 Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://www.security.org.sg/vuln/singapore0910.html">http://www.security.org.sg/vuln/singapore0910.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11990" patch="1">11990</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18528">singapore-thumb-directory-traversal(18528)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18532">singapore-adminclass-directory-traversal(18532)</ref>
    </refs>
    <vuln_soft>
      <prod name="image_gallery_web_application" vendor="singapore">
        <vers num="0.9.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1408" seq="2004-1408" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The addImage method for admin.class.php in Image Gallery Web Application 0.9.10 does not properly check filenames, which allows remote attackers to upload and execute arbitrary files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110323479715051&amp;w=2">20041216 [SIG^2 G-TEC] singapore Image Gallery Web Application v0.9.10 Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11990" patch="1">11990</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18531">singapore-adminclass-file-upload(18531)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1409" seq="2004-1409" published="2004-12-31" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting vulnerabilities in Image Gallery Web Application 0.9.10 allow remote attackers to inject arbitrary web script or HTML.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110323479715051&amp;w=2">20041216 [SIG^2 G-TEC] singapore Image Gallery Web Application v0.9.10 Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11990" patch="1">11990</ref>
    </refs>
    <vuln_soft>
      <prod name="image_gallery_web_application" vendor="singapore">
        <vers num="0.9.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1410" seq="2004-1410" published="2004-12-31" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Gadu-Gadu build 155 and earlier allows remote attackers to inject arbitrary web script via a URL, which is echoed in a popup window that displays a parsing error message, a different vulnerability than CVE-2004-1229.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110330741828726&amp;w=2">20041217 Gadu-Gadu, another two bugs</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11998">11998</ref>
    </refs>
    <vuln_soft>
      <prod name="gadu-gadu_instant_messenger" vendor="gadu-gadu">
        <vers num="6.0_build149"/>
        <vers num="6.0_build150"/>
        <vers num="6.0_build151"/>
        <vers num="6.0_build152"/>
        <vers num="6.0_build153"/>
        <vers num="6.0_build154"/>
        <vers num="6.0_build155"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1411" seq="2004-1411" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Gadu-Gadu build 155 and earlier allows remote attackers to cause a denial of service (infinite loop) via a message that contains an image whose filename does not start with restricted characters.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110330741828726&amp;w=2">20041217 Gadu-Gadu, another two bugs</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11998">11998</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18580">gadu-gadu-image-dos(18580)</ref>
    </refs>
    <vuln_soft>
      <prod name="gadu-gadu_instant_messenger" vendor="gadu-gadu">
        <vers num="6.0_build149"/>
        <vers num="6.0_build150"/>
        <vers num="6.0_build151"/>
        <vers num="6.0_build152"/>
        <vers num="6.0_build153"/>
        <vers num="6.0_build154"/>
        <vers num="6.0_build155"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1412" seq="2004-1412" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Kayako eSupport 2.x allows remote attackers to inject arbitrary web script or HTML via the searchm parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110352428607171&amp;w=2">20041218 Multiple Vulnerabilities In Kayako eSupport v2.x</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00056-12182004">http://www.gulftech.org/?node=research&amp;article_id=00056-12182004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12037">12037</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18571">kayako-index-xss(18571)</ref>
    </refs>
    <vuln_soft>
      <prod name="esupport" vendor="kayako">
        <vers num="2.1.2"/>
        <vers num="2.1.8"/>
        <vers num="2.2"/>
        <vers num="2.2.5"/>
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1413" seq="2004-1413" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Kayako eSupport 2.x allow remote attackers to execute arbitrary SQL commands via the (1) subcat, (2) rate, (3) questiondetails, (4) ticketkey22, (5) email22 parameters to index.php, or (6) the e-mail field of the Forgot Key feature.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110352428607171&amp;w=2">20041218 Multiple Vulnerabilities In Kayako eSupport v2.x</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00056-12182004">http://www.gulftech.org/?node=research&amp;article_id=00056-12182004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12037">12037</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18572">kayako-sql-injection(18572)</ref>
    </refs>
    <vuln_soft>
      <prod name="esupport" vendor="kayako">
        <vers num="2.1.2"/>
        <vers num="2.1.8"/>
        <vers num="2.2"/>
        <vers num="2.2.5"/>
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1414" seq="2004-1414" published="2004-12-31" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Gadu-Gadu 6.1 build 156 allows remote attackers to cause a denial of service (application hang) via a message that contains many special strings that are converted to images.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110357519312200&amp;w=2">20041220 Gadu-Gadu Remote DoS (all versions)</ref>
      <ref source="MISC" url="http://www.soltysiak.com/gg-dos.txt">http://www.soltysiak.com/gg-dos.txt</ref>
    </refs>
    <vuln_soft>
      <prod name="gadu-gadu_instant_messenger" vendor="gadu-gadu">
        <vers num="6.1_build156"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1415" seq="2004-1415" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">SQL injection vulnerability in (1) disp_album.php and possibly (2) disp_img.php in 2Bgal 2.4 and 2.5.1 allows remote attackers to execute arbitrary SQL commands via the id_album parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110375900916558&amp;w=2">20041222 2Bgal : 2.4 &amp; 2.5.1 SQL injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12083" patch="1">12083</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18645">2bgal-dispalbum-sql-injection(18645)</ref>
    </refs>
    <vuln_soft>
      <prod name="2bgal" vendor="ben3w">
        <vers num="2.4"/>
        <vers num="2.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1416" seq="2004-1416" published="2004-12-31" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">pnxr3260.dll in the RealOne 2.0 build 6.0.11.868 browser plugin, as used in Internet Explorer, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted embed tag.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110374765215675&amp;w=2">20041222 Realone2.0 "pnxr3260.dll" Lets Remote Users IE  Browser Crash</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1417" seq="2004-1417" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in login.php in PsychoStats 2.2.4 Beta and earlier allows remote attackers to inject arbitrary web script or HTML via the login parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110383119525592&amp;w=2">20041223 Cross Site Scripting In PsychoStats 2.2.4 Beta &amp;&amp; Earlier</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00057-12222004" patch="1">http://www.gulftech.org/?node=research&amp;article_id=00057-12222004</ref>
      <ref source="MISC" url="http://www.psychostats.com/forums/viewtopic.php?t=11022" patch="1">http://www.psychostats.com/forums/viewtopic.php?t=11022</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12089" patch="1">12089</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18651">psychostats-login-xss(18651)</ref>
    </refs>
    <vuln_soft>
      <prod name="psychostats" vendor="psychostats">
        <vers num="2.0" edition="beta"/>
        <vers num="2.0.1" edition="beta"/>
        <vers num="2.1" edition="beta"/>
        <vers num="2.2" edition="beta"/>
        <vers num="2.2.1" edition="beta"/>
        <vers num="2.2.2" edition="beta"/>
        <vers num="2.2.4" prev="1" edition="beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1418" seq="2004-1418" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WPKontakt 3.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML via an e-mail address, which is not quoted when a parsing error is generated.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110384387332443&amp;w=2">20041223 WPkontakt message parsing error</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12097" patch="1">12097</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18685">wpkontakt-email-command-execution(18685)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1419" seq="2004-1419" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in ZeroBoard 4.1pl4 and earlier allows remote attackers to execute arbitrary PHP code by modifying the (1) _zb_path parameter to outlogin.php or (2) dir parameter to write.php to reference a URL on a remote web server that contains the code.</descript>
      <descript source="nvd">requires that register_globals be enabled</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030224.html" patch="1">20041223 STG Security Advisory: [SSA-20041220-16] PHP source injection and cross-site scripting vulnerabilities in ZeroBoard</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110391024404947&amp;w=2">20041224 STG Security Advisory: [SSA-20041220-16] PHP source injection and cross-site scripting vulnerabilities in ZeroBoard</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012677">1012677</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12103">12103</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18677">zeroboard-outlogin-file-include(18677)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18679">zeroboard-write-file-include(18679)</ref>
    </refs>
    <vuln_soft>
      <prod name="zeroboard" vendor="zeroboard">
        <vers num="4.1_pl2"/>
        <vers num="4.1_pl3"/>
        <vers num="4.1_pl4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1420" seq="2004-1420" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in header.php in WHM AutoPilot 2.4.6.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) site_title or (2) http_images parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110425620105529&amp;w=2">20041228 Multiple WHM Autopilot Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110451997904494&amp;w=2">20041231 WHM AutoPilot Security Release [ Plus Upgrade Instructions ]</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00059-12272004">http://www.gulftech.org/?node=research&amp;article_id=00059-12272004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12119">12119</ref>
      <ref source="CONFIRM" url="http://www.whmautopilot.com/forum/lofiversion/index.php/t6785.html" adv="1" patch="1">http://www.whmautopilot.com/forum/lofiversion/index.php/t6785.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18700">whm-autopilot-header-xss(18700)</ref>
    </refs>
    <vuln_soft>
      <prod name="autopilot" vendor="whm">
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1421" seq="2004-1421" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities (1) step_one.php, (2) step_one_tables.php, (3) step_two_tables.php in WHM AutoPilot 2.4.6.5 and earlier allow remote attackers to execute arbitrary PHP code by modifying the server_inc parameter to reference a URL on a remote web server that contains the code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110425620105529&amp;w=2">20041228 Multiple WHM Autopilot Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110451997904494&amp;w=2">20041231 WHM AutoPilot Security Release [ Plus Upgrade Instructions ]</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012707">1012707</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00059-12272004" patch="1">http://www.gulftech.org/?node=research&amp;article_id=00059-12272004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12119">12119</ref>
      <ref source="CONFIRM" url="http://www.whmautopilot.com/forum/lofiversion/index.php/t6785.html" adv="1" patch="1">http://www.whmautopilot.com/forum/lofiversion/index.php/t6785.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18699">whm-autopilot-php-file-include(18699)</ref>
    </refs>
    <vuln_soft>
      <prod name="whm_autopilot" vendor="whm">
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1422" seq="2004-1422" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">WHM AutoPilot 2.4.6.5 and earlier allows remote attackers to gain sensitive information via phpinfo, which reveals php settings.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110425620105529&amp;w=2">20041228 Multiple WHM Autopilot Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110451997904494&amp;w=2">20041231 WHM AutoPilot Security Release [ Plus Upgrade Instructions ]</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00059-12272004">http://www.gulftech.org/?node=research&amp;article_id=00059-12272004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12119">12119</ref>
      <ref source="CONFIRM" url="http://www.whmautopilot.com/forum/lofiversion/index.php/t6785.html" adv="1" patch="1">http://www.whmautopilot.com/forum/lofiversion/index.php/t6785.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18701">whm-autopilot-information-disclosure(18701)</ref>
    </refs>
    <vuln_soft>
      <prod name="whm_autopilot" vendor="whm">
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1423" seq="2004-1423" published="2004-12-31" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple PHP remote file inclusion vulnerabilities in Sean Proctor PHP-Calendar before 0.10.1, as used in Commonwealth of Massachusetts Virtual Law Office (VLO) and other products, allow remote attackers to execute arbitrary PHP code via a URL in the phpc_root_path parameter to (1) includes/calendar.php or (2) includes/setup.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110434580716205&amp;w=2">20041229 php-Calendar File Include Vulnerability [ Command Exec ]</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1017107">1017107</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=296020&amp;group_id=46800">http://sourceforge.net/project/shownotes.php?release_id=296020&amp;group_id=46800</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00060-12292004" patch="1">http://www.gulftech.org/?node=research&amp;article_id=00060-12292004</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/449397/100/0/threaded">20061021 Virtual Law Office (phpc_root_path) Remote File Include Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12127">12127</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/20657">20657</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/4145" adv="1">ADV-2006-4145</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18710">php-calendar-file-include(18710)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/29710">vlo-phpcrootpath-file-include(29710)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/2608">2608</ref>
    </refs>
    <vuln_soft>
      <prod name="php-calendar" vendor="php-calendar">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.10" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1424" seq="2004-1424" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in view.php in Moodle 1.4.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the search parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110425409614735&amp;w=2">20041227 Multiple Vulnerabilities in Moodle</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110444531816566&amp;w=2">20041230 Re: Multiple Vulnerabilities in Moodle</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12120" patch="1">12120</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18702">moodle-view-search-xss(18702)</ref>
    </refs>
    <vuln_soft>
      <prod name="moodle" vendor="moodle">
        <vers num="1.1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1425" seq="2004-1425" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in file.php in Moodle 1.4.2 and earlier allows remote attackers to read arbitrary session files for known session IDs via a .. (dot dot) in the file parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110425409614735&amp;w=2">20041227 Multiple Vulnerabilities in Moodle</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110444531816566&amp;w=2">20041230 Re: Multiple Vulnerabilities in Moodle</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12120" patch="1">12120</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18550">moodle-directory-traversal(18550)</ref>
    </refs>
    <vuln_soft>
      <prod name="moodle" vendor="moodle">
        <vers num="1.1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1426" seq="2004-1426" published="2004-12-31" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in KorWeblog 1.6.2-cvs and earlier allows remote attackers to read arbitrary files and execute arbitrary PHP files via .. (dot dot) sequences in the lng parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110442847614890&amp;w=2">20041230 KorWeblog php injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12132">12132</ref>
    </refs>
    <vuln_soft>
      <prod name="korweblog" vendor="korweblog">
        <vers num="1.6.1"/>
        <vers num="1.6.2cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1427" seq="2004-1427" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in main.inc in KorWeblog 1.6.2-cvs and earlier allows remote attackers to execute arbitrary PHP code by modifying the G_PATH parameter to reference a URL on a remote web server that contains the code, as demonstrated in index.php when using .. (dot dot) sequences in the lng parameter to cause main.inc to be loaded.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110442847614890&amp;w=2">20041230 KorWeblog php injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12132">12132</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18717">korweblog-install-file-include(18717)</ref>
    </refs>
    <vuln_soft>
      <prod name="korweblog" vendor="korweblog">
        <vers num="1.6.1"/>
        <vers num="1.6.2cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1428" seq="2004-1428" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ArGoSoft FTP before 1.4.2.1 generates an error message if the user name does not exist instead of prompting for a password, which allows remote attackers to determine valid usernames.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110451582011666&amp;w=2">20041231 ArGoSoft FTP Server reveals valid usernames and allows for brute force attacks</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012744">1012744</ref>
      <ref source="CONFIRM" url="http://www.argosoft.com/ftpserver/changelist.aspx">http://www.argosoft.com/ftpserver/changelist.aspx</ref>
      <ref source="MISC" url="http://www.lovebug.org/argosoft_advisory.txt">http://www.lovebug.org/argosoft_advisory.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12139">12139</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18721">argosoft-information-disclosure(18721)</ref>
    </refs>
    <vuln_soft>
      <prod name="ftp_server" vendor="argosoft">
        <vers num="1.4.1.1"/>
        <vers num="1.4.1.2"/>
        <vers num="1.4.1.3"/>
        <vers num="1.4.1.4"/>
        <vers num="1.4.1.5"/>
        <vers num="1.4.1.6"/>
        <vers num="1.4.1.7"/>
        <vers num="1.4.1.8"/>
        <vers num="1.4.1.9"/>
        <vers num="1.4.2"/>
        <vers num="1.4.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1429" seq="2004-1429" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ArGoSoft FTP 1.4.2.4 and earlier does not limit the number of times that a bad password can be entered, which makes it easier for remote attackers to guess passwords via a brute force attack.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110451582011666&amp;w=2">20041231 ArGoSoft FTP Server reveals valid usernames and allows for brute</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18722">argosoft-bruteforce(18722)</ref>
    </refs>
    <vuln_soft>
      <prod name="ftp_server" vendor="argosoft">
        <vers num="1.4.1.1"/>
        <vers num="1.4.1.2"/>
        <vers num="1.4.1.3"/>
        <vers num="1.4.1.4"/>
        <vers num="1.4.1.5"/>
        <vers num="1.4.1.6"/>
        <vers num="1.4.1.7"/>
        <vers num="1.4.1.8"/>
        <vers num="1.4.1.9"/>
        <vers num="1.4.2"/>
        <vers num="1.4.2.1"/>
        <vers num="1.4.2.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1430" seq="2004-1430" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the show_stats module in Arcade.php in IbProArcade allows remote attackers to execute arbitrary SQL code via the gameid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110451448630711&amp;w=2">20041231 SQL Injection Vulnerability In IBProArcade</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12138">12138</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18720">ibproarcade-gameid-sql-injection(18720)</ref>
    </refs>
    <vuln_soft>
      <prod name="ipbproarcade" vendor="ipbproarcade">
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1431" seq="2004-1431" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">FormMail.php 5.0, and possibly other versions, allows remote attackers to read arbitrary files via a full pathname in the ar_file (auto-reply) parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110460092827419&amp;w=2">20041231 Jacks FormMail.php remote file access vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12145">12145</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18724">jack-formmail-arfile-view-files(18724)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1432" seq="2004-1432" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed (1) IP or (2) ICMP packets.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" adv="1">20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/918920" adv="1">VU#918920</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/969344" adv="1">VU#969344</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10768">10768</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16760">cisco-ons-ip-dos(16760)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16761">cisco-ons-icmp-dos(16761)</ref>
    </refs>
    <vuln_soft>
      <prod name="optical_networking_systems_software" vendor="cisco">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.1(0)"/>
        <vers num="1.1(1)"/>
        <vers num="1.3(0)"/>
        <vers num="2.3(5)"/>
        <vers num="3.0"/>
        <vers num="3.1.0"/>
        <vers num="3.2"/>
        <vers num="3.2.0"/>
        <vers num="3.3.0"/>
        <vers num="3.4.0"/>
        <vers num="4.0(0)"/>
        <vers num="4.0(1)"/>
        <vers num="4.0(2)"/>
        <vers num="4.0.0"/>
        <vers num="4.1(0)"/>
        <vers num="4.1(1)"/>
        <vers num="4.1(2)"/>
        <vers num="4.1(3)"/>
        <vers num="4.5"/>
        <vers num="4.6(0)"/>
        <vers num="4.6(1)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1433" seq="2004-1433" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, and ONS 15600 1.x(x), allows remote attackers to cause a denial of service (control card reset) via malformed (1) TCP and (2) UDP packets.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" adv="1">20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/486224" adv="1">VU#486224</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/800384" adv="1">VU#800384</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10768">10768</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16762">cisco-ons-tcp-dos(16762)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16764">cisco-ons-udp-dos(16764)</ref>
    </refs>
    <vuln_soft>
      <prod name="optical_networking_systems_software" vendor="cisco">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.1(0)"/>
        <vers num="1.1(1)"/>
        <vers num="1.3(0)"/>
        <vers num="2.3(5)"/>
        <vers num="3.0"/>
        <vers num="3.1.0"/>
        <vers num="3.2"/>
        <vers num="3.2.0"/>
        <vers num="3.3.0"/>
        <vers num="3.4.0"/>
        <vers num="4.0(0)"/>
        <vers num="4.0(1)"/>
        <vers num="4.0(2)"/>
        <vers num="4.0.0"/>
        <vers num="4.1(0)"/>
        <vers num="4.1(1)"/>
        <vers num="4.1(2)"/>
        <vers num="4.1(3)"/>
        <vers num="4.5"/>
        <vers num="4.6(0)"/>
        <vers num="4.6(1)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1434" seq="2004-1434" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.1(0) to 4.1(2), 4.5(x), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed SNMP packets.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" adv="1">20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/548968">VU#548968</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10768">10768</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16765">cisco-ons-snmp-dos(16765)</ref>
    </refs>
    <vuln_soft>
      <prod name="optical_networking_systems_software" vendor="cisco">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.1(0)"/>
        <vers num="1.1(1)"/>
        <vers num="1.3(0)"/>
        <vers num="2.3(5)"/>
        <vers num="3.0"/>
        <vers num="3.1.0"/>
        <vers num="3.2"/>
        <vers num="3.2.0"/>
        <vers num="3.3.0"/>
        <vers num="3.4.0"/>
        <vers num="4.0(0)"/>
        <vers num="4.0(1)"/>
        <vers num="4.0(2)"/>
        <vers num="4.0.0"/>
        <vers num="4.1(0)"/>
        <vers num="4.1(1)"/>
        <vers num="4.1(2)"/>
        <vers num="4.1(3)"/>
        <vers num="4.5"/>
        <vers num="4.6(0)"/>
        <vers num="4.6(1)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1435" seq="2004-1435" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via a large number of TCP connections with an invalid response instead of the final ACK (TCP-ACK).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" adv="1">20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/277048" adv="1">VU#277048</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10768">10768</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16763">cisco-ons-tcp-ack-dos(16763)</ref>
    </refs>
    <vuln_soft>
      <prod name="optical_networking_systems_software" vendor="cisco">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.1(0)"/>
        <vers num="1.1(1)"/>
        <vers num="1.3(0)"/>
        <vers num="2.3(5)"/>
        <vers num="3.0"/>
        <vers num="3.1.0"/>
        <vers num="3.2"/>
        <vers num="3.2.0"/>
        <vers num="3.3.0"/>
        <vers num="3.4.0"/>
        <vers num="4.0(0)"/>
        <vers num="4.0(1)"/>
        <vers num="4.0(2)"/>
        <vers num="4.0.0"/>
        <vers num="4.1(0)"/>
        <vers num="4.1(1)"/>
        <vers num="4.1(2)"/>
        <vers num="4.1(3)"/>
        <vers num="4.5"/>
        <vers num="4.6(0)"/>
        <vers num="4.6(1)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1436" seq="2004-1436" published="2004-12-31" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Transaction Language 1 (TL1) login interface in Cisco ONS 15327 4.6(0) and 4.6(1) and 15454 and 15454 SDH 4.6(0) and 4.6(1), when a user account is configured with a blank password, allows remote attackers to gain unauthorized access by logging in with a password larger than 10 characters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml" adv="1">20040721 Cisco ONS 15327, ONS 15454, ONS 15454 SDH, and ONS 15600 Malformed Packet Vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/760432" adv="1">VU#760432</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10768">10768</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16766">cisco-ons-tl1-auth-bypass(16766)</ref>
    </refs>
    <vuln_soft>
      <prod name="optical_networking_systems_software" vendor="cisco">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.1(0)"/>
        <vers num="1.1(1)"/>
        <vers num="1.3(0)"/>
        <vers num="2.3(5)"/>
        <vers num="3.0"/>
        <vers num="3.1.0"/>
        <vers num="3.2"/>
        <vers num="3.2.0"/>
        <vers num="3.3.0"/>
        <vers num="3.4.0"/>
        <vers num="4.0(0)"/>
        <vers num="4.0(1)"/>
        <vers num="4.0(2)"/>
        <vers num="4.0.0"/>
        <vers num="4.1(0)"/>
        <vers num="4.1(1)"/>
        <vers num="4.1(2)"/>
        <vers num="4.1(3)"/>
        <vers num="4.5"/>
        <vers num="4.6(0)"/>
        <vers num="4.6(1)"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1437" seq="2004-1437" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the digest authentication functionality in Pavuk 0.9.28-r2 and earlier allow remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-19.xml" patch="1">GLSA-200407-19</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10797" patch="1">10797</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16807">pavuk-digest-auth-bo(16807)</ref>
    </refs>
    <vuln_soft>
      <prod name="pavuk" vendor="pavuk">
        <vers num="0.9pl28i"/>
        <vers num="0.928r1"/>
        <vers num="0.928r2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1438" seq="2004-1438" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The mod_authz_svn Apache module for Subversion 1.0.4-r1 and earlier allows remote authenticated users, with write access to the repository, to read unauthorized parts of the repository via the svn copy command.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/60">60</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010779">1010779</ref>
      <ref source="CONFIRM" url="http://svn.collab.net/repos/svn/tags/1.0.6/CHANGES">http://svn.collab.net/repos/svn/tags/1.0.6/CHANGES</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-20.xml" patch="1">GLSA-200407-20</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10800" patch="1">10800</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16803">subversion-modauthzsvn-restriction-bypass(16803)</ref>
    </refs>
    <vuln_soft>
      <prod name="subversion" vendor="subversion">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1439" seq="2004-1439" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in BlackJumboDog 3.x allows remote attackers to execute arbitrary code via long FTP commands such as (1) USER, (2) PASS, (3) RETR,(4) CWD, (5) XMKD, and (6) XRMD.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.ir3ip.net/pipermail/bugtraq/2004-September/009960.html">20040910 BlackJumboDog FTP Server version 3.6.1 Buffer Overflow [Exploit included]</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/714584" adv="1" patch="1">VU#714584</ref>
      <ref source="MISC" url="http://www.security.org.sg/vuln/bjd361.html">http://www.security.org.sg/vuln/bjd361.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10834" patch="1">10834</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16842">blackjumbodog-long-string-bo(16842)</ref>
    </refs>
    <vuln_soft>
      <prod name="black_jumbodog" vendor="sapporoworks">
        <vers num="3.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1440" seq="2004-1440" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple heap-based buffer overflows in the modpow function in PuTTY before 0.55 allow (1) remote attackers to execute arbitrary code via an SSH2 packet with a base argument that is larger than the mod argument, which causes the modpow function to write memory before the beginning of its buffer, and (2) remote malicious servers to cause a denial of service (client crash) and possibly execute arbitrary code via a large bignum during authentication.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109167869528138&amp;w=2">20040804 CORE-2004-0705: Vulnerabilities in PuTTY and PSCP</ref>
      <ref source="CONFIRM" url="http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html">http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html</ref>
      <ref source="CONFIRM" url="http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-modpow.html">http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-modpow.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-04.xml" patch="1">GLSA-200408-04</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10850" patch="1">10850</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16885">putty-code-execution(16885)</ref>
    </refs>
    <vuln_soft>
      <prod name="putty" vendor="putty">
        <vers num="0.48"/>
        <vers num="0.49"/>
        <vers num="0.50"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.53b"/>
        <vers num="0.54"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1441" seq="2004-1441" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in icq.cgi in Board Power 2.04PF allows remote attackers to inject arbitrary web script or HTML via the action parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0642.html">20040715 XSS in Board Power forum</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/744590">VU#744590</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10734">10734</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16698">boardpower-icq-xss(16698)</ref>
    </refs>
    <vuln_soft>
      <prod name="board_power" vendor="board_power">
        <vers num="2.04pf"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1442" seq="2004-1442" published="2004-12-31" modified="2017-07-11" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in db2www CGI interpreter in IBM Net.Data 7 and 7.2 allows remote attackers to inject arbitrary web script or HTML via a macro filename, which is not properly handled by error messages such as "DTWP001E."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0019.html">20040126 Secunia Research: IBM Net.Data Macro Name Cross-Site Scripting Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/197318" adv="1">VU#197318</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/DMOA-5VNPEL" adv="1">http://www.kb.cert.org/vuls/id/DMOA-5VNPEL</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9488">9488</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008845">1008845</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14925">ibm-netdata-db2wwwcomponent-xss(14925)</ref>
    </refs>
    <vuln_soft>
      <prod name="net.data" vendor="ibm">
        <vers num="7.0"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1443" seq="2004-1443" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the inline MIME viewer in Horde-IMP (Internet Messaging Program) 3.2.4 and earlier, when used with Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via an e-mail message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&amp;r2=1.389.2.109&amp;ty=h">http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&amp;r2=1.389.2.109&amp;ty=h</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-07.xml" patch="1">GLSA-200408-07</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10845" patch="1">10845</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16866">imp-html-viewer-xss(16866)</ref>
    </refs>
    <vuln_soft>
      <prod name="imp" vendor="horde">
        <vers num="2.0"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
        <vers num="2.3"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.1.2"/>
        <vers num="3.2"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2"/>
        <vers num="3.2.3"/>
        <vers num="3.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1444" seq="2004-1444" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Roundup 0.6.4 and earlier allows remote attackers to view arbitrary files via .. (dot dot) sequences in an @@ command in an HTTP GET request.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://packetstormsecurity.nl/0406-exploits/roundUP.txt">http://packetstormsecurity.nl/0406-exploits/roundUP.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010415">1010415</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=961511&amp;group_id=31577&amp;atid=402788">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=961511&amp;group_id=31577&amp;atid=402788</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-09.xml" patch="1">GLSA-200408-09</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10495" patch="1">10495</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16350">roundup-get-view-file(16350)</ref>
    </refs>
    <vuln_soft>
      <prod name="roundup" vendor="roundup-tracker">
        <vers num="0.1.0"/>
        <vers num="0.1.1"/>
        <vers num="0.1.2"/>
        <vers num="0.1.3"/>
        <vers num="0.2.0"/>
        <vers num="0.2.1"/>
        <vers num="0.2.2"/>
        <vers num="0.2.3"/>
        <vers num="0.2.4"/>
        <vers num="0.2.5"/>
        <vers num="0.2.6"/>
        <vers num="0.2.7"/>
        <vers num="0.2.8"/>
        <vers num="0.3.0" edition="pre1"/>
        <vers num="0.3.0" edition="pre2"/>
        <vers num="0.3.0" edition="pre3"/>
        <vers num="0.4.0" edition="b1"/>
        <vers num="0.4.0" edition="b2"/>
        <vers num="0.4.1"/>
        <vers num="0.4.2" edition="pr1"/>
        <vers num="0.5"/>
        <vers num="0.5.0" edition="beta1"/>
        <vers num="0.5.0" edition="beta2"/>
        <vers num="0.5.0" edition="pr1"/>
        <vers num="0.5.1"/>
        <vers num="0.5.2"/>
        <vers num="0.5.3"/>
        <vers num="0.5.4"/>
        <vers num="0.5.5"/>
        <vers num="0.5.6"/>
        <vers num="0.5.7"/>
        <vers num="0.5.8" edition="stable"/>
        <vers num="0.5.9"/>
        <vers num="0.6.0" edition="b1"/>
        <vers num="0.6.0" edition="b2"/>
        <vers num="0.6.0" edition="b3"/>
        <vers num="0.6.0" edition="b4"/>
        <vers num="0.6.1"/>
        <vers num="0.6.2"/>
        <vers num="0.6.3"/>
        <vers num="0.6.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1445" seq="2004-1445" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="3.7" CVSS_base_score="3.7" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">A race condition in nessus-adduser in Nessus 2.0.11 and possibly earlier versions, if the TMPDIR environment variable is not set, allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-11.xml" patch="1">GLSA-200408-11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10784" patch="1">10784</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16768">nessus-adduser-race-condition(16768)</ref>
    </refs>
    <vuln_soft>
      <prod name="nessus" vendor="nessus">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.0.10"/>
        <vers num="2.0.11"/>
        <vers num="2.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1446" seq="2004-1446" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt" patch="1">http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/749870">VU#749870</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10854" patch="1">10854</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16876">netscreen-screenos-sshv1-dos(16876)</ref>
    </refs>
    <vuln_soft>
      <prod name="netscreen_screenos" vendor="juniper">
        <vers num="1.7"/>
        <vers num="1.64"/>
        <vers num="1.66"/>
        <vers num="1.66_r2"/>
        <vers num="1.73_r1"/>
        <vers num="1.73_r2"/>
        <vers num="2.0.1_r8"/>
        <vers num="2.1"/>
        <vers num="2.1_r6"/>
        <vers num="2.1_r7"/>
        <vers num="2.5"/>
        <vers num="2.5r1"/>
        <vers num="2.5r2"/>
        <vers num="2.5r6"/>
        <vers num="2.6.0"/>
        <vers num="2.6.1"/>
        <vers num="2.6.1r1"/>
        <vers num="2.6.1r2"/>
        <vers num="2.6.1r3"/>
        <vers num="2.6.1r4"/>
        <vers num="2.6.1r5"/>
        <vers num="2.6.1r6"/>
        <vers num="2.6.1r7"/>
        <vers num="2.6.1r8"/>
        <vers num="2.6.1r9"/>
        <vers num="2.6.1r10"/>
        <vers num="2.6.1r11"/>
        <vers num="2.6.1r12"/>
        <vers num="2.7.1"/>
        <vers num="2.7.1r1"/>
        <vers num="2.7.1r2"/>
        <vers num="2.7.1r3"/>
        <vers num="2.8"/>
        <vers num="2.8_r1"/>
        <vers num="2.10_r3"/>
        <vers num="2.10_r4"/>
        <vers num="3.0.0"/>
        <vers num="3.0.0r1"/>
        <vers num="3.0.0r2"/>
        <vers num="3.0.0r3"/>
        <vers num="3.0.0r4"/>
        <vers num="3.0.1"/>
        <vers num="3.0.1r1"/>
        <vers num="3.0.1r2"/>
        <vers num="3.0.1r3"/>
        <vers num="3.0.1r4"/>
        <vers num="3.0.1r5"/>
        <vers num="3.0.1r6"/>
        <vers num="3.0.1r7"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.3_r1.1"/>
        <vers num="3.0.3r1"/>
        <vers num="3.0.3r2"/>
        <vers num="3.0.3r3"/>
        <vers num="3.0.3r4"/>
        <vers num="3.0.3r5"/>
        <vers num="3.0.3r6"/>
        <vers num="3.0.3r7"/>
        <vers num="3.0.3r8"/>
        <vers num="3.1.0"/>
        <vers num="3.1.0r1"/>
        <vers num="3.1.0r2"/>
        <vers num="3.1.0r3"/>
        <vers num="3.1.0r4"/>
        <vers num="3.1.0r5"/>
        <vers num="3.1.0r6"/>
        <vers num="3.1.0r7"/>
        <vers num="3.1.0r8"/>
        <vers num="3.1.0r9"/>
        <vers num="3.1.0r10"/>
        <vers num="3.1.0r11"/>
        <vers num="3.1.0r12"/>
        <vers num="3.1.1_r2"/>
        <vers num="4.0.0" edition=":dial"/>
        <vers num="4.0.0r1"/>
        <vers num="4.0.0r2"/>
        <vers num="4.0.0r3"/>
        <vers num="4.0.0r4"/>
        <vers num="4.0.0r5"/>
        <vers num="4.0.0r6"/>
        <vers num="4.0.0r7"/>
        <vers num="4.0.0r8"/>
        <vers num="4.0.0r9"/>
        <vers num="4.0.0r10"/>
        <vers num="4.0.0r11"/>
        <vers num="4.0.0r12"/>
        <vers num="4.0.1"/>
        <vers num="4.0.1r1"/>
        <vers num="4.0.1r2"/>
        <vers num="4.0.1r3"/>
        <vers num="4.0.1r4"/>
        <vers num="4.0.1r5"/>
        <vers num="4.0.1r6"/>
        <vers num="4.0.1r7"/>
        <vers num="4.0.1r8"/>
        <vers num="4.0.1r9"/>
        <vers num="4.0.1r10"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.3r1"/>
        <vers num="4.0.3r2"/>
        <vers num="4.0.3r3"/>
        <vers num="4.0.3r4"/>
        <vers num="5.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1447" seq="2004-1447" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Jetbox One 2.0.8 and possibly other versions stores passwords in the database in plaintext, which could allow attackers to gain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://echo.or.id/adv/adv03-y3dips-2004.txt">http://echo.or.id/adv/adv03-y3dips-2004.txt</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/586720">VU#586720</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/370852">20040804 vulnerabilities in JetboxOne CMS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10858">10858</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16898">jetbox-one-plaintext-password(16898)</ref>
    </refs>
    <vuln_soft>
      <prod name="jetbox_one_cms" vendor="jetbox">
        <vers num="2.0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1448" seq="2004-1448" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Jetbox One 2.0.8 and possibly other versions allow remote attackers with Author privileges in the IMAGES module to upload PHP files and execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://echo.or.id/adv/adv03-y3dips-2004.txt">http://echo.or.id/adv/adv03-y3dips-2004.txt</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/417408" adv="1">VU#417408</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/370852">20040804 vulnerabilities in JetboxOne CMS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10859">10859</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16900">jetbox-one-file-upload(16900)</ref>
    </refs>
    <vuln_soft>
      <prod name="jetbox_one_cms" vendor="jetbox">
        <vers num="2.0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1449" seq="2004-1449" published="2004-12-31" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7 allows remote attackers to determine the location of files on a user's hard drive by obscuring a file upload control and tricking the user into dragging text into that control.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=206859#c0">http://bugzilla.mozilla.org/show_bug.cgi?id=206859#c0</ref>
    </refs>
    <vuln_soft>
      <prod name="firebird" vendor="firebirdsql">
        <vers num="0.7"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9.2"/>
        <vers num="0.9.2.1"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.4.1"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.35"/>
        <vers num="0.9.48"/>
        <vers num="1.0" edition="rc1"/>
        <vers num="1.0" edition="rc2"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.2" edition="alpha"/>
        <vers num="1.2" edition="beta"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4" edition="beta"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.4"/>
        <vers num="1.5"/>
        <vers num="1.5.1"/>
        <vers num="1.6"/>
      </prod>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1450" seq="2004-1450" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in LiveConnect in Mozilla 1.7 beta allows remote attackers to read arbitrary files in known locations.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=239122" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=239122</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html">http://www.mozilla.org/projects/security/known-vulnerabilities.html</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.7" edition="beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1451" seq="2004-1451" published="2004-12-31" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla before 1.6 does not display the entire URL in the status bar when a link contains %00, which could allow remote attackers to trick users into clicking on unknown or untrusted sites and facilitate phishing attacks.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.mozilla.org/show_bug.cgi?id=228176" patch="1">http://bugzilla.mozilla.org/show_bug.cgi?id=228176</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/known-vulnerabilities.html">http://www.mozilla.org/projects/security/known-vulnerabilities.html</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9.2"/>
        <vers num="0.9.2.1"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.4.1"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.35"/>
        <vers num="0.9.48"/>
        <vers num="1.0" edition="rc1"/>
        <vers num="1.0" edition="rc2"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.2" edition="alpha"/>
        <vers num="1.2" edition="beta"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4" edition="beta"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.4"/>
        <vers num="1.5"/>
        <vers num="1.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1452" seq="2004-1452" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Tomcat before 5.0.27-r3 in Gentoo Linux sets the default permissions on the init scripts as tomcat:tomcat, but executes the scripts with root privileges, which could allow local users in the tomcat group to execute arbitrary commands as root by modifying the scripts.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-15.xml" patch="1">GLSA-200408-15</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10951" patch="1">10951</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16993">gentoo-tomcat-gain-privileges(16993)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux" vendor="gentoo">
        <vers num="0.5"/>
        <vers num="0.7"/>
        <vers num="1.1a"/>
        <vers num="1.2"/>
        <vers num="1.4" edition="rc1"/>
        <vers num="1.4" edition="rc2"/>
        <vers num="1.4" edition="rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1453" seq="2004-1453" published="2004-12-31" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">GNU glibc 2.3.4 before 2.3.4.20040619, 2.3.3 before 2.3.3.20040420, and 2.3.2 before 2.3.2-r10 does not restrict the use of LD_DEBUG for a setuid program, which allows local users to gain sensitive information, such as the list of symbols used by the program.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.gentoo.org/show_bug.cgi?id=59526">http://bugs.gentoo.org/show_bug.cgi?id=59526</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-16.xml">GLSA-200408-16</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-256.html" adv="1">RHSA-2005:256</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-261.html" adv="1">RHSA-2005:261</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10963" patch="1">10963</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17006">glibc-suid-info-disclosure(17006)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10762">oval:org.mitre.oval:def:10762</ref>
    </refs>
    <vuln_soft>
      <prod name="glibc" vendor="gnu">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.1.6"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.3.10"/>
        <vers num="2.1.9"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.3"/>
        <vers num="2.3.1"/>
        <vers num="2.3.2"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1454" seq="2004-1454" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Cisco IOS 12.0S, 12.2, and 12.3, with Open Shortest Path First (OSPF) enabled, allows remote attackers to cause a denial of service (device reload) via a malformed OSPF packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-199.shtml" adv="1">O-199</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml" adv="1">20040818 Cisco IOS Malformed OSPF Packet Causes Reload</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/989406" adv="1" patch="1">VU#989406</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10971">10971</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17033">cisco-ios-ospf-dos(17033)</ref>
    </refs>
    <vuln_soft>
      <prod name="ios" vendor="cisco">
        <vers num="12.0(22)s"/>
        <vers num="12.0(22)s4"/>
        <vers num="12.0(22)s5"/>
        <vers num="12.0(22)sy"/>
        <vers num="12.0(23)sx"/>
        <vers num="12.0(23)sz"/>
        <vers num="12.2(11)yu"/>
        <vers num="12.2(11)yv"/>
        <vers num="12.2(13)zd"/>
        <vers num="12.2(13)ze"/>
        <vers num="12.2(13)zf"/>
        <vers num="12.2(13)zg"/>
        <vers num="12.2(13)zh"/>
        <vers num="12.2(14)sz"/>
        <vers num="12.2(14)sz1"/>
        <vers num="12.2(14)sz2"/>
        <vers num="12.2(15)b"/>
        <vers num="12.2(15)bc"/>
        <vers num="12.2(15)bc1"/>
        <vers num="12.2(15)bx"/>
        <vers num="12.2(15)bz"/>
        <vers num="12.2(15)cx"/>
        <vers num="12.2(15)mc1"/>
        <vers num="12.2(15)t"/>
        <vers num="12.2(15)t5"/>
        <vers num="12.2(15)zj"/>
        <vers num="12.2(15)zj1"/>
        <vers num="12.2(15)zj2"/>
        <vers num="12.2(15)zj3"/>
        <vers num="12.2(15)zk"/>
        <vers num="12.2(15)zl"/>
        <vers num="12.2(15)zl1"/>
        <vers num="12.2(15)zn"/>
        <vers num="12.2(15)zo"/>
        <vers num="12.2(18)ew"/>
        <vers num="12.2(18)s"/>
        <vers num="12.2(18)se"/>
        <vers num="12.2(18)sv"/>
        <vers num="12.2(18)sw"/>
        <vers num="12.3"/>
        <vers num="12.3(1a)"/>
        <vers num="12.3(2)t3"/>
        <vers num="12.3(2)xc1"/>
        <vers num="12.3(2)xc2"/>
        <vers num="12.3(2)xc3"/>
        <vers num="12.3(3e)"/>
        <vers num="12.3(4)eo1"/>
        <vers num="12.3(4)t"/>
        <vers num="12.3(4)t1"/>
        <vers num="12.3(4)t2"/>
        <vers num="12.3(4)t3"/>
        <vers num="12.3(4)t4"/>
        <vers num="12.3(4)xd"/>
        <vers num="12.3(4)xd1"/>
        <vers num="12.3(4)xd2"/>
        <vers num="12.3(4)xg1"/>
        <vers num="12.3(4)xh"/>
        <vers num="12.3(4)xk"/>
        <vers num="12.3(4)xq"/>
        <vers num="12.3(5)"/>
        <vers num="12.3(5)b1"/>
        <vers num="12.3(5a)"/>
        <vers num="12.3(5a)b"/>
        <vers num="12.3(5b)"/>
        <vers num="12.3(5c)"/>
        <vers num="12.3(6)"/>
        <vers num="12.3(6a)"/>
        <vers num="12.3(7)t"/>
        <vers num="12.3(7.7)"/>
        <vers num="12.3(9)"/>
        <vers num="12.3b"/>
        <vers num="12.3bw"/>
        <vers num="12.3t"/>
        <vers num="12.3xa"/>
        <vers num="12.3xb"/>
        <vers num="12.3xc"/>
        <vers num="12.3xe"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1455" seq="2004-1455" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Xine-lib-rc5 in xine-lib 1_rc5-r2 and earlier allows remote attackers to execute arbitrary code via crafted playlists that result in a long vcd:// URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109284737628045&amp;w=2">20040817 Open Security Group Advisory #6</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-18.xml" patch="1">GLSA-200408-18</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10890" patch="1">10890</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16930">xine-vcd-identifier-bo(16930)</ref>
    </refs>
    <vuln_soft>
      <prod name="xine-lib" vendor="xine">
        <vers num="1_beta1"/>
        <vers num="1_beta2"/>
        <vers num="1_beta3"/>
        <vers num="1_beta4"/>
        <vers num="1_beta5"/>
        <vers num="1_beta6"/>
        <vers num="1_beta7"/>
        <vers num="1_beta8"/>
        <vers num="1_beta9"/>
        <vers num="1_beta10"/>
        <vers num="1_beta11"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3a"/>
        <vers num="1_rc3b"/>
        <vers num="1_rc3c"/>
        <vers num="1_rc4"/>
        <vers num="1_rc5"/>
        <vers num="1_rc5_r2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1456" seq="2004-1456" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">filediff in CVStrac allows remote attackers to execute arbitrary commands via shell metacharacters in rcsinfo.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109173359428253&amp;w=2">20040805 CVStrac Remote Arbitrary Code Execution exploit</ref>
      <ref source="CONFIRM" url="http://www.cvstrac.org/cvstrac/chngview?cn=316" patch="1">http://www.cvstrac.org/cvstrac/chngview?cn=316</ref>
      <ref source="CONFIRM" url="http://www.cvstrac.org/cvstrac/tktview?tn=339">http://www.cvstrac.org/cvstrac/tktview?tn=339</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/770816" adv="1">VU#770816</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10878">10878</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16929">cvstrac-command-execute(16929)</ref>
    </refs>
    <vuln_soft>
      <prod name="cvstrac" vendor="cvstrac">
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1457" seq="2004-1457" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Virtual Private Network (VPN) capability in Novell Bordermanager 3.8 allows remote attackers to cause a denial of service (ABEND in IKE.NLM) via a malformed IKE packet, as sent by the Striker ISAKMP Protocol Test Suite.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.novell.com/cgi-bin/search/searchtid.cgi?/10093576.htm" patch="1">http://support.novell.com/cgi-bin/search/searchtid.cgi?/10093576.htm</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/432097" adv="1">VU#432097</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10727" patch="1">10727</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16697">novell-bordermanger-ikenlm-dos(16697)</ref>
    </refs>
    <vuln_soft>
      <prod name="bordermanager" vendor="novell">
        <vers num="3.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1458" seq="2004-1458" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The CSAdmin web administration interface for Cisco Secure Access Control Server (ACS) 3.2(2) build 15 allows remote attackers to cause a denial of service (hang) via a flood of TCP connections to port 2002.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-203.shtml">O-203</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml" adv="1" patch="1">20040825 Multiple Vulnerabilities in Cisco Secure Access Control Server</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11047">11047</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17114">ciscosecure-csadmin-tcp-dos(17114)</ref>
    </refs>
    <vuln_soft>
      <prod name="secure_access_control_server" vendor="cisco">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2" edition=":windows_server"/>
        <vers num="3.2(1)"/>
        <vers num="3.2(2)"/>
        <vers num="3.2(3)"/>
        <vers num="3.3"/>
        <vers num="3.3(1)"/>
      </prod>
      <prod name="secure_acs_solution_engine" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1459" seq="2004-1459" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Cisco Secure Access Control Server (ACS) 3.2, when configured as a Light Extensible Authentication Protocol (LEAP) RADIUS proxy, allows remote attackers to cause a denial of service (device crash) via certain LEAP authentication requests.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml" patch="1">20040825 Multiple Vulnerabilities in Cisco Secure Access Control Server</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11047">11047</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17116">ciscosecure-leap-radius-dos(17116)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1460" seq="2004-1460" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cisco Secure Access Control Server (ACS) 3.2(3) and earlier, when configured with an anonymous bind in Novell Directory Services (NDS) and authenticating NDS users with NDS, allows remote attackers to gain unauthorized access to AAA clients via a blank password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml" adv="1" patch="1">20040825 Multiple Vulnerabilities in Cisco Secure Access Control Server</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11047">11047</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17117">ciscosecure-nds-blank-authentication(17117)</ref>
    </refs>
    <vuln_soft>
      <prod name="secure_access_control_server" vendor="cisco">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2" edition=":windows_server"/>
        <vers num="3.2(1)"/>
        <vers num="3.2(2)"/>
        <vers num="3.2(3)"/>
        <vers num="3.3"/>
        <vers num="3.3(1)"/>
      </prod>
      <prod name="secure_acs_solution_engine" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1461" seq="2004-1461" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cisco Secure Access Control Server (ACS) 3.2(3) and earlier spawns a separate unauthenticated TCP connection on a random port when a user authenticates to the ACS GUI, which allows remote attackers to bypass authentication by connecting to that port from the same IP address.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml" adv="1" patch="1">20040825 Multiple Vulnerabilities in Cisco Secure Access Control Server</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11047">11047</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17118">ciscosecure-csadmin-auth-bypass(17118)</ref>
    </refs>
    <vuln_soft>
      <prod name="secure_access_control_server" vendor="cisco">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2" edition=":windows_server"/>
        <vers num="3.2(1)"/>
        <vers num="3.2(2)"/>
        <vers num="3.2(3)"/>
        <vers num="3.3"/>
        <vers num="3.3(1)"/>
      </prod>
      <prod name="secure_acs_solution_engine" vendor="cisco">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1462" seq="2004-1462" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in MoinMoin 1.2.2 and earlier allows remote attackers to gain unauthorized access to administrator functions such as (1) revert and (2) delete.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-25.xml" patch="1">GLSA-200408-25</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10805" patch="1">10805</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16833">moinmoin-acl-gain-privileges(16833)</ref>
      <ref source="CONFIRM" url="https://sourceforge.net/project/shownotes.php?group_id=8482&amp;release_id=254801" patch="1">https://sourceforge.net/project/shownotes.php?group_id=8482&amp;release_id=254801</ref>
    </refs>
    <vuln_soft>
      <prod name="moinmoin" vendor="moinmoin">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="0.10"/>
        <vers num="0.11"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1463" seq="2004-1463" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in the PageEditor in MoinMoin 1.2.2 and earlier, related to Access Control Lists (ACL), has unknown impact.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=8482&amp;release_id=254801" patch="1">http://sourceforge.net/project/shownotes.php?group_id=8482&amp;release_id=254801</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-25.xml" patch="1">GLSA-200408-25</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10801" patch="1">10801</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16832">moinmoin-pageeditor-gain-privilege(16832)</ref>
    </refs>
    <vuln_soft>
      <prod name="moinmoin" vendor="moinmoin">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="0.10"/>
        <vers num="0.11"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1464" seq="2004-1464" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011079">1011079</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040827-telnet.shtml" adv="1">20040827 Cisco Telnet Denial of Service Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/384230" adv="1" patch="1">VU#384230</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11060">11060</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17131">cisco-ios-telnet-dos(17131)</ref>
    </refs>
    <vuln_soft>
      <prod name="ios" vendor="cisco">
        <vers num="12.2" prev="1"/>
        <vers num="12.2(1)"/>
        <vers num="12.2(1)dx"/>
        <vers num="12.2(1)s"/>
        <vers num="12.2(1)t"/>
        <vers num="12.2(1)xa"/>
        <vers num="12.2(1)xd"/>
        <vers num="12.2(1)xd1"/>
        <vers num="12.2(1)xd3"/>
        <vers num="12.2(1)xd4"/>
        <vers num="12.2(1)xe"/>
        <vers num="12.2(1)xe2"/>
        <vers num="12.2(1)xe3"/>
        <vers num="12.2(1)xh"/>
        <vers num="12.2(1)xq"/>
        <vers num="12.2(1)xs"/>
        <vers num="12.2(1)xs1"/>
        <vers num="12.2(1.1)"/>
        <vers num="12.2(1.1)pi"/>
        <vers num="12.2(1.4)s"/>
        <vers num="12.2(1b)"/>
        <vers num="12.2(1b)da1"/>
        <vers num="12.2(1d)"/>
        <vers num="12.2(2)b"/>
        <vers num="12.2(2)bx"/>
        <vers num="12.2(2)by"/>
        <vers num="12.2(2)by2"/>
        <vers num="12.2(2)dd3"/>
        <vers num="12.2(2)t"/>
        <vers num="12.2(2)t1"/>
        <vers num="12.2(2)t4"/>
        <vers num="12.2(2)xa"/>
        <vers num="12.2(2)xa1"/>
        <vers num="12.2(2)xa5"/>
        <vers num="12.2(2)xb"/>
        <vers num="12.2(2)xb3"/>
        <vers num="12.2(2)xb4"/>
        <vers num="12.2(2)xb11"/>
        <vers num="12.2(2)xb14"/>
        <vers num="12.2(2)xb15"/>
        <vers num="12.2(2)xc1"/>
        <vers num="12.2(2)xf"/>
        <vers num="12.2(2)xg"/>
        <vers num="12.2(2)xh"/>
        <vers num="12.2(2)xh2"/>
        <vers num="12.2(2)xh3"/>
        <vers num="12.2(2)xi"/>
        <vers num="12.2(2)xi1"/>
        <vers num="12.2(2)xi2"/>
        <vers num="12.2(2)xj"/>
        <vers num="12.2(2)xj1"/>
        <vers num="12.2(2)xk"/>
        <vers num="12.2(2)xk2"/>
        <vers num="12.2(2)xn"/>
        <vers num="12.2(2)xt"/>
        <vers num="12.2(2)xt3"/>
        <vers num="12.2(2)xu"/>
        <vers num="12.2(2)xu2"/>
        <vers num="12.2(2)yc"/>
        <vers num="12.2(2.2)t"/>
        <vers num="12.2(3)"/>
        <vers num="12.2(3.4)bp"/>
        <vers num="12.2(3d)"/>
        <vers num="12.2(4)"/>
        <vers num="12.2(4)b"/>
        <vers num="12.2(4)b1"/>
        <vers num="12.2(4)b2"/>
        <vers num="12.2(4)b3"/>
        <vers num="12.2(4)b4"/>
        <vers num="12.2(4)bc1"/>
        <vers num="12.2(4)bc1a"/>
        <vers num="12.2(4)bx"/>
        <vers num="12.2(4)ja"/>
        <vers num="12.2(4)ja1"/>
        <vers num="12.2(4)mb3"/>
        <vers num="12.2(4)mb12"/>
        <vers num="12.2(4)mx"/>
        <vers num="12.2(4)mx1"/>
        <vers num="12.2(4)t"/>
        <vers num="12.2(4)t1"/>
        <vers num="12.2(4)t3"/>
        <vers num="12.2(4)t6"/>
        <vers num="12.2(4)xl"/>
        <vers num="12.2(4)xl4"/>
        <vers num="12.2(4)xm"/>
        <vers num="12.2(4)xm2"/>
        <vers num="12.2(4)xw"/>
        <vers num="12.2(4)xw1"/>
        <vers num="12.2(4)ya"/>
        <vers num="12.2(4)ya1"/>
        <vers num="12.2(4)ya7"/>
        <vers num="12.2(4)ya8"/>
        <vers num="12.2(4)yb"/>
        <vers num="12.2(5)"/>
        <vers num="12.2(5)ca1"/>
        <vers num="12.2(5d)"/>
        <vers num="12.2(6.8)t0a"/>
        <vers num="12.2(6.8)t1a"/>
        <vers num="12.2(6c)"/>
        <vers num="12.2(7)"/>
        <vers num="12.2(7)da"/>
        <vers num="12.2(7.4)s"/>
        <vers num="12.2(7a)"/>
        <vers num="12.2(7b)"/>
        <vers num="12.2(8)bc1"/>
        <vers num="12.2(8)ja"/>
        <vers num="12.2(8)t"/>
        <vers num="12.2(8)t10"/>
        <vers num="12.2(8)yd"/>
        <vers num="12.2(8)yw2"/>
        <vers num="12.2(8)yw3"/>
        <vers num="12.2(8)yy"/>
        <vers num="12.2(8)yy3"/>
        <vers num="12.2(8)zb7"/>
        <vers num="12.2(9)s"/>
        <vers num="12.2(10)da2"/>
        <vers num="12.2(10g)"/>
        <vers num="12.2(11)bc3c"/>
        <vers num="12.2(11)ja"/>
        <vers num="12.2(11)ja1"/>
        <vers num="12.2(11)t"/>
        <vers num="12.2(11)t2"/>
        <vers num="12.2(11)t3"/>
        <vers num="12.2(11)t8"/>
        <vers num="12.2(11)t9"/>
        <vers num="12.2(11)yp1"/>
        <vers num="12.2(11)yu"/>
        <vers num="12.2(11)yv"/>
        <vers num="12.2(11)yx1"/>
        <vers num="12.2(11)yz2"/>
        <vers num="12.2(12)"/>
        <vers num="12.2(12)da3"/>
        <vers num="12.2(12.02)s"/>
        <vers num="12.2(12.02)t"/>
        <vers num="12.2(12.05)"/>
        <vers num="12.2(12.05)s"/>
        <vers num="12.2(12.05)t"/>
        <vers num="12.2(12b)"/>
        <vers num="12.2(12c)"/>
        <vers num="12.2(12g)"/>
        <vers num="12.2(12h)"/>
        <vers num="12.2(12i)"/>
        <vers num="12.2(13)"/>
        <vers num="12.2(13)ja1"/>
        <vers num="12.2(13)mc1"/>
        <vers num="12.2(13)t"/>
        <vers num="12.2(13)t1"/>
        <vers num="12.2(13)t9"/>
        <vers num="12.2(13)zc"/>
        <vers num="12.2(13)zd"/>
        <vers num="12.2(13)ze"/>
        <vers num="12.2(13)zf"/>
        <vers num="12.2(13)zg"/>
        <vers num="12.2(13)zh"/>
        <vers num="12.2(13)zh3"/>
        <vers num="12.2(13)zj"/>
        <vers num="12.2(13)zk"/>
        <vers num="12.2(13)zl"/>
        <vers num="12.2(13.03)b"/>
        <vers num="12.2(13a)"/>
        <vers num="12.2(13e)"/>
        <vers num="12.2(14)s"/>
        <vers num="12.2(14)sx1"/>
        <vers num="12.2(14)sy"/>
        <vers num="12.2(14)sy1"/>
        <vers num="12.2(14)sy03"/>
        <vers num="12.2(14)sz"/>
        <vers num="12.2(14)sz1"/>
        <vers num="12.2(14)sz2"/>
        <vers num="12.2(14)za"/>
        <vers num="12.2(14)za2"/>
        <vers num="12.2(14)za8"/>
        <vers num="12.2(14.5)"/>
        <vers num="12.2(14.5)t"/>
        <vers num="12.2(15)b"/>
        <vers num="12.2(15)bc"/>
        <vers num="12.2(15)bc1"/>
        <vers num="12.2(15)bx"/>
        <vers num="12.2(15)bz"/>
        <vers num="12.2(15)cx"/>
        <vers num="12.2(15)mc1"/>
        <vers num="12.2(15)sl1"/>
        <vers num="12.2(15)t"/>
        <vers num="12.2(15)t5"/>
        <vers num="12.2(15)t7"/>
        <vers num="12.2(15)t8"/>
        <vers num="12.2(15)t9"/>
        <vers num="12.2(15)ys_1.2(1)"/>
        <vers num="12.2(15)zj"/>
        <vers num="12.2(15)zj1"/>
        <vers num="12.2(15)zj2"/>
        <vers num="12.2(15)zj3"/>
        <vers num="12.2(15)zk"/>
        <vers num="12.2(15)zl"/>
        <vers num="12.2(15)zl1"/>
        <vers num="12.2(15)zn"/>
        <vers num="12.2(15)zo"/>
        <vers num="12.2(15.1)s"/>
        <vers num="12.2(16)b"/>
        <vers num="12.2(16)b1"/>
        <vers num="12.2(16)bx"/>
        <vers num="12.2(16.1)b"/>
        <vers num="12.2(16.5)s"/>
        <vers num="12.2(16f)"/>
        <vers num="12.2(17)"/>
        <vers num="12.2(17)a"/>
        <vers num="12.2(17a)"/>
        <vers num="12.2(17a)sxa"/>
        <vers num="12.2(17b)sxa"/>
        <vers num="12.2(17d)"/>
        <vers num="12.2(17d)sxb"/>
        <vers num="12.2(18)ew"/>
        <vers num="12.2(18)s"/>
        <vers num="12.2(18)se"/>
        <vers num="12.2(18)sv"/>
        <vers num="12.2(18)sw"/>
        <vers num="12.2(18.2)"/>
        <vers num="12.2(19)"/>
        <vers num="12.2(19)b"/>
        <vers num="12.2(20)s"/>
        <vers num="12.2(20)s1"/>
        <vers num="12.2(20)s2"/>
        <vers num="12.2(21)"/>
        <vers num="12.2(21a)"/>
        <vers num="12.2(21b)"/>
        <vers num="12.2(22)s"/>
        <vers num="12.2(23)"/>
        <vers num="12.2(23)sw"/>
        <vers num="12.2(23.6)"/>
        <vers num="12.2(23a)"/>
        <vers num="12.2(24)"/>
        <vers num="12.2b"/>
        <vers num="12.2bc"/>
        <vers num="12.2bw"/>
        <vers num="12.2bx"/>
        <vers num="12.2by"/>
        <vers num="12.2bz"/>
        <vers num="12.2cx"/>
        <vers num="12.2cy"/>
        <vers num="12.2da"/>
        <vers num="12.2dd"/>
        <vers num="12.2dx"/>
        <vers num="12.2ew"/>
        <vers num="12.2ja"/>
        <vers num="12.2jk"/>
        <vers num="12.2mb"/>
        <vers num="12.2mc"/>
        <vers num="12.2mx"/>
        <vers num="12.2pb"/>
        <vers num="12.2pi"/>
        <vers num="12.2s"/>
        <vers num="12.2sa"/>
        <vers num="12.2se"/>
        <vers num="12.2su"/>
        <vers num="12.2sv"/>
        <vers num="12.2sw"/>
        <vers num="12.2sx"/>
        <vers num="12.2sxa"/>
        <vers num="12.2sxb"/>
        <vers num="12.2sxd"/>
        <vers num="12.2sy"/>
        <vers num="12.2sz"/>
        <vers num="12.2t"/>
        <vers num="12.2xa"/>
        <vers num="12.2xb"/>
        <vers num="12.2xc"/>
        <vers num="12.2xd"/>
        <vers num="12.2xe"/>
        <vers num="12.2xf"/>
        <vers num="12.2xg"/>
        <vers num="12.2xh"/>
        <vers num="12.2xi"/>
        <vers num="12.2xj"/>
        <vers num="12.2xk"/>
        <vers num="12.2xl"/>
        <vers num="12.2xm"/>
        <vers num="12.2xn"/>
        <vers num="12.2xq"/>
        <vers num="12.2xr"/>
        <vers num="12.2xs"/>
        <vers num="12.2xt"/>
        <vers num="12.2xu"/>
        <vers num="12.2xw"/>
        <vers num="12.2ya"/>
        <vers num="12.2yb"/>
        <vers num="12.2yc"/>
        <vers num="12.2yd"/>
        <vers num="12.2ye"/>
        <vers num="12.2yf"/>
        <vers num="12.2yg"/>
        <vers num="12.2yh"/>
        <vers num="12.2yj"/>
        <vers num="12.2yk"/>
        <vers num="12.2yl"/>
        <vers num="12.2ym"/>
        <vers num="12.2yn"/>
        <vers num="12.2yo"/>
        <vers num="12.2yp"/>
        <vers num="12.2yq"/>
        <vers num="12.2yr"/>
        <vers num="12.2ys"/>
        <vers num="12.2yt"/>
        <vers num="12.2yu"/>
        <vers num="12.2yv"/>
        <vers num="12.2yw"/>
        <vers num="12.2yx"/>
        <vers num="12.2yy"/>
        <vers num="12.2yz"/>
        <vers num="12.2za"/>
        <vers num="12.2zb"/>
        <vers num="12.2zc"/>
        <vers num="12.2zd"/>
        <vers num="12.2ze"/>
        <vers num="12.2zf"/>
        <vers num="12.2zg"/>
        <vers num="12.2zh"/>
        <vers num="12.2zi"/>
        <vers num="12.2zj"/>
        <vers num="12.2zk"/>
        <vers num="12.2zl"/>
        <vers num="12.2zn"/>
        <vers num="12.2zo"/>
        <vers num="12.2zp"/>
        <vers num="12.2zq"/>
        <vers num="12.3"/>
        <vers num="12.3(1a)"/>
        <vers num="12.3(2)t3"/>
        <vers num="12.3(2)xc1"/>
        <vers num="12.3(2)xc2"/>
        <vers num="12.3(2)xc3"/>
        <vers num="12.3(3e)"/>
        <vers num="12.3(4)eo1"/>
        <vers num="12.3(4)t"/>
        <vers num="12.3(4)t1"/>
        <vers num="12.3(4)t2"/>
        <vers num="12.3(4)t3"/>
        <vers num="12.3(4)t4"/>
        <vers num="12.3(4)xd"/>
        <vers num="12.3(4)xd1"/>
        <vers num="12.3(4)xd2"/>
        <vers num="12.3(4)xg1"/>
        <vers num="12.3(4)xh"/>
        <vers num="12.3(4)xk"/>
        <vers num="12.3(4)xq"/>
        <vers num="12.3(5)"/>
        <vers num="12.3(5)b1"/>
        <vers num="12.3(5a)"/>
        <vers num="12.3(5a)b"/>
        <vers num="12.3(5b)"/>
        <vers num="12.3(5c)"/>
        <vers num="12.3(6)"/>
        <vers num="12.3(6a)"/>
        <vers num="12.3(7)t"/>
        <vers num="12.3(7.7)"/>
        <vers num="12.3(9)"/>
        <vers num="12.3b"/>
        <vers num="12.3bc"/>
        <vers num="12.3bw"/>
        <vers num="12.3ja"/>
        <vers num="12.3t"/>
        <vers num="12.3xa"/>
        <vers num="12.3xb"/>
        <vers num="12.3xc"/>
        <vers num="12.3xd"/>
        <vers num="12.3xe"/>
        <vers num="12.3xf"/>
        <vers num="12.3xg"/>
        <vers num="12.3xh"/>
        <vers num="12.3xi"/>
        <vers num="12.3xj"/>
        <vers num="12.3xk"/>
        <vers num="12.3xl"/>
        <vers num="12.3xm"/>
        <vers num="12.3xn"/>
        <vers num="12.3xq"/>
        <vers num="12.3xr"/>
        <vers num="12.3xt"/>
        <vers num="12.3xu"/>
        <vers num="12.3yd"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1465" seq="2004-1465" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="3.7" CVSS_base_score="3.7" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in WinZip 9.0 and earlier may allow attackers to execute arbitrary code via multiple vectors, including the command line.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109416099301369&amp;w=2">20040901 WinZip Unspecified Buffer Overflows May Let Remote or Local Users Execute Arbitrary Code</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011132" patch="1">1011132</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-211.shtml" adv="1">O-211</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11092" patch="1">11092</ref>
      <ref source="CONFIRM" url="http://www.winzip.com/wz90sr1.htm" patch="1">http://www.winzip.com/wz90sr1.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17192">winzip-code-execution(17192)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17197">winzip-command-line-bo(17197)</ref>
    </refs>
    <vuln_soft>
      <prod name="winzip" vendor="winzip">
        <vers num="7.0"/>
        <vers num="8.0"/>
        <vers num="8.1" edition="sr1"/>
        <vers num="9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1466" seq="2004-1466" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The set_time_limit function in Gallery before 1.4.4_p2 deletes non-image files in a temporary directory every 30 seconds after they have been uploaded using save_photos.php, which allows remote attackers to upload and execute execute arbitrary scripts before they are deleted, if the temporary directory is under the web root.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0757.html">20040817 Gallery 1.4.4 save_photos.php PHP Insertion Proof of Concept</ref>
      <ref source="CONFIRM" url="http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=134&amp;mode=thread&amp;order=0&amp;thold=0" patch="1">http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=134&amp;mode=thread&amp;order=0&amp;thold=0</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-05.xml" patch="1">GLSA-200409-05</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10968" patch="1">10968</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17021">gallery-savephotos-file-upload(17021)</ref>
    </refs>
    <vuln_soft>
      <prod name="gallery" vendor="gallery_project">
        <vers num="1.4.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1467" seq="2004-1467" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in eGroupWare 1.0.00.003 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) date or search text field in the calendar module, (2) Field parameter, Filter parameter, QField parameter, Start parameter or Search field in the address module, (3) Subject field in the message module or (4) Subject field in the Ticket module.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=401807">http://sourceforge.net/forum/forum.php?forum_id=401807</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-06.xml" patch="1">GLSA-200409-06</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/372603">20040822 Multiple Cross Site Scripting Vulnerabilities in eGroupWare</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11013" patch="1">11013</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17078">egroupware-mult-modules-xss(17078)</ref>
    </refs>
    <vuln_soft>
      <prod name="egroupware" vendor="egroupware">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1468" seq="2004-1468" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The web mail functionality in Usermin 1.x and Webmin 1.x allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-15.xml" patch="1">GLSA-200409-15</ref>
      <ref source="MISC" url="http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/77_e.html">http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/77_e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11122" patch="1">1122</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17293">usermin-web-mail-command-execution(17293)</ref>
    </refs>
    <vuln_soft>
      <prod name="usermin" vendor="usermin">
        <vers num="1.000"/>
        <vers num="1.010"/>
        <vers num="1.020"/>
        <vers num="1.030"/>
        <vers num="1.040"/>
        <vers num="1.051"/>
        <vers num="1.060"/>
        <vers num="1.070"/>
        <vers num="1.080"/>
      </prod>
      <prod name="webmin" vendor="webmin">
        <vers num="1.0.00"/>
        <vers num="1.0.20"/>
        <vers num="1.0.50"/>
        <vers num="1.0.60"/>
        <vers num="1.0.70"/>
        <vers num="1.0.80"/>
        <vers num="1.0.90"/>
        <vers num="1.1.00"/>
        <vers num="1.1.10"/>
        <vers num="1.1.21"/>
        <vers num="1.1.30"/>
        <vers num="1.1.40"/>
        <vers num="1.1.50"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1469" seq="2004-1469" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in the log function in SUS 2.0.2, and other versions before 2.0.6, allows local users to execute arbitrary code via format string specifiers in a command line argument that is passed directly to syslog.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109517782910407&amp;w=2">20040914 SUS 2.0.2 local root vulnerability</ref>
      <ref source="CONFIRM" url="http://pdg.uow.edu.au/sus/CHANGES">http://pdg.uow.edu.au/sus/CHANGES</ref>
      <ref source="MISC" url="http://security.lss.hr/index.php?page=details&amp;ID=LSS-2004-09-01" adv="1" patch="1">http://security.lss.hr/index.php?page=details&amp;ID=LSS-2004-09-01</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-17.xml" patch="1">GLSA-200409-17</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11176" patch="1">11176</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17361">sus-log-format-string(17361)</ref>
    </refs>
    <vuln_soft>
      <prod name="sus" vendor="peter_d._gray">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1470" seq="2004-1470" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in SnipSnap 0.5.2a, and other versions before 1.0b1, allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109518773223511&amp;w=2">20040914 ADVISORY: http response splitting in snipsnap</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-23.xml" patch="1">GLSA-200409-23</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11180" patch="1">11180</ref>
      <ref source="CONFIRM" url="http://www.snipsnap.org/space/start">http://www.snipsnap.org/space/start</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17364">snipsnap-response-splitting(17364)</ref>
    </refs>
    <vuln_soft>
      <prod name="snipsnap" vendor="snipsnap">
        <vers num="0.5.2a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1471" seq="2004-1471" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:N/AC:H/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in wrapper.c in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16 allows remote attackers with CVSROOT commit access to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in a wrapper line.</descript>
    </desc>
    <impacts>
      <impact source="nvd">Failed exploit attempts will likely cause a denial of service condition.</impact>
    </impacts>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FREEBSD" url="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:14.cvs.asc" adv="1">FreeBSD-SA-04:14</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/022441.html" adv="1">20040609 Advisory 09/2004: More CVS remote vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10499" patch="1">10499</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16365">cvs-wrapper-format-string(16365)</ref>
    </refs>
    <vuln_soft>
      <prod name="cvs" vendor="cvs">
        <vers num="1.10.7"/>
        <vers num="1.10.8"/>
        <vers num="1.11"/>
        <vers num="1.11.1"/>
        <vers num="1.11.1_p1"/>
        <vers num="1.11.2"/>
        <vers num="1.11.3"/>
        <vers num="1.11.4"/>
        <vers num="1.11.5"/>
        <vers num="1.11.6"/>
        <vers num="1.11.10"/>
        <vers num="1.11.11"/>
        <vers num="1.11.14"/>
        <vers num="1.11.15"/>
        <vers num="1.11.16"/>
        <vers num="1.12.1"/>
        <vers num="1.12.2"/>
        <vers num="1.12.5"/>
        <vers num="1.12.7"/>
        <vers num="1.12.8"/>
      </prod>
      <prod name="openpkg" vendor="openpkg">
        <vers num="1.3"/>
        <vers num="2.0"/>
        <vers num="current"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="2.4"/>
        <vers num="3.0"/>
      </prod>
      <prod name="freebsd" vendor="freebsd">
        <vers num="1.1.5.1"/>
        <vers num="2.0"/>
        <vers num="2.0.5"/>
        <vers num="2.1.0"/>
        <vers num="2.1.5"/>
        <vers num="2.1.6"/>
        <vers num="2.1.6.1"/>
        <vers num="2.1.7.1"/>
        <vers num="2.2"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.8"/>
        <vers num="3.0" edition="releng"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.4"/>
        <vers num="3.5" edition="stable"/>
        <vers num="3.5.1" edition="release"/>
        <vers num="3.5.1" edition="stable"/>
        <vers num="4.0" edition="alpha"/>
        <vers num="4.0" edition="releng"/>
        <vers num="4.1"/>
        <vers num="4.1.1" edition="release"/>
        <vers num="4.1.1" edition="stable"/>
        <vers num="4.2" edition="stable"/>
        <vers num="4.3" edition="release"/>
        <vers num="4.3" edition="release_p38"/>
        <vers num="4.3" edition="releng"/>
        <vers num="4.3" edition="stable"/>
        <vers num="4.4" edition="release_p42"/>
        <vers num="4.4" edition="releng"/>
        <vers num="4.4" edition="stable"/>
        <vers num="4.5" edition="release"/>
        <vers num="4.5" edition="release_p32"/>
        <vers num="4.5" edition="releng"/>
        <vers num="4.5" edition="stable"/>
        <vers num="4.6" edition="release"/>
        <vers num="4.6" edition="release_p20"/>
        <vers num="4.6" edition="releng"/>
        <vers num="4.6" edition="stable"/>
        <vers num="4.6.2"/>
        <vers num="4.7" edition="release"/>
        <vers num="4.7" edition="release_p17"/>
        <vers num="4.7" edition="releng"/>
        <vers num="4.7" edition="stable"/>
        <vers num="4.8" edition="pre-release"/>
        <vers num="4.8" edition="release_p6"/>
        <vers num="4.8" edition="releng"/>
        <vers num="4.9" edition="pre-release"/>
        <vers num="4.9" edition="releng"/>
        <vers num="4.10" edition="release"/>
        <vers num="4.10" edition="releng"/>
        <vers num="5.0" edition="alpha"/>
        <vers num="5.0" edition="release_p14"/>
        <vers num="5.0" edition="releng"/>
        <vers num="5.1" edition="alpha"/>
        <vers num="5.1" edition="release"/>
        <vers num="5.1" edition="release_p5"/>
        <vers num="5.1" edition="releng"/>
        <vers num="5.2"/>
        <vers num="5.2.1" edition="release"/>
        <vers num="5.2.1" edition="releng"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4"/>
        <vers num="3.5"/>
        <vers num="current"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1472" seq="2004-1472" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 allow remote attackers to cause a denial of service (device freeze) via a fast UDP port scan on the WAN interface.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109588376426070&amp;w=2">20040922 Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security Products</ref>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html" adv="1">http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/441078" adv="1">VU#441078</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11237">11237</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17469">symantec-firewallvpn-udp-dos(17469)</ref>
    </refs>
    <vuln_soft>
      <prod name="firewall_vpn_appliance_100" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="firewall_vpn_appliance_200" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="firewall_vpn_appliance_200r" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="gateway_security" vendor="symantec">
        <vers num="320"/>
        <vers num="360"/>
        <vers num="360r"/>
      </prod>
      <prod name="nexland_isb_soho_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_pro100_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_pro400_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_pro800_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_pro800turbo_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_wavebase_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1473" seq="2004-1473" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109588376426070&amp;w=2">20040922 Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security Products</ref>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html" adv="1" patch="1">http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/329230" adv="1" patch="1">VU#329230</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11237">11237</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17470">symantec-udp-obtain-info(17470)</ref>
    </refs>
    <vuln_soft>
      <prod name="firewall_vpn_appliance_100" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="firewall_vpn_appliance_200" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="firewall_vpn_appliance_200r" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="gateway_security_320" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="gateway_security_360" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="gateway_security_360r" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_isb_soho_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_pro100_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_pro400_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_pro800_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_pro800turbo_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_wavebase_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1474" seq="2004-1474" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109588376426070&amp;w=2">20040922 Multiple Vulnerabilities in Symantec Enterprise Firewall/Gateway Security Products</ref>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html" adv="1" patch="1">http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/173910" adv="1" patch="1">VU#173910</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11237" patch="1">11237</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17471">symantec-default-snmp(17471)</ref>
    </refs>
    <vuln_soft>
      <prod name="firewall_vpn_appliance_100" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="firewall_vpn_appliance_200" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="firewall_vpn_appliance_200r" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="gateway_security_320" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="gateway_security_360" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="gateway_security_360r" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_isb_soho_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_pro100_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_pro400_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_pro800_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_pro800turbo_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
      <prod name="nexland_wavebase_firewall_appliance" vendor="symantec">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1475" seq="2004-1475" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in xine-lib 1-rc2 through 1-rc5 allow attackers to execute arbitrary code via (1) long VideoCD vcd:// MRLs or (2) long subtitle lines.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-18.xml" patch="1">GLSA-200408-18</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-30.xml" patch="1">GLSA-200409-30</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/375485/2004-09-02/2004-09-08/0" adv="1">20040907 XSA-2004-4: multiple string overflows</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11206" patch="1">11206</ref>
      <ref source="CONFIRM" url="http://xinehq.de/index.php/security/XSA-2004-4">http://xinehq.de/index.php/security/XSA-2004-4</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17430">xine-videocd-mrl-bo(17430)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17432">xine-subtitle-bo(17432)</ref>
    </refs>
    <vuln_soft>
      <prod name="xine" vendor="xine">
        <vers num="0.9.18"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3"/>
        <vers num="1_rc4"/>
        <vers num="1_rc5"/>
      </prod>
      <prod name="xine-lib" vendor="xine">
        <vers num="0.99"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3"/>
        <vers num="1_rc4"/>
        <vers num="1_rc5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1476" seq="2004-1476" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the VideoCD (VCD) code in xine-lib 1-rc2 through 1-rc5, as derived from libcdio, allows attackers to execute arbitrary code via a VideoCD with an unterminated disk label.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200409-30.xml" adv="1" patch="1">GLSA-200409-30</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/375485/2004-09-02/2004-09-08/0" adv="1" patch="1">20040907 XSA-2004-4: multiple string overflows</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11206" patch="1">11206</ref>
      <ref source="CONFIRM" url="http://xinehq.de/index.php/security/XSA-2004-4" adv="1" patch="1">http://xinehq.de/index.php/security/XSA-2004-4</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17431">xine-videocd-disk-bo(17431)</ref>
    </refs>
    <vuln_soft>
      <prod name="xine" vendor="xine">
        <vers num="0.9.18"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3"/>
        <vers num="1_rc4"/>
        <vers num="1_rc5"/>
      </prod>
      <prod name="xine-lib" vendor="xine">
        <vers num="0.99"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3"/>
        <vers num="1_rc4"/>
        <vers num="1_rc5"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.0"/>
        <vers num="8.1"/>
        <vers num="8.2" edition=":personal"/>
        <vers num="9.0" edition=":personal"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1" edition=":personal"/>
        <vers num="9.2" edition=":personal"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1477" seq="2004-1477" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Management Console in JRun 4.0 allows remote attackers to execute arbitrary web script or HTML and possibly hijack a user's session.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109621995623823&amp;w=2">20040923 New Macromedia Security Zone Bulletins Posted</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/668206" adv="1" patch="1">VU#668206</ref>
      <ref source="CONFIRM" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" adv="1" patch="1">http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11245" patch="1">11245</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17483">jrun-management-console-xss(17483)</ref>
    </refs>
    <vuln_soft>
      <prod name="jrun" vendor="macromedia">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1478" seq="2004-1478" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">JRun 4.0 does not properly generate and handle the JSESSIONID, which allows remote attackers to perform a session fixation attack and hijack a user's HTTP session.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109621995623823&amp;w=2">20040923 New Macromedia Security Zone Bulletins Posted</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/584958" adv="1" patch="1">VU#584958</ref>
      <ref source="CONFIRM" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" patch="1">http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11245" patch="1">11245</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17481">jrun-jsessionid-hijack(17481)</ref>
    </refs>
    <vuln_soft>
      <prod name="cosminexus_enterprise" vendor="hitachi">
        <vers num="01_01_1" edition=":enterprise"/>
        <vers num="01_01_1" edition=":standard"/>
        <vers num="01_02_2" edition=":enterprise"/>
        <vers num="01_02_2" edition=":standard"/>
      </prod>
      <prod name="cosminexus_server" vendor="hitachi">
        <vers num="web_01-01_1"/>
        <vers num="web_01-01_2"/>
      </prod>
      <prod name="coldfusion" vendor="macromedia">
        <vers num="6.0"/>
        <vers num="6.1" edition=":j2ee_application_server"/>
      </prod>
      <prod name="jrun" vendor="macromedia">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1479" seq="2004-1479" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-0928.  Reason: This candidate is a duplicate of CVE-2004-0928.  Notes: All CVE users should reference CVE-2004-0928 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-1480" seq="2004-1480" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the management station in HP StorageWorks Command View XP 1.8B and earlier allows remote attackers to bypass access restrictions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=PSD_HPSBST01071" adv="1">SSRT4794</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011407" patch="1">1011407</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11249">11249</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17490">hp-storageworks-restriction-bypass(17490)</ref>
    </refs>
    <vuln_soft>
      <prod name="storageworks_command_view" vendor="hp">
        <vers num="1.7a" edition=":xp"/>
        <vers num="1.7b" edition=":xp"/>
        <vers num="1.8" edition=":xp"/>
        <vers num="1.8a" edition=":xp"/>
        <vers num="1.8b" edition=":xp"/>
        <vers num="1.11" edition=":xp"/>
        <vers num="1.11.1" edition=":xp"/>
        <vers num="1.11.2" edition=":xp"/>
        <vers num="1.30.00" edition=":xp"/>
        <vers num="1.40.01" edition=":xp"/>
        <vers num="1.40.04" edition=":xp"/>
        <vers num="1.51.00" edition=":xp"/>
        <vers num="1.52.00" edition=":xp"/>
        <vers num="1.53.00" edition=":xp"/>
        <vers num="1.53.01a" edition=":xp"/>
        <vers num="1.53.05a" edition=":xp"/>
        <vers num="1.60.00" edition=":xp"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1481" seq="2004-1481" published="2004-12-31" modified="2017-11-21" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in pnen3260.dll in RealPlayer 8 through 10.5 (6.0.12.1040) and earlier, and RealOne Player 1 or 2 on Windows or Mac OS, allows remote attackers to execute arbitrary code via a SMIL file and a .rm movie file with a large length field for the data chunk, which leads to a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=ntbugtraq&amp;m=109708374115061&amp;w=2" adv="1">20041001 EEYE: RealPlayer pnen3260.dll Heap Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11309" adv="1" patch="1">11309</ref>
      <ref source="CONFIRM" url="http://www.service.real.com/help/faq/security/040928_player/EN/">http://www.service.real.com/help/faq/security/040928_player/EN/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17549" adv="1">realplayer-rm-code-execution(17549)</ref>
    </refs>
    <vuln_soft>
      <prod name="helix_player" vendor="realnetworks">
        <vers num="1.0" edition=":~~~linux~~"/>
      </prod>
      <prod name="realone_player" vendor="realnetworks">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="9.0.0.288" edition=":~~~mac_os_x~~"/>
        <vers num="9.0.0.297" edition=":~~~mac_os_x~~"/>
      </prod>
      <prod name="realplayer" vendor="realnetworks">
        <vers num="-" edition=":~~enterprise~~~"/>
        <vers num="8.0" edition=":~~~mac_os_x~~"/>
        <vers num="8.0" edition=":~~~unix~~"/>
        <vers num="10.0" edition=":~~~linux~~"/>
        <vers num="10.0" edition="::de"/>
        <vers num="10.0" edition="::en"/>
        <vers num="10.0" edition="::ja"/>
        <vers num="10.0" edition="beta:~~~mac_os_x~~"/>
        <vers num="10.0_6.0.12.690"/>
        <vers num="10.5"/>
        <vers num="10.5_6.0.12.1016" edition="beta"/>
        <vers num="10.5_6.0.12.1040"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1482" seq="2004-1482" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The sbuf_getmsg function in BNC incorrectly handles backspace characters, which could allow remote attackers to bypass authentication and gain access to arbitrary scripts.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-13.xml" patch="1">GLSA-200410-13</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11355" patch="1">11355</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17672">bnc-backspace-command-execution(17672)</ref>
    </refs>
    <vuln_soft>
      <prod name="bnc" vendor="bnc">
        <vers num="2.2.4"/>
        <vers num="2.4.6"/>
        <vers num="2.4.8"/>
        <vers num="2.6"/>
        <vers num="2.6.2"/>
        <vers num="2.8.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1483" seq="2004-1483" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unknown vulnerabilities in the ActiveX and HTML file browsers in Symantec Clientless VPN Gateway 4400 Series 5.0 have unknown attack vectors and unknown impact.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.symantec.com/public/english_us_canada/products/sym_clientless_vpn/sym_clientless_vpn_5/updates/hf3-readme.txt">ftp://ftp.symantec.com/public/english_us_canada/products/sym_clientless_vpn/sym_clientless_vpn_5/updates/hf3-readme.txt</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/760256" adv="1" patch="1">VU#760256</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10903">10903</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16933">symantec-clientless-file-browsers(16933)</ref>
    </refs>
    <vuln_soft>
      <prod name="clientless_vpn_gateway_4400" vendor="symantec">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1484" seq="2004-1484" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Format string vulnerability in the _msg function in error.c in socat 1.4.0.3 and earlier, when used as an HTTP proxy client and run with the -ly option, allows remote attackers or local users to execute arbitrary code via format string specifiers in a syslog message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.dest-unreach.org/socat/advisory/socat-adv-1.html" adv="1">http://www.dest-unreach.org/socat/advisory/socat-adv-1.html</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-26.xml" adv="1" patch="1">GLSA-200410-26</ref>
      <ref source="MISC" url="http://www.nosystem.com.ar/advisories/advisory-07.txt" adv="1" patch="1">http://www.nosystem.com.ar/advisories/advisory-07.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11505" patch="1">11505</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17822">socat-format-string(17822)</ref>
    </refs>
    <vuln_soft>
      <prod name="socat" vendor="socat">
        <vers num="1.0.3.0"/>
        <vers num="1.0.4.0"/>
        <vers num="1.0.4.1"/>
        <vers num="1.0.4.2"/>
        <vers num="1.1.0.0"/>
        <vers num="1.1.0.1"/>
        <vers num="1.2.0.0"/>
        <vers num="1.3.0.0"/>
        <vers num="1.3.0.1"/>
        <vers num="1.3.1.0"/>
        <vers num="1.3.2.0"/>
        <vers num="1.3.2.1"/>
        <vers num="1.3.2.2"/>
        <vers num="1.4.0.0"/>
        <vers num="1.4.0.1"/>
        <vers num="1.4.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1485" seq="2004-1485" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109882085912915&amp;w=2">20041026 inetutils tftp client, DNS resolving bofs</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11527">11527</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17878">inetutils-tftp-dns-bo(17878)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1486" seq="2004-1486" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Serviceguard A.11.13 through A.11.16.00 and Cluster Object Manager A.01.03 and B.01.04 through B.03.00.01 on HP-UX, Serviceguard A.11.14.04 and A.11.15.04 and Cluster Object Manager B.02.01.02 and B.02.02.02 on HP Linux, allow remote attackers to gain privileges via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109893515704267&amp;w=2">SSRT3526</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11507" patch="1">11507</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17867">hp-cluster-serviceguard-gain-privileges(17867)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1487" seq="2004-1487" published="2005-04-27" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755" adv="1">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110269474112384&amp;w=2">20041209 wget: Arbitrary file overwriting/appending/creating and other vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012472">1012472</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-771.html">RHSA-2005:771</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11871" adv="1">11871</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18420">wget-file-overwrite(18420)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11682">oval:org.mitre.oval:def:11682</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/145-1/">USN-145-1</ref>
    </refs>
    <vuln_soft>
      <prod name="wget" vendor="gnu">
        <vers num="1.8"/>
        <vers num="1.8.1"/>
        <vers num="1.8.2"/>
        <vers num="1.9"/>
        <vers num="1.9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1488" seq="2004-1488" published="2005-04-27" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755" adv="1">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110269474112384&amp;w=2">20041209 wget: Arbitrary file overwriting/appending/creating and other vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012472">1012472</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2006_16_sr.html">SUSE-SR:2006:016</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-771.html">RHSA-2005:771</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11871" adv="1">11871</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18421">wget-terminal-overwrite(18421)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9750">oval:org.mitre.oval:def:9750</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/145-1/">USN-145-1</ref>
    </refs>
    <vuln_soft>
      <prod name="wget" vendor="gnu">
        <vers num="1.8"/>
        <vers num="1.8.1"/>
        <vers num="1.8.2"/>
        <vers num="1.9"/>
        <vers num="1.9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1489" seq="2004-1489" published="2004-12-31" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Opera 7.54 and earlier does not properly limit an applet's access to internal Java packages from Sun, which allows remote attackers to gain sensitive information, such as user names and the installation directory.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029044.html">20041119 Java Vulnerabilities in Opera 7.54</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-17.xml" patch="1">GLSA-200502-17</ref>
      <ref source="CONFIRM" url="http://www.opera.com/linux/changelogs/754u1/">http://www.opera.com/linux/changelogs/754u1/</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="5.0" edition=":linux"/>
        <vers num="5.0" edition=":mac"/>
        <vers num="5.0.2" edition=":win32"/>
        <vers num="5.1.0" edition=":win32"/>
        <vers num="5.1.1" edition=":win32"/>
        <vers num="5.12" edition=":win32"/>
        <vers num="6.0" edition=":win32"/>
        <vers num="6.0.1" edition=":linux"/>
        <vers num="6.0.1" edition=":win32"/>
        <vers num="6.0.2" edition=":linux"/>
        <vers num="6.0.2" edition=":win32"/>
        <vers num="6.0.3" edition=":linux"/>
        <vers num="6.0.3" edition=":win32"/>
        <vers num="6.0.4" edition=":win32"/>
        <vers num="6.0.5" edition=":win32"/>
        <vers num="6.0.6" edition=":win32"/>
        <vers num="6.10" edition=":linux"/>
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0.1" edition=":win32"/>
        <vers num="7.0.2" edition=":win32"/>
        <vers num="7.0.3" edition=":win32"/>
        <vers num="7.0_beta1" edition=":win32"/>
        <vers num="7.0_beta2" edition=":win32"/>
        <vers num="7.10"/>
        <vers num="7.11"/>
        <vers num="7.11b"/>
        <vers num="7.11j"/>
        <vers num="7.20"/>
        <vers num="7.20_beta1_build2981"/>
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
        <vers num="7.50"/>
        <vers num="7.50b1"/>
        <vers num="7.51"/>
        <vers num="7.52"/>
        <vers num="7.53"/>
        <vers num="7.54"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1490" seq="2004-1490" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Opera 7.54 and earlier allows remote attackers to spoof file types in the download dialog via dots and non-breaking spaces (ASCII character code 160) in the (1) Content-Disposition or (2) Content-Type headers.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-17.xml" patch="1">GLSA-200502-17</ref>
      <ref source="CONFIRM" url="http://www.opera.com/linux/changelogs/754u1/">http://www.opera.com/linux/changelogs/754u1/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11883" patch="1">11883</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18423">opera-file-type-spoofing(18423)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="5.0" edition=":linux"/>
        <vers num="5.0" edition=":mac"/>
        <vers num="5.0.2" edition=":win32"/>
        <vers num="5.1.0" edition=":win32"/>
        <vers num="5.1.1" edition=":win32"/>
        <vers num="5.12" edition=":win32"/>
        <vers num="6.0" edition=":win32"/>
        <vers num="6.0.1" edition=":linux"/>
        <vers num="6.0.1" edition=":win32"/>
        <vers num="6.0.2" edition=":linux"/>
        <vers num="6.0.2" edition=":win32"/>
        <vers num="6.0.3" edition=":linux"/>
        <vers num="6.0.3" edition=":win32"/>
        <vers num="6.0.4" edition=":win32"/>
        <vers num="6.0.5" edition=":win32"/>
        <vers num="6.0.6" edition=":win32"/>
        <vers num="6.10" edition=":linux"/>
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0.1" edition=":win32"/>
        <vers num="7.0.2" edition=":win32"/>
        <vers num="7.0.3" edition=":win32"/>
        <vers num="7.0_beta1" edition=":win32"/>
        <vers num="7.0_beta2" edition=":win32"/>
        <vers num="7.10"/>
        <vers num="7.11"/>
        <vers num="7.11b"/>
        <vers num="7.11j"/>
        <vers num="7.20"/>
        <vers num="7.20_beta1_build2981"/>
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
        <vers num="7.50"/>
        <vers num="7.50b1"/>
        <vers num="7.51"/>
        <vers num="7.52"/>
        <vers num="7.53"/>
        <vers num="7.54"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1491" seq="2004-1491" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Opera 7.54 and earlier uses kfmclient exec to handle unknown MIME types, which allows remote attackers to execute arbitrary code via a shortcut or launcher that contains an Exec entry.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUSE" url="http://lists.suse.com/archive/suse-security-announce/2005-Mar/0007.html" adv="1">SUSE-SR:2005:008</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200502-17.xml" adv="1" patch="1">GLSA-200502-17</ref>
      <ref source="CONFIRM" url="http://www.opera.com/linux/changelogs/754u2/">http://www.opera.com/linux/changelogs/754u2/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11901" patch="1">11901</ref>
      <ref source="MISC" url="http://www.zone-h.org/advisories/read/id=6503" adv="1">http://www.zone-h.org/advisories/read/id=6503</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18457">pera-kfmclient-command-execution(18457)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="7.54"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num=""/>
      </prod>
      <prod name="kde" vendor="kde">
        <vers num="3.2.3"/>
      </prod>
      <prod name="suse_linux" vendor="suse">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="3.0"/>
        <vers num="4.0"/>
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.4"/>
        <vers num="4.4.1"/>
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="6.0"/>
        <vers num="6.1" edition="alpha"/>
        <vers num="6.2"/>
        <vers num="6.3" edition=":ppc"/>
        <vers num="6.3" edition="alpha"/>
        <vers num="6.4" edition=":i386"/>
        <vers num="6.4" edition=":ppc"/>
        <vers num="6.4" edition="alpha"/>
        <vers num="7.0" edition=":i386"/>
        <vers num="7.0" edition=":ppc"/>
        <vers num="7.0" edition=":sparc"/>
        <vers num="7.0" edition="alpha"/>
        <vers num="7.1" edition=":spa"/>
        <vers num="7.1" edition=":sparc"/>
        <vers num="7.1" edition=":x86"/>
        <vers num="7.1" edition="alpha"/>
        <vers num="7.2" edition=":i386"/>
        <vers num="7.3" edition=":i386"/>
        <vers num="7.3" edition=":ppc"/>
        <vers num="7.3" edition=":sparc"/>
        <vers num="8.0" edition=":i386"/>
        <vers num="8.1"/>
        <vers num="8.2" edition=":personal"/>
        <vers num="9.0" edition=":personal"/>
        <vers num="9.0" edition=":x86_64"/>
        <vers num="9.1" edition=":personal"/>
        <vers num="9.1" edition=":x86_64"/>
        <vers num="9.2" edition=":personal"/>
        <vers num="9.2" edition=":x86_64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1492" seq="2004-1492" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Master of Orion III 1.2.5 and earlier allows remote attackers to cause a denial of service (game exit) via a data packet that contains a large size specifier, which causes a large memory allocation to fail.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109889705116038&amp;w=2">20041027 Crashs in Master of Orion III 1.2.5</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11550">11550</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17908">master-of-orion-size-dos(17908)</ref>
    </refs>
    <vuln_soft>
      <prod name="master_of_orion_iii" vendor="quicksilver">
        <vers num="1.2.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1493" seq="2004-1493" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Master of Orion III 1.2.5 and earlier allows remote attackers to cause a denial of service (server crash) via multiple connections with long nicknames, possibly triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109889705116038&amp;w=2">20041027 Crashs in Master of Orion III 1.2.5</ref>
      <ref source="MISC" url="http://packetstormsecurity.nl/0410-advisories/masterOrionIII.txt" adv="1">http://packetstormsecurity.nl/0410-advisories/masterOrionIII.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11550">11550</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17884">master-of-orion-nickname-dos(17884)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1494" seq="2004-1494" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the Screen Fetch option in XDICT 2002 through 2005 allows remote attackers to cause a denial of service ( CPU consumption or application exit) and possibly execute arbitrary code via a long string.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028241.html" adv="1">20041101 XDICT Buffer OverRun Vulnerability,funny :-)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109933696831725&amp;w=2">20041101 XDICT Buffer OverRun Vulnerability,funny :-)</ref>
      <ref source="MISC" url="http://secway.org/Advisory/Ad20041026EN.txt" adv="1">http://secway.org/Advisory/Ad20041026EN.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17929">xdict-screen-fetch-bo(17929)</ref>
    </refs>
    <vuln_soft>
      <prod name="xdict" vendor="kingsoft">
        <vers num="2002"/>
        <vers num="2003"/>
        <vers num="2004"/>
        <vers num="2005"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1495" seq="2004-1495" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Repair Archive command in WinRAR 3.40 allows remote attackers to cause a denial of service (application crash) via a corrupt ZIP archive.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109941351432699&amp;w=2">20041102 Medium Risk Vulnerability in WinRAR</ref>
      <ref source="CONFIRM" url="http://www.rarlabs.com/rarnew.htm">http://www.rarlabs.com/rarnew.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11581" patch="1">11581</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17937">winrar-repair-archive(17937)</ref>
    </refs>
    <vuln_soft>
      <prod name="winrar" vendor="rarlab">
        <vers num="2.90"/>
        <vers num="3.0.0"/>
        <vers num="3.10"/>
        <vers num="3.10_beta3"/>
        <vers num="3.10_beta5"/>
        <vers num="3.11"/>
        <vers num="3.20"/>
        <vers num="3.40"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1496" seq="2004-1496" published="2004-12-31" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Web Forums Server 1.6 and 2.0 Power Pack allows remote attackers to read arbitrary files via a URL containing (1) "..\" (dot dot backslash), (2) "../" (dot dot slash), (3) "/%2E%2E%5C" (encoded dot dot backslash), or (4) "%2E%2E%2F" (encoded dot dot slash).</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109943267328552&amp;w=2">20041102 Multiple Vulnerabilities in Web Forums Server</ref>
    </refs>
    <vuln_soft>
      <prod name="web_forums_server" vendor="minihttpserver.net">
        <vers num="1.6"/>
        <vers num="2.0_power_pack"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1497" seq="2004-1497" published="2004-12-31" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Web Forums Server 1.6 and 2.0 Power Pack stores passwords in plaintext in the Username.ini file, which allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109943267328552&amp;w=2">20041102 Multiple Vulnerabilities in Web Forums Server</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1498" seq="2004-1498" published="2004-12-31" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the compose message form in HELM 3.1.19 and earlier allows remote attackers to execute arbitrary SQL commands via the messageToUserAccNum parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109943858026542&amp;w=2">20041102 [Hat-Squad] SQL injection and XSS Vulnerabilities in HELM</ref>
      <ref source="MISC" url="http://www.hat-squad.com/en/000077.html" adv="1">http://www.hat-squad.com/en/000077.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11586">11586</ref>
    </refs>
    <vuln_soft>
      <prod name="helm_control_panel" vendor="webhost_automation">
        <vers num="3.1.10"/>
        <vers num="3.1.11"/>
        <vers num="3.1.12"/>
        <vers num="3.1.13"/>
        <vers num="3.1.14"/>
        <vers num="3.1.15"/>
        <vers num="3.1.16"/>
        <vers num="3.1.17"/>
        <vers num="3.1.18"/>
        <vers num="3.1.19"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1499" seq="2004-1499" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the compose message form in HELM 3.1.19 and earlier allows remote attackers to execute arbitrary web script or HTML via the Subject field.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109943858026542&amp;w=2">20041102 [Hat-Squad] SQL injection and XSS Vulnerabilities in HELM</ref>
      <ref source="MISC" url="http://www.hat-squad.com/en/000077.html" adv="1">http://www.hat-squad.com/en/000077.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11586">11586</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17943">helm-subject-xss(17943)</ref>
    </refs>
    <vuln_soft>
      <prod name="helm_control_panel" vendor="webhost_automation">
        <vers num="3.1.10"/>
        <vers num="3.1.11"/>
        <vers num="3.1.12"/>
        <vers num="3.1.13"/>
        <vers num="3.1.14"/>
        <vers num="3.1.15"/>
        <vers num="3.1.16"/>
        <vers num="3.1.17"/>
        <vers num="3.1.18"/>
        <vers num="3.1.19"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1500" seq="2004-1500" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the Lithtech engine, as used in multiple games, allows remote authenticated users to cause a denial of service (application crash) via format string specifiers in (1) a nickname or (2) a message.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/lithfs-adv.txt">http://aluigi.altervista.org/adv/lithfs-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109969394601331&amp;w=2">20041105 In-game format string bug in the Lithtech engine</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11610">11610</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17972">lithtech-format-string(17972)</ref>
    </refs>
    <vuln_soft>
      <prod name="purge_jihad" vendor="freeform_interactive">
        <vers num="2.2.1"/>
      </prod>
      <prod name="alien_versus_predator" vendor="monolith_productions">
        <vers num="2.1.0.9.6"/>
      </prod>
      <prod name="blood" vendor="monolith_productions">
        <vers num="2.2.1"/>
      </prod>
      <prod name="contract_jack" vendor="monolith_productions">
        <vers num="1.1"/>
      </prod>
      <prod name="global_operations" vendor="monolith_productions">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
      <prod name="kiss_psycho_circus" vendor="monolith_productions">
        <vers num="1.13"/>
      </prod>
      <prod name="legends_of_might_and_magic" vendor="monolith_productions">
        <vers num="1.1"/>
      </prod>
      <prod name="no_one_lives_forever" vendor="monolith_productions">
        <vers num="1.0.004"/>
        <vers num="2.1.3"/>
      </prod>
      <prod name="sanity" vendor="monolith_productions">
        <vers num="1.0"/>
      </prod>
      <prod name="shogo" vendor="monolith_productions">
        <vers num="2.2"/>
      </prod>
      <prod name="tron" vendor="monolith_productions">
        <vers num="2.0.1.42"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1501" seq="2004-1501" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The webmail service in 602 Lan Suite 2004.0.04.0909 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) by sending a POST request with a large Content-Length value, then disconnecting without sending that amount of data.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109976745017459&amp;w=2">20041106 Resources consumption in 602 Lan Suite 2004.0.04.0909</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17977">602pro-mail-post-dos(17977)</ref>
    </refs>
    <vuln_soft>
      <prod name="602lan_suite" vendor="software602">
        <vers num="2004.0.04.0909" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1502" seq="2004-1502" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Telnet proxy in 602 Lan Suite 2004.0.04.0909 and earlier allows remote attackers to cause a denial of service (socket exhaustion) via a Telnet request to an IP address of the proxy's network interface, which causes a loop.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109976745017459&amp;w=2">20041106 Resources consumption in 602 Lan Suite 2004.0.04.0909</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17979">602pro-telnet-loopback-dos(17979)</ref>
    </refs>
    <vuln_soft>
      <prod name="602lan_suite" vendor="software602">
        <vers num="2004.0.04.0909" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1503" seq="2004-1503" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the InitialDirContext in Java Runtime Environment (JRE) 1.4.2, 1.5.0 and possibly other versions allows remote attackers to cause a denial of service (Java exception and failed DNS requests) via a large number of DNS requests, which causes the xid variable to wrap around and become negative.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109994063331773&amp;w=2">20041108 DOS against Java JNDI/DNS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11619">11619</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17990">sun-jre-dns-dos(17990)</ref>
    </refs>
    <vuln_soft>
      <prod name="jre" vendor="sun">
        <vers num="1.4.2"/>
        <vers num="1.5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1504" seq="2004-1504" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The displaycontent function in config.php for Just Another Flat file (JAF) CMS 3.0RC allows remote attackers to gain sensitive information via a blank show parameter, which reveals the installation path in an error message, as demonstrated using index.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://echo.or.id/adv/adv08-y3dips-2004.txt" adv="1">http://echo.or.id/adv/adv08-y3dips-2004.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110004150430309&amp;w=2">20041109 Vulnerabilities in JAF CMS</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18006">jaf-cms-path-disclosure(18006)</ref>
    </refs>
    <vuln_soft>
      <prod name="jaf_cms" vendor="salims_softhouse">
        <vers num="3.0" edition="rc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1505" seq="2004-1505" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in Just Another Flat file (JAF) CMS 3.0RC allows remote attackers to read arbitrary files and possibly execute PHP code via a .. (dot dot) in the show parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://echo.or.id/adv/adv08-y3dips-2004.txt" adv="1">http://echo.or.id/adv/adv08-y3dips-2004.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110004150430309&amp;w=2">20041109 Vulnerabilities in JAF CMS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11627" patch="1">11627</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17983">jaf-cms-file-inlcude(17983)</ref>
    </refs>
    <vuln_soft>
      <prod name="jaf_cms" vendor="salims_softhouse">
        <vers num="3.0" edition="rc"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1506" seq="2004-1506" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in WebCalendar allow remote attackers to inject arbitrary web script via (1) view_entry.php, (2) view_d.php, (3) usersel.php, (4) datesel.php, (5) trailer.php, or (6) styles.php, as demonstrated using img srg tags.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110011618724455&amp;w=2">20041109 Multiple Vulnerabilities in WebCalendar</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11651">11651</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18026">webcalendar-img-src-xss(18026)</ref>
    </refs>
    <vuln_soft>
      <prod name="webcalendar" vendor="webcalendar">
        <vers num="0.9.8"/>
        <vers num="0.9.11"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
        <vers num="0.9.19"/>
        <vers num="0.9.20"/>
        <vers num="0.9.21"/>
        <vers num="0.9.22"/>
        <vers num="0.9.23"/>
        <vers num="0.9.24"/>
        <vers num="0.9.25"/>
        <vers num="0.9.26"/>
        <vers num="0.9.27"/>
        <vers num="0.9.28"/>
        <vers num="0.9.29"/>
        <vers num="0.9.30"/>
        <vers num="0.9.31"/>
        <vers num="0.9.32"/>
        <vers num="0.9.33"/>
        <vers num="0.9.34"/>
        <vers num="0.9.35"/>
        <vers num="0.9.36"/>
        <vers num="0.9.37"/>
        <vers num="0.9.38"/>
        <vers num="0.9.39"/>
        <vers num="0.9.40"/>
        <vers num="0.9.41"/>
        <vers num="0.9.42"/>
        <vers num="0.9.43"/>
        <vers num="0.9.44"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1507" seq="2004-1507" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in login.php in WebCalendar allows remote attackers to inject CRLF sequences via the return_path parameter and perform HTTP Response Splitting attacks to modify expected HTML content from the server.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110011618724455&amp;w=2">20041109 Multiple Vulnerabilities in WebCalendar</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11651">11651</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18027">webcalendar-response-splitting(18027)</ref>
    </refs>
    <vuln_soft>
      <prod name="webcalendar" vendor="webcalendar">
        <vers num="0.9.8"/>
        <vers num="0.9.11"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
        <vers num="0.9.19"/>
        <vers num="0.9.20"/>
        <vers num="0.9.21"/>
        <vers num="0.9.22"/>
        <vers num="0.9.23"/>
        <vers num="0.9.24"/>
        <vers num="0.9.25"/>
        <vers num="0.9.26"/>
        <vers num="0.9.27"/>
        <vers num="0.9.28"/>
        <vers num="0.9.29"/>
        <vers num="0.9.30"/>
        <vers num="0.9.31"/>
        <vers num="0.9.32"/>
        <vers num="0.9.33"/>
        <vers num="0.9.34"/>
        <vers num="0.9.35"/>
        <vers num="0.9.36"/>
        <vers num="0.9.37"/>
        <vers num="0.9.38"/>
        <vers num="0.9.39"/>
        <vers num="0.9.40"/>
        <vers num="0.9.41"/>
        <vers num="0.9.42"/>
        <vers num="0.9.43"/>
        <vers num="0.9.44"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1508" seq="2004-1508" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">init.php in WebCalendar allows remote attackers to execute arbitrary local PHP scripts via the user_inc parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110011618724455&amp;w=2">20041109 Multiple Vulnerabilities in WebCalendar</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11651">11651</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18028">webcalendar-init-file-include(18028)</ref>
    </refs>
    <vuln_soft>
      <prod name="webcalendar" vendor="webcalendar">
        <vers num="0.9.8"/>
        <vers num="0.9.11"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
        <vers num="0.9.19"/>
        <vers num="0.9.20"/>
        <vers num="0.9.21"/>
        <vers num="0.9.22"/>
        <vers num="0.9.23"/>
        <vers num="0.9.24"/>
        <vers num="0.9.25"/>
        <vers num="0.9.26"/>
        <vers num="0.9.27"/>
        <vers num="0.9.28"/>
        <vers num="0.9.29"/>
        <vers num="0.9.30"/>
        <vers num="0.9.31"/>
        <vers num="0.9.32"/>
        <vers num="0.9.33"/>
        <vers num="0.9.34"/>
        <vers num="0.9.35"/>
        <vers num="0.9.36"/>
        <vers num="0.9.37"/>
        <vers num="0.9.38"/>
        <vers num="0.9.39"/>
        <vers num="0.9.40"/>
        <vers num="0.9.41"/>
        <vers num="0.9.42"/>
        <vers num="0.9.43"/>
        <vers num="0.9.44"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1509" seq="2004-1509" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">validate.php in WebCalendar allows remote attackers to gain sensitive information via an invalid encoded_login parameter, which reveals the full path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110011618724455&amp;w=2">20041109 Multiple Vulnerabilities in WebCalendar</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11651">11651</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18029">webcalendar-encodedlogin-path-disclosure(18029)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1510" seq="2004-1510" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">WebCalendar allows remote attackers to gain privileges by modifying critical parameters to (1) view_entry.php or (2) upcoming.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110011618724455&amp;w=2">20041109 Multiple Vulnerabilities in WebCalendar</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11651">11651</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18030">webcalendar-scripts-gain-access(18030)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1511" seq="2004-1511" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Hotfoon 4.0 does not notify users before opening links in web browsers, which could allow remote attackers to execute arbitrary code via a certain link sent in a chat window.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110014517703092&amp;w=2">20041110 Hotfoon Ver 4.0 Highv Risk</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18038">hotfoon-url-command-execution(18038)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1512" seq="2004-1512" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Response_default.html in 04WebServer 1.42 allows remote attackers to execute arbitrary web script or HTML via script code in the URL, which is not quoted in the resulting default error page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110012542615484&amp;w=2">20041110 04WebServer Three Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110054395311823&amp;w=2">20041115 Re: 04WebServer Three Vulnerabilities</ref>
      <ref source="MISC" url="http://www.security.org.sg/vuln/04webserver142.html" patch="1">http://www.security.org.sg/vuln/04webserver142.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11652" patch="1">11652</ref>
      <ref source="CONFIRM" url="http://www.soft3304.net/04WebServer/Security.html">http://www.soft3304.net/04WebServer/Security.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18033">04webserver-error-xss(18033)</ref>
    </refs>
    <vuln_soft>
      <prod name="04webserver" vendor="soft3304">
        <vers num="1.42"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1513" seq="2004-1513" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">04WebServer 1.42 does not adequately filter data that is written to log files, which could allow remote attackers to inject carriage return characters into the log file and spoof log entries.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110012542615484&amp;w=2">20041110 04WebServer Three Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110054395311823&amp;w=2">20041115 Re: 04WebServer Three Vulnerabilities</ref>
      <ref source="MISC" url="http://www.security.org.sg/vuln/04webserver142.html" adv="1" patch="1">http://www.security.org.sg/vuln/04webserver142.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11652" patch="1">11652</ref>
      <ref source="CONFIRM" url="http://www.soft3304.net/04WebServer/Security.html">http://www.soft3304.net/04WebServer/Security.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18034">04webserver-web-log-spoofing(18034)</ref>
    </refs>
    <vuln_soft>
      <prod name="04webserver" vendor="soft3304">
        <vers num="1.42"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1514" seq="2004-1514" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">04WebServer 1.42 allows remote attackers to cause a denial of service (fail to restart properly) via an HTTP request for an MS-DOS device name such as COM2.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110012542615484&amp;w=2">20041110 04WebServer Three Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110054395311823&amp;w=2">20041115 Re: 04WebServer Three Vulnerabilities</ref>
      <ref source="MISC" url="http://www.security.org.sg/vuln/04webserver142.html" adv="1">http://www.security.org.sg/vuln/04webserver142.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11652" patch="1">11652</ref>
      <ref source="CONFIRM" url="http://www.soft3304.net/04WebServer/Security.html">http://www.soft3304.net/04WebServer/Security.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18036">04webserver-dos-devices-dos(18036)</ref>
    </refs>
    <vuln_soft>
      <prod name="04webserver" vendor="soft3304">
        <vers num="1.42"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1515" seq="2004-1515" published="2004-12-31" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in (1) ttlast.php and (2) last10.php in vBulletin 3.0.x allows remote attackers to execute arbitrary SQL statements via the fsel parameter, as demonstrated using last.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110019198507100&amp;w=2">20041111 SQL injection in vBulletin forums (last10.php)</ref>
    </refs>
    <vuln_soft>
      <prod name="vbulletin" vendor="jelsoft">
        <vers num="3.0.0"/>
        <vers num="3.0.0_beta_2"/>
        <vers num="3.0.0_can4"/>
        <vers num="3.0.0_rc4"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.0_beta_2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1516" seq="2004-1516" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in index.php in phpWebSite 0.9.3-4 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the block_username parameter in the user module.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110022027420583&amp;w=2">20041111 security hole (http response splitting) in phpwebsite</ref>
      <ref source="CONFIRM" url="http://phpwebsite.appstate.edu/index.php?module=announce&amp;ANN_id=863&amp;ANN_user_op=view" patch="1">http://phpwebsite.appstate.edu/index.php?module=announce&amp;ANN_id=863&amp;ANN_user_op=view</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200411-35.xml" adv="1" patch="1">GLSA-200411-35</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11673" patch="1">11673</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18046">phpwebsite-response-splitting(18046)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpwebsite" vendor="phpwebsite">
        <vers num="0.7.3"/>
        <vers num="0.8.2"/>
        <vers num="0.8.3"/>
        <vers num="0.9.3"/>
        <vers num="0.9.3.1"/>
        <vers num="0.9.3.2"/>
        <vers num="0.9.3.3"/>
        <vers num="0.9.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1517" seq="2004-1517" published="2004-12-31" modified="2017-07-11" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Zone Labs IMsecure and IMsecure Pro before 1.5 allow remote attackers to bypass Active Link Filtering via an instant message containing a URL with hex encoded file extensions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://download.zonelabs.com/bin/free/securityAlert/16.html" adv="1" patch="1">http://download.zonelabs.com/bin/free/securityAlert/16.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110020607924001&amp;w=2">20041111 Zone Labs IMsecure Active Link Filter Bypass</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11662" patch="1">11662</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18042">imsecure-active-link-bypass(18042)</ref>
    </refs>
    <vuln_soft>
      <prod name="imsecure" vendor="zonelabs">
        <vers num="1.0.0.0"/>
        <vers num="1.0.1.0"/>
        <vers num="1.0.2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1518" seq="2004-1518" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in follow.php in Phorum 5.0.12 and earlier allows remote authenticated users to execute arbitrary SQL command via the forum_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028609.html" adv="1" patch="1">20041111 [waraxe-2004-SA#037 - Sql injection bug in Phorum 5.0.12 and older versions]</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110021385926870&amp;w=2">20041111 [waraxe-2004-SA#037 - Sql injection bug in Phorum 5.0.12 and older versions]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11660" patch="1">11660</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18045">phorum-followphp-sql-injection(18045)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1519" seq="2004-1519" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in bug.php in phpBugTracker 0.9.1 allows remote attackers to execute arbitrary SQL commands via (1) the bug_id parameter in a viewvotes operation or (2) the project parameter in an add operation.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110029315521568&amp;w=2">20041112 SQL Injection in phpBT (bug.php)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110037345428403&amp;w=2">20041112 SQL Injection in phpBT (bug.php - Add)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110037408101974&amp;w=2">20041112 SQL Injection in phpBT (bug.php) add project</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18053">phpbugtracker-bug-sql-injection(18053)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18079">phpbugtracker-project-sql-injection(18079)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1520" seq="2004-1520" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in IPSwitch IMail 8.13 allows remote authenticated users to execute arbitrary code via a long IMAP DELETE command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110037283803560&amp;w=2">20041112 IPSwitch-IMail-8.13 Stack Overflow in the DELETE Command</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11675" patch="1">11675</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18058">ipswitch-delete-bo(18058)</ref>
    </refs>
    <vuln_soft>
      <prod name="imail" vendor="ipswitch">
        <vers num="8.13"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1521" seq="2004-1521" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Eudora 6.2.0.14 does not issue a warning when a user forwards an e-mail message that contains base64 or quoted-printable encoded attachments, which makes it easier for remote attackers to read arbitrary files via spoofed "Converted" headers.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110037078519691&amp;w=2">20041113 Eudora 6.2 attachment spoof</ref>
      <ref source="NTBUGTRAQ" url="http://marc.info/?l=ntbugtraq&amp;m=110053102601655&amp;w=2">20041113 Eudora 6.2 attachment spoof</ref>
      <ref source="MISC" url="http://packetstormsecurity.nl/0411-exploits/eudora62014.txt" adv="1">http://packetstormsecurity.nl/0411-exploits/eudora62014.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18064">eudora-base64-attach-spoof-variant(18064)</ref>
    </refs>
    <vuln_soft>
      <prod name="eudora" vendor="qualcomm">
        <vers num="6.2.0.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1522" seq="2004-1522" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in Army Men RTS 1.0 allows remote attackers to cause a denial of service (application crash) via a nickname that contains format strings.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028757.html" adv="1">20041114 Format string bug in Army Men RTS</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110053709800174&amp;w=2">20041114 Format string bug in Army Men RTS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11679">11679</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18065">army-men-rts-format-string(18065)</ref>
    </refs>
    <vuln_soft>
      <prod name="army_men_real_time_strategy_game" vendor="3do">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1523" seq="2004-1523" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the game console in Hired Team: Trial 2.0 and earlier and 2.200 allows remote attackers to cause a denial of service (application crash) via format string specifiers in a message.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110054260919742&amp;w=2">20041115 Multiple vulnerabilities in Hired Team: Trial (Shine engine)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11683">11683</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18083">hired-team-format-string(18083)</ref>
    </refs>
    <vuln_soft>
      <prod name="hired_team_trial" vendor="new_media_generation">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1524" seq="2004-1524" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Hired Team: Trial 2.0 and earlier and 2.200 allows remote attackers to cause a denial of service (game interruption) via a malformed UDP packet sent to a game port, such as port 29200.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110054260919742&amp;w=2">20041115 Multiple vulnerabilities in Hired Team: Trial (Shine engine)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11683">11683</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18085">hired-team-udp-dos(18085)</ref>
    </refs>
    <vuln_soft>
      <prod name="hired_team_trial" vendor="new_media_generation">
        <vers num="2.0" prev="1"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1525" seq="2004-1525" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Hired Team: Trial 2.0 and earlier and 2.200 allows remote attackers to cause a denial of service (application crash) via the status command.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110054260919742&amp;w=2">20041115 Multiple vulnerabilities in Hired Team: Trial (Shine engine)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11683">11683</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18086">hired-team-status-dos(18086)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1526" seq="2004-1526" published="2004-12-31" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Hired Team: Trial 2.0 and earlier and 2.200 does not limit how game players can kick other players off the server, including the administrator.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110054260919742&amp;w=2">20041115 Multiple vulnerabilities in Hired Team: Trial (Shine engine)</ref>
    </refs>
    <vuln_soft>
      <prod name="hired_team_trial" vendor="new_media_generation">
        <vers num="2.0" prev="1"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1527" seq="2004-1527" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 6.0 SP1 does not properly handle certain character strings in the Path attribute, which can cause it to modify cookies in other domains when the attacker's domain name is within the target's domain name or when wildcard DNS is being used, which allows remote attackers to hijack web sessions.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110053968530613&amp;w=2">20041115 [SNS Advisory No.79] A Possibility of Cookie Overwrite in Microsoft Internet Explorer</ref>
      <ref source="MISC" url="http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/79_e.html" adv="1" patch="1">http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/79_e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11680">11680</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18073">ie-path-cookie-overwrite(18073)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1528" seq="2004-1528" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Event Calendar module 2.13 for PHP-Nuke allows remote attackers to gain sensitive information via an HTTP request to (1) config.php, (2) index.php, or (3) submit.php, which reveal the full path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110064626111756&amp;w=2">20041116 [waraxe-2004-SA#038 - Multiple vulnerabilities in Event Calendar module for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11693">11693</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=38">http://www.waraxe.us/index.php?modname=sa&amp;id=38</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18105">event-calendar-path-disclosure(18105)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke_event_calendar" vendor="rob_sutton">
        <vers num="2.13"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1529" seq="2004-1529" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Event Calendar module 2.13 for PHP-Nuke allows remote attackers to execute arbitrary web script via the (1) type, (2) day, (3) month, or (4) year parameters in a Preview operation, or (5) event comments.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110064626111756&amp;w=2">20041116 [waraxe-2004-SA#038 - Multiple vulnerabilities in Event Calendar module for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11693">11693</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=38">http://www.waraxe.us/index.php?modname=sa&amp;id=38</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18106">event-calendar-xss(18106)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18107">event-calendar-comment-xss(18107)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke_event_calendar" vendor="rob_sutton">
        <vers num="2.13"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1530" seq="2004-1530" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Event Calendar module 2.13 for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the (1) eid or (2) cid parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110064626111756&amp;w=2">20041116 [waraxe-2004-SA#038 - Multiple vulnerabilities in Event Calendar module for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11693">11693</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=38">http://www.waraxe.us/index.php?modname=sa&amp;id=38</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18104">event-calendar-sql-injection(18104)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1531" seq="2004-1531" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in post.php in Invision Power Board (IPB) 2.0.0 through 2.0.2 allows remote attackers to execute arbitrary SQL commands via the qpid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forums.invisionpower.com/index.php?showtopic=154916" patch="1">http://forums.invisionpower.com/index.php?showtopic=154916</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110079592702417&amp;w=2">20041118 [MaxPatrol] SQL-injection in Invision Power Board 2.x</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=111454805209191&amp;w=2">20050425 SQL-injections in Invision Power Board v2.0.1</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=111462421824202&amp;w=2">20050427 Re: SQL-injections in Invision Power Board v2.0.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11703">11703</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18164">invisionpowerboard-sql-injection(18164)</ref>
    </refs>
    <vuln_soft>
      <prod name="invision_board" vendor="invision_power_services">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1532" seq="2004-1532" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">AppServ 2.5.x and earlier installs a default username and password, which allows remote attackers to gain access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110079586328430&amp;w=2">20041118 AppServ 2.5.x and Prior Exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11704">11704</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18163">appserv-default-account(18163)</ref>
    </refs>
    <vuln_soft>
      <prod name="appserv" vendor="appserv_open_project">
        <vers num="2.4"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.5"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1533" seq="2004-1533" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in pop3svr.exe for DMS POP3 1.5.3.27 and earlier allows remote attackers to cause a denial of service (service crash) via a long (1) username or (2) password.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110081437508585&amp;w=2">20041118 Buffer overlow in DMS POP3 Server for Windows 2000/XP 1.5.3 build</ref>
      <ref source="CONFIRM" url="http://www.digitalmapping.sk.ca/pop3srv/Update.asp" patch="1">http://www.digitalmapping.sk.ca/pop3srv/Update.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11705" patch="1">11705</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18161">dms-pop3-username-bo(18161)</ref>
    </refs>
    <vuln_soft>
      <prod name="pop3_server" vendor="digital_mappings_systems">
        <vers num="1.5.3_build37"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1534" seq="2004-1534" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">ZoneAlarm and ZoneAlarm Pro before 5.5.062, with ad-blocking enabled, allows remote web sites to cause a denial of service (application instability or system hang) via certain JavaScript.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://download.zonelabs.com/bin/free/securityAlert/18.html" adv="1" patch="1">http://download.zonelabs.com/bin/free/securityAlert/18.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110088808402495&amp;w=2">20041118 Zone Labs Ad-Blocking Instability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11706" patch="1">11706</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18159">zonealarm-adblock-dos(18159)</ref>
    </refs>
    <vuln_soft>
      <prod name="zonealarm" vendor="zonelabs">
        <vers num="4.0" edition=":pro"/>
        <vers num="4.5" edition=":pro"/>
        <vers num="4.5.538.001" edition=":pro"/>
        <vers num="5.0.590.015" edition=":pro"/>
        <vers num="5.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1535" seq="2004-1535" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in admin_cash.php for the Cash Mod module for phpBB allows remote attackers to execute arbitrary PHP code by modifying the phpbb_root_path parameter to reference a URL on a remote web server that contains the code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110075903308817&amp;w=2">20041118 Vulnerabilities in forum phpBB2 with Cash_Mod (all ver.)</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110082153702843&amp;w=2">20041118 Re: Vulnerabilities in forum phpBB2 with Cash_Mod (all ver.)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18151">phpbb-admincashphp-file-include(18151)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb_group">
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.0.10"/>
        <vers num="rc1"/>
        <vers num="rc1_pre"/>
        <vers num="rc2"/>
        <vers num="rc3"/>
        <vers num="rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1536" seq="2004-1536" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in the ibProArcade module for Invision Power Board (IPB) 1.x and 2.x allows remote attackers to execute arbitrary SQL commands via the cat parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110098512318132&amp;w=2">20041120 IpbProArace 2.5.x SQL injection.</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012292">1012292</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11719">11719</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18180">ibproarcade-category-sql-injection(18180)</ref>
    </refs>
    <vuln_soft>
      <prod name="ipbproarcade" vendor="ipbproarcade">
        <vers num="2.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1537" seq="2004-1537" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in popup.php in PHPKIT 1.6.03 through 1.6.1 allows remote attackers to execute arbitrary web script via the img parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110117116115493&amp;w=2">20041122 PHPKIT SQL Injection, XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11725">11725</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18204">phpkit-popup-xss(18204)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpkit" vendor="phpkit">
        <vers num="1.6.1"/>
        <vers num="1.6.02"/>
        <vers num="1.6.03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1538" seq="2004-1538" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in include.php in PHPKIT 1.6.03 through 1.6.1 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110117116115493&amp;w=2">20041122 PHPKIT SQL Injection, XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11725">11725</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18205">phpkit-include-sql-injection(18205)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpkit" vendor="phpkit">
        <vers num="1.6.1"/>
        <vers num="1.6.02"/>
        <vers num="1.6.03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1539" seq="2004-1539" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Halo: Combat Evolved 1.05 and earlier allows remote game servers to cause a denial of service (client crash) via a long value in a game server reply, which triggers a NULL dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110114770406920&amp;w=2">20041122 Broadcast client crash in Halo 1.05</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11724">11724</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18196">halo-long-reply-dos(18196)</ref>
    </refs>
    <vuln_soft>
      <prod name="halo_combat_evolved" vendor="gearbox_software">
        <vers num="1.2"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.31"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1540" seq="2004-1540" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to access rpFWUpload.html, which allows remote attackers to reset the router configuration file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110116413414615&amp;w=2">20041121 Router ZyXEL Prestige 650 HW http remote admin.</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110135136811344&amp;w=2">20041124 Re: Router ZyXEL Prestige 650 HW http remote admin.</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012298">1012298</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11723">11723</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18202">zyxel-configuration-reset(18202)</ref>
    </refs>
    <vuln_soft>
      <prod name="prestige" vendor="zyxel">
        <vers num="645r_a1"/>
        <vers num="650h"/>
        <vers num="650hw"/>
        <vers num="650hw_31"/>
        <vers num="650r"/>
      </prod>
      <prod name="zynos" vendor="zyxel">
        <vers num="3.40"/>
        <vers num="is.3"/>
        <vers num="is.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1541" seq="2004-1541" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SecureCRT 4.0, 4.1, and possibly other versions, allows remote attackers to execute arbitrary commands via a telnet:// URL that uses the /F option to specify a configuration file on a samba share.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110129164332226&amp;w=2">20041123 SecureCRT - Remote Command Execution</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11731" patch="1">11731</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18201">securecrt-folder-command-execution(18201)</ref>
    </refs>
    <vuln_soft>
      <prod name="securecrt" vendor="van_dyke_technologies">
        <vers num="4.0.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.1"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.1.3"/>
        <vers num="4.1.4"/>
        <vers num="4.1.5"/>
        <vers num="4.1.6"/>
        <vers num="4.1.7"/>
        <vers num="4.1.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1542" seq="2004-1542" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Soldier of Fortune II 1.03 Gold and earlier allows remote attackers to cause a denial of service (server or client crash) via a long (1) query or (2) reply.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110124208811327&amp;w=2">20041123 Broadcast memory corruption in Soldier of Fortune II 1.03</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11735">11735</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18211">soldier-fortune-bo(18211)</ref>
    </refs>
    <vuln_soft>
      <prod name="soldier_of_fortune" vendor="raven_software">
        <vers num="2.1.0.2"/>
        <vers num="2.1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1543" seq="2004-1543" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in viewimg.php in KorWeblog 1.6.2-cvs and earlier allows remote attackers to list arbitrary directories via a .. (dot dot) in the path parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029342.html" adv="1">20041124 STG Security Advisory: [SSA-20041122-10] KorWeblog directory traversal vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110132543805873&amp;w=2">20041124 STG Security Advisory: [SSA-20041122-10] KorWeblog directory traversal vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11744">11744</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18234">korweblog-viewimg-directory-traversal(18234)</ref>
    </refs>
    <vuln_soft>
      <prod name="korweblog" vendor="korweblog">
        <vers num="1.6.2cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1544" seq="2004-1544" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Search.jsp in JSPWiki 2.1.120-cvs and earlier allows remote attackers to execute arbitrary web script as other users via the query parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110135663220831&amp;w=2">20041124 STG Security Advisory: [SSA-20041122-11] JSPWiki XSS vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11746" patch="1">11746</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18236">jspwiki-query-xss(18236)</ref>
    </refs>
    <vuln_soft>
      <prod name="jspwiki" vendor="jspwiki">
        <vers num="2.1.120"/>
        <vers num="2.1.121"/>
        <vers num="2.1.122"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1545" seq="2004-1545" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">UploadFile.php in MoniWiki 1.0.9.2 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.hwp, which allows remote attackers to upload and execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-12/0448.html" adv="1" patch="1">20041215 STG Security Advisory: [SSA-20041215-15] Vulnerability of uploading files with multiple extensions in MoniWiki</ref>
      <ref source="CONFIRM" url="http://kldp.net/scm/cvsweb.php/moniwiki/plugin/UploadFile.php.diff?cvsroot=moniwiki&amp;only_with_tag=HEAD&amp;r1=text&amp;tr1=1.17&amp;r2=text&amp;tr2=1.16&amp;f=h">http://kldp.net/scm/cvsweb.php/moniwiki/plugin/UploadFile.php.diff?cvsroot=moniwiki&amp;only_with_tag=HEAD&amp;r1=text&amp;tr1=1.17&amp;r2=text&amp;tr2=1.16&amp;f=h</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110314544711884&amp;w=2">20041215 STG Security Advisory: [SSA-20041215-15] Vulnerability of uploading files with multiple extensions in MoniWiki</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11951" patch="1">11951</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18493">moniwiki-file-upload(18493)</ref>
    </refs>
    <vuln_soft>
      <prod name="moniwiki" vendor="moniwiki">
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1546" seq="2004-1546" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in MDaemon 6.5.1 allow remote attackers to cause a denial of service (application crash) via a long (1) SAML, SOML, SEND, or MAIL command to the SMTP server or (2) LIST command to the IMAP server.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026770.html">20040922 Remote buffer overflow in MDaemon IMAP and SMTP server</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109591179510781&amp;w=2">20040922 Remote buffer overflow in MDaemon IMAP and SMTP server</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11238">11238</ref>
      <ref source="MISC" url="http://www.securitylab.ru/48146.html">http://www.securitylab.ru/48146.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17476">mdaemon-imap-list-bo(17476)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17477">mdaemon-smtp-bo(17477)</ref>
    </refs>
    <vuln_soft>
      <prod name="mdaemon" vendor="alt-n">
        <vers num="6.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1547" seq="2004-1547" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The file server in ActivePost Standard 3.1 and earlier allows remote authenticated users to cause a denial of service (application crash) via a long filename, possibly triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/actp-adv.txt">http://aluigi.altervista.org/adv/actp-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109597139011373&amp;w=2">20040923 Multiple vulnerabilities in ActivePost Standard 3.1</ref>
      <ref source="SECUNIA" url="http://secunia.com/advisories/12642">12642</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011406">1011406</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11244">11244</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17482">activepost-long-filename-dos(17482)</ref>
    </refs>
    <vuln_soft>
      <prod name="activepost_standard" vendor="onnuri_infotek">
        <vers num="3.0"/>
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1548" seq="2004-1548" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the file server in ActivePost Standard 3.1 allows remote authenticated users to upload arbitrary files via a .. (dot dot) in the filename.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/actp-adv.txt">http://aluigi.altervista.org/adv/actp-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109597139011373&amp;w=2">20040923 Multiple vulnerabilities in ActivePost Standard 3.1</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011406">1011406</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11244">11244</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17488">activepost-dotdot-directory-traversal(17488)</ref>
    </refs>
    <vuln_soft>
      <prod name="activepost_standard" vendor="onnuri_infotek">
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1549" seq="2004-1549" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The conference menu in ActivePost Standard 3.1 sends passwords of password-protected rooms in cleartext, which could allow remote attackers to gain sensitive information by sniffing the network connection.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/actp-adv.txt">http://aluigi.altervista.org/adv/actp-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109597139011373&amp;w=2">20040923 Multiple vulnerabilities in ActivePost Standard 3.1</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011406">1011406</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11244">11244</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17486">activepost-plaintext-password(17486)</ref>
    </refs>
    <vuln_soft>
      <prod name="activepost_standard" vendor="onnuri_infotek">
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1550" seq="2004-1550" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Motorola Wireless Router WR850G running firmware 4.03 allows remote attackers to bypass authentication, log on as an administrator, and obtain sensitive information by repeatedly making an HTTP request for ver.asp until an administrator logs on.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026791.html" adv="1">20040923 Motorola Wireless Router WR850G Authentication Circumvention</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109613135105800&amp;w=2">20040924 Motorola Wireless Router WR850G Authentication Circumvention</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11241" patch="1">11241</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17474">motorola-wr850g-gain-access(17474)</ref>
    </refs>
    <vuln_soft>
      <prod name="wr850g" vendor="motorola">
        <vers num="4.0.3_firmware"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1551" seq="2004-1551" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the (1) email or (2) file modules in paFileDB 3.1 Final allows remote attackers to execute arbitrary web script or HTML via the id parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109613031414184&amp;w=2">20040925 New XSS vulnerabilities in paFileDB 3.1 final</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17504">pafiledb-pafiledb-xss(17504)</ref>
    </refs>
    <vuln_soft>
      <prod name="pafiledb" vendor="php_arena">
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1552" seq="2004-1552" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in aspWebCalendar allows remote attackers to execute arbitrary SQL statements via (1) the username field on the login page or (2) the eventid parameter to calendar.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109604910025090&amp;w=2">20040923 aspWebCalendar /aspWebAlbum: SQL injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11246">11246</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/23098">23098</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2007/1093">ADV-2007-1093</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17506">aspwebcalendar-sql-injection(17506)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/33157">aspwebcalendar-calendar-sql-injection(33157)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/3546">3546</ref>
    </refs>
    <vuln_soft>
      <prod name="aspwebcalendar" vendor="full_revolution">
        <vers num="4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1553" seq="2004-1553" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in aspWebAlbum allows remote attackers to execute arbitrary SQL statements via (1) the username field on the login page or (2) the cat parameter to album.asp.  NOTE: it was later reported that vector 1 affects aspWebAlbum 3.2, and the vector involves the txtUserName parameter in a processlogin action to album.asp, as reachable from the login action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109604910025090&amp;w=2">20040923 aspWebCalendar /aspWebAlbum: SQL injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11246">11246</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/30996">30996</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17507">aspwebalbum-sql-injection(17507)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44876">aspwebalbum-image-file-upload(44876)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/44877">aspwebalbum-album-sql-injection(44877)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6357">6357</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/6420">6420</ref>
    </refs>
    <vuln_soft>
      <prod name="aspwebalbum" vendor="fullrevolution">
        <vers num="3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1554" seq="2004-1554" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in livre_include.php in @lex Guestbook allows remote attackers to execute arbitrary PHP code by modifying the chem_absolu parameter to reference a URL on a remote web server that contains the code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109635806703748&amp;w=2">20040926 @lex Guestbook (PHP) Include file</ref>
      <ref source="MISC" url="http://packetstormsecurity.nl/0410-exploits/alexPHP.txt" adv="1">http://packetstormsecurity.nl/0410-exploits/alexPHP.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011432">1011432</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11260" patch="1">11260</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17516">@lex-guestbook-file-include(17516)</ref>
    </refs>
    <vuln_soft>
      <prod name="alex_guestbook" vendor="alexphpteam">
        <vers num="3.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1555" seq="2004-1555" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in BroadBoard Instant ASP Message Board allow remote attackers to run arbitrary SQL commands via the (1) keywords parameter to search.asp, (2) handle parameter to profile.asp, (3) txtUserHandle parameter to reg2.asp or (4) txtUserEmail parameter to forgot.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109630777608244&amp;w=2">20040926 SQL injection in BroadBoard Instant ASP Message Board</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011419">1011419</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11250">11250</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17498">broadboard-searchasp-sql-injection(17498)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17500">broadboard-profileasp-sql-injection(17500)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17501">broadboard-reg2asp-sql-injection(17501)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17502">broadboard-forgotasp-sql-injection(17502)</ref>
    </refs>
    <vuln_soft>
      <prod name="asp_message_board" vendor="broadboard_instant">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1556" seq="2004-1556" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">MyWebServer 1.0.3 allows remote attackers to cause a denial of service (application crash) via a large number of connections within a short time.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109630333230707&amp;w=2">20040927 MyWebServer 1.0.3</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011461">1011461</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11254">11254</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17519">mywebserver-mult-connections-dos(17519)</ref>
    </refs>
    <vuln_soft>
      <prod name="mywebserver" vendor="mywebserver">
        <vers num="1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1557" seq="2004-1557" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">MyWebServer 1.0.3 allows remote attackers to bypass authentication, modify configuration, and read arbitrary files via a direct HTTP request to (1) /admin or (2) ServerProperties.html.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109630333230707&amp;w=2">20040927 MyWebServer 1.0.3</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011461">1011461</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11254">11254</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17520">mywebserver-admin-access(17520)</ref>
    </refs>
    <vuln_soft>
      <prod name="mywebserver" vendor="mywebserver">
        <vers num="1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1558" seq="2004-1558" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in YPOPs! (aka YahooPOPS) 0.4 through 0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) POP3 USER command or (2) SMTP request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dbeusee.home.comcast.net/history.html">http://dbeusee.home.comcast.net/history.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109630699829536&amp;w=2">20040927 [Hat-Squad] Remote Buffer overflow Vulnerability in YahooPOPS</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Sep/1011426.html">1011426</ref>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2006-October/001089.html">20061020 vendor ACK for old YPOPs! issue</ref>
      <ref source="MISC" url="http://www.hat-squad.com/en/000075.html" adv="1">http://www.hat-squad.com/en/000075.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11256" patch="1">11256</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17515">ypops-pop3-bo(17515)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17518">ypops-smtp-bo(17518)</ref>
    </refs>
    <vuln_soft>
      <prod name="ypops" vendor="ypops">
        <vers num="0.4"/>
        <vers num="0.4.1"/>
        <vers num="0.4.2"/>
        <vers num="0.4.3"/>
        <vers num="0.4.4"/>
        <vers num="0.4.5"/>
        <vers num="0.4.6"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1559" seq="2004-1559" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Wordpress 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) redirect_to, text, popupurl, or popuptitle parameters to wp-login.php, (2) redirect_url parameter to admin-header.php, (3) popuptitle, popupurl, content, or post_title parameters to bookmarklet.php, (4) cat_ID parameter to categories.php, (5) s parameter to edit.php, or (6) s or mode parameter to edit-comments.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109641484723194&amp;w=2">20040927 Multiple XSS Vulnerabilities in Wordpress 1.2</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011440">1011440</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11268" patch="1">11268</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17532">wordpress-multiple-scripts-xss(17532)</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1560" seq="2004-1560" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Microsoft SQL Server 7.0 allows remote attackers to cause a denial of service (mssqlserver service halt) via a long request to TCP port 1433, possibly triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109650760210411&amp;w=2">20040928 MSSQL 7.0 DoS</ref>
      <ref source="MISC" url="http://packetstormsecurity.nl/0410-exploits/mssql.7.0.dos.c">http://packetstormsecurity.nl/0410-exploits/mssql.7.0.dos.c</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011434">1011434</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11265">11265</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17542">mssql-data-buffer-dos(17542)</ref>
    </refs>
    <vuln_soft>
      <prod name="sql_server" vendor="microsoft">
        <vers num="7.0" edition="sp1"/>
        <vers num="7.0" edition="sp2"/>
        <vers num="7.0" edition="sp3"/>
        <vers num="7.0" edition="sp4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1561" seq="2004-1561" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Icecast 2.0.1 and earlier allows remote attackers to execute arbitrary code via an HTTP request with a large number of headers.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/iceexec-adv.txt" adv="1">http://aluigi.altervista.org/adv/iceexec-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109640005127644&amp;w=2">20040928 Code execution in Icecast 2.0.1</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109674593230539&amp;w=2">20041002 Re:2. Code execution in Icecast 2.0.1(exploit with shellcode)</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011439">1011439</ref>
      <ref source="MISC" url="http://www.securiteam.com/exploits/6X00315BFM.html" adv="1">http://www.securiteam.com/exploits/6X00315BFM.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11271" patch="1">11271</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17538">icecast-http-bo(17538)</ref>
    </refs>
    <vuln_soft>
      <prod name="icecast" vendor="icecast">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1562" seq="2004-1562" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in redir_url.php in w-Agora 4.1.6a allows remote attackers to execute arbitrary SQL commands via the key parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/027040.html" adv="1">20040930 Multiple vulnerabilities in w-agora forum</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109655691512298&amp;w=2">20040930 Multiple vulnerabilities in w-agora forum</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011463">1011463</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11283">11283</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17557">wagora-redirurl-sql-injection(17557)</ref>
    </refs>
    <vuln_soft>
      <prod name="w-agora" vendor="w-agora">
        <vers num="4.1.6a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1563" seq="2004-1563" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in w-Agora 4.1.6a allow remote attackers to execute arbitrary web script or HTML via the (1) thread parameter to download_thread.php, (2) loginuser parameter to login.php, or (3) userid parameter to forgot_password.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/027040.html" adv="1">20040930 Multiple vulnerabilities in w-agora forum</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109655691512298&amp;w=2">20040930 Multiple vulnerabilities in w-agora forum</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011463">1011463</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11283">11283</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17553">wagora-get-post-xss(17553)</ref>
    </refs>
    <vuln_soft>
      <prod name="w-agora" vendor="w-agora">
        <vers num="4.1.6a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1564" seq="2004-1564" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in subscribe_thread.php in w-Agora 4.1.6a allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the thread parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/027040.html" adv="1">20040930 Multiple vulnerabilities in w-agora forum</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109655691512298&amp;w=2">20040930 Multiple vulnerabilities in w-agora forum</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011463">1011463</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11283">11283</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17558">wagora-response-splitting(17558)</ref>
    </refs>
    <vuln_soft>
      <prod name="w-agora" vendor="w-agora">
        <vers num="4.1.6a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1565" seq="2004-1565" published="2004-12-31" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">list.php in w-Agora 4.1.6a allows remote attackers to reveal the full path via a crafted HTTP request, possibly involving a malformed id parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/027040.html" adv="1">20040930 Multiple vulnerabilities in w-agora forum</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109655691512298&amp;w=2">20040930 Multiple vulnerabilities in w-agora forum</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011463">1011463</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11283">11283</ref>
    </refs>
    <vuln_soft>
      <prod name="w-agora" vendor="w-agora">
        <vers num="4.1.6a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1566" seq="2004-1566" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Silent Storm Portal 2.1 and 2.2 allows remote attackers to execute arbitrary web script or HTML via the module parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109655763808924&amp;w=2">20040930 Multiple Vulnerabilities in Silent Storm Portal</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011470">1011470</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11284">11284</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17554">silent-storm-xss(17554)</ref>
    </refs>
    <vuln_soft>
      <prod name="silent-storm_portal" vendor="silent-storm">
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1567" seq="2004-1567" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">profile.php in Silent Storm Portal 2.1 and 2.2 allows remote attackers to gain privileges by setting the mail parameter to 1, which is the value for an administrator.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109655763808924&amp;w=2">20040930 Multiple Vulnerabilities in Silent Storm Portal</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011470">1011470</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11284">11284</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17555">silent-storm-gain-admin(17555)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1568" seq="2004-1568" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in ParaChat Server 5.5 allows remote attackers to read arbitrary files via a ..%5C (hex-encoded dot dot) in the URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-09/1047.html">20040928 directory traversal in ParaChat Server 5.5</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-09/1063.html">20040929 Re: directory traversal in ParaChat Server 5.5</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109647769526696&amp;w=2">20040929 directory traversal in ParaChat Server 5.5</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109656982803391&amp;w=2">20040930 Re: directory traversal in ParaChat Server 5.5</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011438">1011438</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11272">11272</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17541">parachat-directory-traversal(17541)</ref>
    </refs>
    <vuln_soft>
      <prod name="parachat_server" vendor="parachat">
        <vers num="5.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1569" seq="2004-1569" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in (1) MusicConverter.exe, (2) playlist.exe, and (3) amp.exe in dBpowerAMP Audio Player 2.0 and dbPowerAmp Music Converter 10.0 allows remote attackers to cause a denial of service or execute arbitrary code via a .pls or .m3u playlist that contains long File1 (filename) fields.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109668542406346&amp;w=2">20040930 dbPowerAmp Buffer Overflow And Dos Vulnerabilities</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00052-09272004" adv="1">http://www.gulftech.org/?node=research&amp;article_id=00052-09272004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11266">11266</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17535">dbpoweramp-player-filename-bo(17535)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17539">dbpoweramp-converter-filename-bo(17539)</ref>
    </refs>
    <vuln_soft>
      <prod name="dbpoweramp_audio_player" vendor="illustrate">
        <vers num="2.0"/>
      </prod>
      <prod name="dbpoweramp_music_converter" vendor="illustrate">
        <vers num="10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1570" seq="2004-1570" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in bBlog 0.7.2 and 0.7.3 allows remote attackers to execute arbitrary SQL commands via the p parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109665351632048&amp;w=2">20041001 SQL Injection vulnerability in bBlog 0.7.3</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11303">11303</ref>
      <ref source="MISC" url="http://www.servers.co.nz/security/SCN200409-1.php">http://www.servers.co.nz/security/SCN200409-1.php</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17552">bblog-array-sql-injection(17552)</ref>
    </refs>
    <vuln_soft>
      <prod name="bblog" vendor="eaden_mckee">
        <vers num="0.7.2"/>
        <vers num="0.7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1571" seq="2004-1571" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">AJ-Fork 167 allows remote attackers to gain sensitive information via a direct request to (1) auto-acronyms.php, (2) auto-archive.php, (3) ount-article-views.php, (4) kses.php, (5) custom-quick-tags.php, (6) disable-all-comments.php, (7) easy-date-format.php, (8) enable-disable-comments.php, (9) filter-by-author.php, (10) format-switcher.php, (11) long-to-short.php, (12) prospective-posting.php, or (13) sort-by-xfield.php, which displays the full path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://echo.or.id/adv/adv07-y3dips-2004.txt" adv="1">http://echo.or.id/adv/adv07-y3dips-2004.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109664986210763&amp;w=2">20041001 Multiple Vulnerabilities in AJ-Fork</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17568">aj-fork-path-disclosure(17568)</ref>
    </refs>
    <vuln_soft>
      <prod name="aj-fork" vendor="aj-fork">
        <vers num="167"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1572" seq="2004-1572" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">AJ-Fork 167 does not restrict access to directories such as (1) data, (2) inc, (3) plugins, (4) skins, or (5) tools, which allows remote attackers to list files in those directories via a direct HTTP request.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://echo.or.id/adv/adv07-y3dips-2004.txt">http://echo.or.id/adv/adv07-y3dips-2004.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109664986210763&amp;w=2">20041001 Multiple Vulnerabilities in AJ-Fork</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011484">1011484</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11301">11301</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17569">af-fork-directory-disclosure(17569)</ref>
    </refs>
    <vuln_soft>
      <prod name="aj-fork" vendor="aj-fork">
        <vers num="167"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1573" seq="2004-1573" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The documentation for AJ-Fork 167 implies that users should set permissions for users.db.php to 777, which allows local users to execute arbitrary PHP code and gain privileges as the administrator.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://echo.or.id/adv/adv07-y3dips-2004.txt" adv="1">http://echo.or.id/adv/adv07-y3dips-2004.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109664986210763&amp;w=2">20041001 Multiple Vulnerabilities in AJ-Fork</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011484">1011484</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11301">11301</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17571">aj-fork-usersdbphp-write-access(17571)</ref>
    </refs>
    <vuln_soft>
      <prod name="aj-fork" vendor="aj-fork">
        <vers num="167"/>
      </prod>
      <prod name="cutenews" vendor="cutephp">
        <vers num="0.88"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1574" seq="2004-1574" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Vypress Messenger 3.5.1 and earlier allows remote attackers to execute arbitrary code via a message with a long first field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/vymesbof-adv.txt" patch="1">http://aluigi.altervista.org/adv/vymesbof-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109665993315769&amp;w=2">20041001 Broadcast buffer-overflow in Vypress Messenger 3.5.1</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011489">1011489</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11310" patch="1">11310</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17572">vypress-visual-bo(17572)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1575" seq="2004-1575" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The XML parser in Xerces-C++ 2.5.0 allows remote attackers to cause a denial of service (CPU consumption) via XML attributes in a crafted XML document.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109674050017645&amp;w=2">20041002 Security advisory - Xerces-C++ 2.5.0: Attribute blowup</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11312" patch="1">11312</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17575">xercescplusplus-xml-parser-dos(17575)</ref>
    </refs>
    <vuln_soft>
      <prod name="xerces-c++" vendor="apache">
        <vers num="2.5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1576" seq="2004-1576" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in Judge Dredd: Dredd vs. Death 1.01 and earlier allows remote attackers to cause a denial of service (application crash) via format string specifiers in a chat message.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109674541519610&amp;w=2">20041002 In-game format string in Judge Dredd vs. Death 1.01</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17579">judge-dredd-death-format-string(17579)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1577" seq="2004-1577" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">index.php in PHP Links allows remote attackers to gain sensitive information via an invalid show parameter, which reveals the full path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109693280416747&amp;w=2">20041003 Full path disclosure in PHP Links</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17588">phplinks-path-disclosure(17588)</ref>
    </refs>
    <vuln_soft>
      <prod name="phplinks" vendor="greg_donald">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1578" seq="2004-1578" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Invision Power Board 2.0.0 allows remote attackers to execute arbitrary web script or HTML via the Referer field in the HTTP header.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109701091207517&amp;w=2">20041005 [MAXPATROL Security Advisories] Cross site scripting in Invision Power Board</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11332">11332</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17604">invision-referer-header-xss(17604)</ref>
    </refs>
    <vuln_soft>
      <prod name="invision_power_board" vendor="invision_power_services">
        <vers num="2.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1579" seq="2004-1579" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">index.php in CubeCart 2.0.1 allows remote attackers to gain sensitive information via an HTTP request with an invalid cat_id parameter, which reveals the full path in a PHP error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109713382400457&amp;w=2">20041006 Full path disclosure and sql injection on CubeCart 2.0.1</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17630">cubecart-catid-path-disclosure(17630)</ref>
    </refs>
    <vuln_soft>
      <prod name="cubecart" vendor="devellion">
        <vers num="2.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1580" seq="2004-1580" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in CubeCart 2.0.1 allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109713382400457&amp;w=2">20041006 Full path disclosure and sql injection on CubeCart 2.0.1</ref>
      <ref source="EXPLOIT-DB" url="http://www.exploit-db.com/exploits/15278">15278</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11337">11337</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17632">cubecart-catid-sql-injection(17632)</ref>
    </refs>
    <vuln_soft>
      <prod name="cubecart" vendor="devellion">
        <vers num="2.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1581" seq="2004-1581" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">BlackBoard 1.5.1 allows remote attackers to gain sensitive information via a direct request to (1) checkdb.inc.php, (2) admin.inc.php or (3) cp.inc.php, which reveals the path in a PHP error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109707701719659&amp;w=2">20041006 Multiple vulnerabilities in BlackBoard</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17636">blackboard-directory-traversal(17636)</ref>
    </refs>
    <vuln_soft>
      <prod name="blackboard" vendor="blackboard">
        <vers num="1.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1582" seq="2004-1582" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in BlackBoard 1.5.1 allows remote attackers to execute arbitrary PHP code by modifying the libpath parameter (incorrectly called "libpach") to reference a URL on a remote web server that contains _more.php, as demonstrated using checkdb.inc.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://blackboard.unclassified.de/70,1#1031" patch="1">http://blackboard.unclassified.de/70,1#1031</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109707701719659&amp;w=2">20041006 Multiple vulnerabilities in BlackBoard</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11336" patch="1">11336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17637">blackboard-lang-file-include(17637)</ref>
    </refs>
    <vuln_soft>
      <prod name="blackboard_internet_newsboard_system" vendor="blackboard_internet_newsboard_system">
        <vers num="1.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1583" seq="2004-1583" published="2004-12-31" modified="2017-07-18" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the FTP server in TriDComm 1.3 and earlier allows remote attackers to read or write arbitrary files via a .. (dot dot) in FTP commands such as (1) DIR, (2) GET, or (3) PUT.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109709637732276&amp;w=2">20041006 Directory traversal in Tridcomm 1.3</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11343">11343</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17631">tridcomm-dotdot-directory-traversal(17631)</ref>
    </refs>
    <vuln_soft>
      <prod name="tridcomm" vendor="tridcomm">
        <vers num="1.2"/>
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1584" seq="2004-1584" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in wp-login.php in WordPress 1.2 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the text parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109716327724041&amp;w=2">20041006 HTTP Response Splitting Vulnerability in Wordpress 1.2</ref>
      <ref source="CONFIRM" url="http://wordpress.org/development/2004/10/wp-121/" patch="1">http://wordpress.org/development/2004/10/wp-121/</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-12.xml" patch="1">GLSA-200410-12</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11348" patch="1">11348</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17649">wordpress-response-splitting(17649)</ref>
    </refs>
    <vuln_soft>
      <prod name="wordpress" vendor="wordpress">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1585" seq="2004-1585" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Flash Messaging 5.2.0g (rev 1.1.2) and earlier allows remote attackers to cause a denial of service (application crash) via certain wide characters.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109716787607302&amp;w=2">20041007 Server crash in Flash Messaging 5.2.0g</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011569">1011569</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11351">11351</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17647">flash-messaging-dos(17647)</ref>
    </refs>
    <vuln_soft>
      <prod name="flash_messaging" vendor="jera_technology">
        <vers num="5.2"/>
        <vers num="5.2g"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1586" seq="2004-1586" published="2004-12-31" modified="2016-10-17" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Flash Messaging clients can ignore disconnecting commands such as "shutdown" from the Flash Messaging Server 5.2.0g (rev 1.1.2), which could allow remote attackers to stay connected.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109716787607302&amp;w=2">20041007 Server crash in Flash Messaging 5.2.0g</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011569">1011569</ref>
    </refs>
    <vuln_soft>
      <prod name="flash_messaging_server" vendor="jera_technology">
        <vers num="5.2.0g"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1587" seq="2004-1587" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Monolith games including (1) Alien versus Predator 2 1.0.9.6 and earlier, (2) Blood 2 2.1 and earlier, (3) No one lives forever 1.004 and earlier and (4) Shogo 2.2 and earlier allows remote attackers to cause a denial of service (application crash) via a long secure Gamespy query.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109728194025487&amp;w=2">20041008 Limited \secure\ buffer-overflow in some old Monolith games</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=109727077824860&amp;w=2">20041008 Limited \secure\ buffer-overflow in some old Monolith games</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Oct/1011603.html">1011603</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11354" patch="1">11354</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17665">avp2-long-query-bo(17665)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17668">blood2-long-query-bo(17668)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17669">nolf-long-query-bo(17669)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17670">shogo-long-query-bo(17670)</ref>
    </refs>
    <vuln_soft>
      <prod name="alien_versus_predator" vendor="monolith_productions">
        <vers num="2.1.0.9.6"/>
      </prod>
      <prod name="blood" vendor="monolith_productions">
        <vers num="2_2.1"/>
      </prod>
      <prod name="no_one_lives_forever" vendor="monolith_productions">
        <vers num="1.0.004"/>
      </prod>
      <prod name="shogo" vendor="monolith_productions">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1588" seq="2004-1588" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in GoSmart Message Board allows remote attackers to execute arbitrary SQL code via the (1) QuestionNumber and Category parameters to Forum.asp or (2) Username and Password parameter to Login_Exec.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109751522823011&amp;w=2">20041011 [MAxpatrol Security Advisory]  Multiple vulnerabilities in GoSmart Message Board</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11361">11361</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17678">gosmart-forum-loginexec-sql-injection(17678)</ref>
    </refs>
    <vuln_soft>
      <prod name="gosmart_message_board" vendor="gosmart">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1589" seq="2004-1589" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in GoSmart Message Board allows remote attackers to execute inject web script or HTML via the (1) Category parameter to Forum.asp or (2) MainMessageID parameter to ReplyToQuestion.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109751522823011&amp;w=2">20041011 [MAxpatrol Security Advisory]  Multiple vulnerabilities in GoSmart Message Board</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11361">11361</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17679">gosmart-forum-mainmessageid-xss(17679)</ref>
    </refs>
    <vuln_soft>
      <prod name="gosmart_message_board" vendor="gosmart">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1590" seq="2004-1590" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Clientexec allows remote attackers to gain sensitive information via an HTTP request to phpinfo.php, which calls the phpinfo function.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109787365801512&amp;w=2">20041012 Clientexec Billing Software</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17741">clientexec-phpinfo-info-disclosure(17741)</ref>
    </refs>
    <vuln_soft>
      <prod name="clientexec" vendor="clientexec">
        <vers num="2.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1591" seq="2004-1591" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The web interface for Micronet Wireless Broadband Router SP916BM running firmware before 1.9 08/04/2004 resets the password to the default password when the router is shut off, which could allow remote attackers to gain access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109759963126161&amp;w=2">20041012 Micronet wireless broadband router SP916BM admin password reset when power off</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17697">micronet-router-password-reset(17697)</ref>
    </refs>
    <vuln_soft>
      <prod name="sp916bm" vendor="micronet">
        <vers num="1.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1592" seq="2004-1592" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in index.php in ocPortal 1.0.3 and earlier allows remote attackers to execute arbitrary PHP code by modifying the req_path parameter to reference a URL on a remote web server that contains a malicious funcs.php script.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109763314312828&amp;w=2">20041012 [hackgen-2004-#002] - Remote file inclusion bug in ocPortal 1.0.3.</ref>
      <ref source="MISC" url="http://www.hackgen.org/advisories/hackgen-2004-002.txt" adv="1">http://www.hackgen.org/advisories/hackgen-2004-002.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11368" patch="1">11368</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17699">ocportal-reqpath-file-include(17699)</ref>
    </refs>
    <vuln_soft>
      <prod name="ocportal" vendor="ocportal">
        <vers num="1.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1593" seq="2004-1593" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in render.UserLayoutRootNode.uP in SCT Campus Pipeline allows remote attackers to inject arbitrary web script or HTML via the utf parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109768337007983&amp;w=2">20041013 XXS in SCT email client</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11392">11392</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17704">sct-campus-userlayoutrootnode-xss(17704)</ref>
    </refs>
    <vuln_soft>
      <prod name="campus_pipeline" vendor="sct_corporation">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1594" seq="2004-1594" published="2004-10-13" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in FuseTalk 4.0 allows remote attackers to execute arbitrary web script via an img src tag.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109768460312168&amp;w=2">20041013 XXS in fusetalk forum</ref>
      <ref source="SECUNIA" url="http://www.securityfocus.com/bid/11393" adv="1">12823</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17701">fusetalk-imgsrc-xss(17701)</ref>
    </refs>
    <vuln_soft>
      <prod name="fusetalk" vendor="e-zone_media_inc.">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1595" seq="2004-1595" published="2004-10-13" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in ShixxNote 6.net build 117 allows remote attackers to execute arbitrary code via a long font field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109778648232233&amp;w=2">20041013 Buffer-overflow in ShixxNOTE 6.net</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11409" adv="1">11409</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17705">shixxnote-font-bo(17705)</ref>
    </refs>
    <vuln_soft>
      <prod name="shixxnote" vendor="shixxnote">
        <vers num="6.net"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1596" seq="2004-1596" published="2004-10-13" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The 3COM Wireless router 3CRADSL72 running Boot Code 1.3d allows remote attackers to gain sensitive information such as passwords and router settings via a direct HTTP request to app_sta.stm.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109778914829901&amp;w=2">20041013 3COM Wireless router (3CRADSL72) information disclosure</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109810854031673&amp;w=2">20041015 Re: 3COM Wireless router (3CRADSL72) information disclosure</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/378551" adv="1">20041015 More details on BID 11408 (3com 3cradsl72 wireless router)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11408" adv="1">11408</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17723">3com-officeconnect-obtain-info(17723)</ref>
    </refs>
    <vuln_soft>
      <prod name="3cradsl72" vendor="3com">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1597" seq="2004-1597" published="2004-10-13" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">RIM Blackberry 7230 running RIM Blackberry OS 3.7 SP1 allows remote attackers to cause a denial of service (device reboot and possibly data corruption) via a calendar message with a long Location field, which triggers a watchdog while the message is being stored.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027487.html" adv="1">20041012 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109769022430842&amp;w=2">20041013 [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109778267829493&amp;w=2">20041014 [HV-MED] UPDATE: RIM Blackberry DoS, data loss</ref>
      <ref source="CONFIRM" url="http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/Known_%20Issues_-_HexView_advisory_on_BlackBerry_buffer_overflow,_DoS,_and_data_loss.html?nodeid=737173&amp;vernum=0" adv="1" patch="1">http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/7925/8142/Known_%20Issues_-_HexView_advisory_on_BlackBerry_buffer_overflow,_DoS,_and_data_loss.html?nodeid=737173&amp;vernum=0</ref>
      <ref source="MISC" url="http://www.hexview.com/docs/20041012-1.txt" adv="1">http://www.hexview.com/docs/20041012-1.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11389" adv="1" patch="1">11389</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17700">blackberry-calendar-bo(17700)</ref>
    </refs>
    <vuln_soft>
      <prod name="blackberry" vendor="rim">
        <vers num="7230_3.7.1_.41"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1598" seq="2004-1598" published="2004-10-12" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Adobe Acrobat and Acrobat Reader 6.0 allow remote attackers to read arbitrary files via a PDF file that contains an embedded Shockwave (swf) file that references files outside of the temporary directory.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109771686326956&amp;w=2">20041012 Adobe acrobat / Adobe Reader 6 can read local files</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109779541602447&amp;w=2">20041014 Re: Adobe acrobat / Adobe Reader 6 can read local files</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109812210520520&amp;w=2">20041015 Re: Adobe acrobat / Adobe Reader 6 can read local files</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11386" adv="1">11386</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17694">adobe-acrobat-swf-read-files(17694)</ref>
    </refs>
    <vuln_soft>
      <prod name="acrobat" vendor="adobe">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
      </prod>
      <prod name="acrobat_reader" vendor="adobe">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1599" seq="2004-1599" published="2004-10-16" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in CoolPHP 1.0-stable allows remote attackers to execute arbitrary web script or HTML via the (1) query or (2) nick parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109810941419669&amp;w=2">20041016 Multiple Vulnerabilities in CoolPHP</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011748" adv="1">1011748</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11437" adv="1">11437</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17742">coolphp-multiple-xss(17742)</ref>
    </refs>
    <vuln_soft>
      <prod name="coolphpweb_portal" vendor="coolphp">
        <vers num="1.0_stable"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1600" seq="2004-1600" published="2004-10-16" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">index.php in CoolPHP 1.0-stable allows remote attackers to gain sensitive information via an invalid op parameter, which reveals the path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109810941419669&amp;w=2">20041016 Multiple Vulnerabilities in CoolPHP</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011748" adv="1">1011748</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17744">coolphp-path-disclosure(17744)</ref>
    </refs>
    <vuln_soft>
      <prod name="coolphp" vendor="coolphp">
        <vers num="1.0_stable"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1601" seq="2004-1601" published="2004-10-16" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in CoolPHP 1.0-stable allows remote attackers to access arbitrary files and execute local PHP scripts via a .. (dot dot) in the op parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109810941419669&amp;w=2">20041016 Multiple Vulnerabilities in CoolPHP</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011748" adv="1">1011748</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11437">11437</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17745">coolphp-dotdot-directory-traversal(17745)</ref>
    </refs>
    <vuln_soft>
      <prod name="coolphp_web_portal" vendor="coolphp">
        <vers num="1.0_stable"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1602" seq="2004-1602" published="2004-10-15" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ProFTPD 1.2.x, including 1.2.8 and 1.2.10, responds in a different amount of time when a given username exists, which allows remote attackers to identify valid usernames by timing the server response.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109786760926133&amp;w=2">20041015 ProFTPD 1.2.x remote users enumeration bug</ref>
      <ref source="MISC" url="http://security.lss.hr/index.php?page=details&amp;ID=LSS-2004-10-02" adv="1" patch="1">http://security.lss.hr/index.php?page=details&amp;ID=LSS-2004-10-02</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011687" adv="1" patch="1">1011687</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11430" adv="1">11430</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17724">proftpd-info-disclosure(17724)</ref>
    </refs>
    <vuln_soft>
      <prod name="proftpd" vendor="proftpd_project">
        <vers num="1.2"/>
        <vers num="1.2.0_rc1"/>
        <vers num="1.2.0_rc2"/>
        <vers num="1.2.0_rc3"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.2_rc1"/>
        <vers num="1.2.2_rc3"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.5_rc1"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.7_rc1"/>
        <vers num="1.2.7_rc2"/>
        <vers num="1.2.7_rc3"/>
        <vers num="1.2.8"/>
        <vers num="1.2.8_rc1"/>
        <vers num="1.2.8_rc2"/>
        <vers num="1.2.9"/>
        <vers num="1.2.9_rc1"/>
        <vers num="1.2.9_rc2"/>
        <vers num="1.2.9_rc3"/>
        <vers num="1.2_pre1"/>
        <vers num="1.2_pre2"/>
        <vers num="1.2_pre3"/>
        <vers num="1.2_pre4"/>
        <vers num="1.2_pre5"/>
        <vers num="1.2_pre6"/>
        <vers num="1.2_pre7"/>
        <vers num="1.2_pre8"/>
        <vers num="1.2_pre9"/>
        <vers num="1.2_pre10"/>
        <vers num="1.2_pre11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1603" seq="2004-1603" published="2004-10-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">cPanel 9.4.1-RELEASE-64 follows hard links, which allows local users to (1) read arbitrary files via the backup feature or (2) chown arbitrary files via the .htaccess file when Front Page extensions are enabled or disabled.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811572123753&amp;w=2">20041018 cPanel hardlink backup issue</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811654104208&amp;w=2">20041018 cPanel hardlink chown issue</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11449" adv="1" patch="1">11449</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11455" adv="1" patch="1">11455</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17779">cpanel-backup-view-file(17779)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17780">cpanel-htaccess-modify-ownership(17780)</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="9.4.1_r64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1604" seq="2004-1604" published="2004-09-30" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">cPanel 9.9.1-RELEASE-3 allows remote authenticated users to chmod arbitrary files via a symlink attack on the _private directory, which is created when Front Page extensions are enabled.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811762230326&amp;w=2">20041018 cPanel symlink chmod issue</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="9.9.1_r3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1605" seq="2004-1605" published="2004-10-14" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SalesLogix 6.1 allows remote attackers to bypass authentication by modifying the slxweb cookie to set user=Admin, teams=ADMIN!, and usertype=Administrator.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-10/0661.html">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811852218478&amp;w=2">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011769">1011769</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11450" adv="1" patch="1">11450</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17749">saleslogix-cookie-admin-access(17749)</ref>
    </refs>
    <vuln_soft>
      <prod name="saleslogix" vendor="best_software">
        <vers num=""/>
      </prod>
      <prod name="saleslogix" vendor="saleslogix_corporation">
        <vers num="2000.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1606" seq="2004-1606" published="2004-10-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:P)">
    <desc>
      <descript source="cve">slxweb.dll in SalesLogix 6.1 allows remote attackers to cause a denial service (application crash) via an invalid HTTP request, which might also leak sensitive information in the ErrorLogMsg cookie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-10/0661.html">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811852218478&amp;w=2">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011769">1011769</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11450" adv="1" patch="1">11450</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17750">saleslogix-info-disclosure(17750)</ref>
    </refs>
    <vuln_soft>
      <prod name="saleslogix" vendor="best_software">
        <vers num=""/>
      </prod>
      <prod name="saleslogix" vendor="saleslogix_corporation">
        <vers num="2000.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1607" seq="2004-1607" published="2004-10-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">slxweb.dll in SalesLogix 6.1 allows remote attackers to obtain sensitive information via a (1) Library or (2) Attachment request with an invalid file parameter, which reveals the path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-10/0661.html">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811852218478&amp;w=2">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011769">1011769</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11450" adv="1" patch="1">11450</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17751">saleslogix-filename-path-disclosure(17751)</ref>
    </refs>
    <vuln_soft>
      <prod name="saleslogix" vendor="best_software">
        <vers num=""/>
      </prod>
      <prod name="saleslogix" vendor="saleslogix_corporation">
        <vers num="2000.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1608" seq="2004-1608" published="2004-10-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in SalesLogix 6.1 allows remote attackers to execute arbitrary SQL statements via the id parameter in a view operation.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-10/0661.html">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811852218478&amp;w=2">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011769">1011769</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11450" adv="1" patch="1">11450</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17752">saleslogix-sql-injection(17752)</ref>
    </refs>
    <vuln_soft>
      <prod name="saleslogix" vendor="best_software">
        <vers num=""/>
      </prod>
      <prod name="saleslogix" vendor="saleslogix_corporation">
        <vers num="2000.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1609" seq="2004-1609" published="2004-10-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">SalesLogix 6.1 includes usernames, passwords, and other sensitive information in the headers of an HTTP response, which could allow remote attackers to gain access.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-10/0661.html">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811852218478&amp;w=2">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011769">1011769</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11450" adv="1" patch="1">11450</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17753">saleslogix-obtain-passwords(17753)</ref>
    </refs>
    <vuln_soft>
      <prod name="saleslogix" vendor="best_software">
        <vers num=""/>
      </prod>
      <prod name="saleslogix" vendor="saleslogix_corporation">
        <vers num="2000.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1610" seq="2004-1610" published="2004-10-18" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SalesLogix 6.1 uses client-specified pathnames for writing certain files, which might allow remote authenticated users to create arbitrary files and execute code via the (1) vMME.AttachmentPath or (2) vMME.LibraryPath variables.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811852218478&amp;w=2">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
    </refs>
    <vuln_soft>
      <prod name="saleslogix" vendor="best_software">
        <vers num=""/>
      </prod>
      <prod name="saleslogix" vendor="saleslogix_corporation">
        <vers num="2000.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1611" seq="2004-1611" published="2004-10-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SalesLogix 6.1 does not verify if a user is authenticated before performing sensitive operations, which could allow remote attackers to (1) execute arbitrary SLX commands on the server or spoof the server via a man-in-the-middle (MITM) attack, or (2) obtain the database password via a GetConnection request to TCP port 1707.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-10/0661.html">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811852218478&amp;w=2">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011769">1011769</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11450" adv="1" patch="1">11450</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17754">saleslogix-getconnection-account-disclosure(17754)</ref>
    </refs>
    <vuln_soft>
      <prod name="saleslogix" vendor="best_software">
        <vers num=""/>
      </prod>
      <prod name="saleslogix" vendor="saleslogix_corporation">
        <vers num="2000.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1612" seq="2004-1612" published="2004-10-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in SalesLogix 6.1 allows remote attackers to upload arbitrary files via a .. (dot dot) in a ProcessQueueFile request.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-10/0661.html">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811852218478&amp;w=2">20041018 Multiple vulnerabilities in Sage Saleslogix</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011769">1011769</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11450" adv="1" patch="1">11450</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17765">saleslogix-processqueuefile-file-upload(17765)</ref>
    </refs>
    <vuln_soft>
      <prod name="saleslogix" vendor="saleslogix_corporation">
        <vers num="2000.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1613" seq="2004-1613" published="2004-10-18" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Mozilla allows remote attackers to cause a denial of service (application crash from null dereference or infinite loop) via a web page that contains a (1) TEXTAREA, (2) INPUT, (3) FRAMESET or (4) IMG tag followed by a null character and some trailing characters, as demonstrated by mangleme.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://lcamtuf.coredump.cx/mangleme/gallery/">http://lcamtuf.coredump.cx/mangleme/gallery/</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html" adv="1">20041018 Web browsers - a mini-farce</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811406620511&amp;w=2">20041018 Web browsers - a mini-farce</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011810" adv="1">1011810</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-323.html" adv="1" patch="1">RHSA-2005:323</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11439" adv="1" patch="1">11439</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17805">mozilla-html-tags-dos(17805)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10227">oval:org.mitre.oval:def:10227</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.0" edition="rc1"/>
        <vers num="1.0" edition="rc2"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.2" edition="alpha"/>
        <vers num="1.2" edition="beta"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4" edition="beta"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.4"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="1.7" edition="rc3"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="1.7.3"/>
        <vers num="1.8" edition="alpha2"/>
      </prod>
      <prod name="propack" vendor="sgi">
        <vers num="3.0"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="2.1" edition=":advanced_server"/>
        <vers num="2.1" edition=":enterprise_server"/>
        <vers num="2.1" edition=":workstation"/>
        <vers num="3.0" edition=":advanced_servers"/>
        <vers num="3.0" edition=":enterprise_server"/>
        <vers num="3.0" edition=":workstation"/>
      </prod>
      <prod name="enterprise_linux_desktop" vendor="redhat">
        <vers num="3.0"/>
      </prod>
      <prod name="fedora_core" vendor="redhat">
        <vers num="core_1.0"/>
        <vers num="core_2.0"/>
      </prod>
      <prod name="linux" vendor="redhat">
        <vers num="7.3" edition=":i386"/>
        <vers num="7.3" edition=":i686"/>
        <vers num="9.0" edition=":i386"/>
      </prod>
      <prod name="linux_advanced_workstation" vendor="redhat">
        <vers num="2.1" edition=":itanium"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1614" seq="2004-1614" published="2004-10-18" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Mozilla allows remote attackers to cause a denial of service (application crash from invalid memory access) via an "unusual combination of visual elements," including several large MARQUEE tags with large height parameters, as demonstrated by mangleme.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://lcamtuf.coredump.cx/mangleme/gallery/" adv="1">http://lcamtuf.coredump.cx/mangleme/gallery/</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html" adv="1">20041018 Web browsers - a mini-farce</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811406620511&amp;w=2">20041018 Web browsers - a mini-farce</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011810">1011810</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11440" adv="1">11440</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.0" edition="rc1"/>
        <vers num="1.0" edition="rc2"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.1" edition="alpha"/>
        <vers num="1.1" edition="beta"/>
        <vers num="1.2" edition="alpha"/>
        <vers num="1.2" edition="beta"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.4" edition="alpha"/>
        <vers num="1.4" edition="beta"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="1.7" edition="rc3"/>
        <vers num="1.7.1"/>
        <vers num="1.7.2"/>
        <vers num="1.7.3"/>
        <vers num="1.8" edition="alpha2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1615" seq="2004-1615" published="2004-10-18" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Opera allows remote attackers to cause a denial of service (invalid memory reference and application crash) via a web page or HTML email that contains a TBODY tag with a large COL SPAN value, as demonstrated by mangleme.</descript>
    </desc>
    <sols>
      <sol source="nvd">This was fixed in version 7.60.</sol>
    </sols>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://lcamtuf.coredump.cx/mangleme/gallery/" adv="1">http://lcamtuf.coredump.cx/mangleme/gallery/</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html" adv="1">20041018 Web browsers - a mini-farce</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811406620511&amp;w=2">20041018 Web browsers - a mini-farce</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11441" adv="1" patch="1">11441</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17806">opera-colspan-tbody-dos(17806)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="6.0" edition=":win32"/>
        <vers num="6.0.1" edition=":linux"/>
        <vers num="6.0.1" edition=":win32"/>
        <vers num="6.0.2" edition=":linux"/>
        <vers num="6.0.2" edition=":win32"/>
        <vers num="6.0.3" edition=":linux"/>
        <vers num="6.0.3" edition=":win32"/>
        <vers num="6.0.4" edition=":win32"/>
        <vers num="6.0.5" edition=":win32"/>
        <vers num="6.0.6" edition=":win32"/>
        <vers num="6.10" edition=":linux"/>
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0.1" edition=":win32"/>
        <vers num="7.0.2" edition=":win32"/>
        <vers num="7.0.3" edition=":win32"/>
        <vers num="7.0_beta1" edition=":win32"/>
        <vers num="7.0_beta2" edition=":win32"/>
        <vers num="7.10"/>
        <vers num="7.11"/>
        <vers num="7.11b"/>
        <vers num="7.11j"/>
        <vers num="7.20"/>
        <vers num="7.20_beta1_build2981"/>
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
        <vers num="7.50"/>
        <vers num="7.51"/>
        <vers num="7.52"/>
        <vers num="7.53"/>
        <vers num="7.54"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1616" seq="2004-1616" published="2004-10-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Links allows remote attackers to cause a denial of service (memory consumption) via a web page or HTML email that contains a table with a td element and a large rowspan value,as demonstrated by mangleme.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://lcamtuf.coredump.cx/mangleme/gallery/" adv="1">http://lcamtuf.coredump.cx/mangleme/gallery/</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html" adv="1">20041018 Web browsers - a mini-farce</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811406620511&amp;w=2">20041018 Web browsers - a mini-farce</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011808">1011808</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11442" adv="1">11442</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17803">links-large-table-dos(17803)</ref>
    </refs>
    <vuln_soft>
      <prod name="links" vendor="links">
        <vers num="0.91"/>
        <vers num="0.92"/>
        <vers num="0.93"/>
        <vers num="0.94"/>
        <vers num="0.95"/>
        <vers num="0.96"/>
        <vers num="0.97"/>
        <vers num="0.98"/>
        <vers num="0.99"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1617" seq="2004-1617" published="2004-10-18" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme.  NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://lcamtuf.coredump.cx/mangleme/gallery/" adv="1">http://lcamtuf.coredump.cx/mangleme/gallery/</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html" adv="1">20041018 Web browsers - a mini-farce</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109811406620511&amp;w=2">20041018 Web browsers - a mini-farce</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011809">1011809</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1076">DSA-1076</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1077">DSA-1077</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1085">DSA-1085</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/435689/30/4740/threaded">20060602 Re: [SECURITY] [DSA 1085-1] New lynx-cur packages fix several vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11443" adv="1">11443</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17804">lynx-dos(17804)</ref>
    </refs>
    <vuln_soft>
      <prod name="lynx" vendor="university_of_kansas">
        <vers num="2.7"/>
        <vers num="2.8"/>
        <vers num="2.8.1"/>
        <vers num="2.8.2_rel1"/>
        <vers num="2.8.3"/>
        <vers num="2.8.3_dev22"/>
        <vers num="2.8.3_pre5"/>
        <vers num="2.8.3_rel1"/>
        <vers num="2.8.4"/>
        <vers num="2.8.4_rel1"/>
        <vers num="2.8.5"/>
        <vers num="2.8.5_dev2"/>
        <vers num="2.8.5_dev3"/>
        <vers num="2.8.5_dev4"/>
        <vers num="2.8.5_dev5"/>
        <vers num="2.8.5_dev8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1618" seq="2004-1618" published="2004-10-19" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Vypress Tonecast 1.3 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed mp2 stream.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/toneboom-adv.txt" adv="1">http://aluigi.altervista.org/adv/toneboom-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109820344806472&amp;w=2">20041019 Broadcast crash in Vypress Tonecast 1.3</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11462" adv="1">11462</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17775">vypress-tonecast-dos(17775)</ref>
    </refs>
    <vuln_soft>
      <prod name="tonecast" vendor="vypress">
        <vers num="1.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1619" seq="2004-1619" published="2004-10-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Privateer's Bounty: Age of Sail II allows remote attackers to execute arbitrary code via a long nickname.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109829017407842&amp;w=2">20041020 Buffer-overflow in Age of Sail II 1.04.151</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11479" adv="1">11479</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17791">age-of-sail-bo(17791)</ref>
    </refs>
    <vuln_soft>
      <prod name="privateers_bounty_age_of_sail_ii" vendor="akella">
        <vers num="1.4.51"/>
        <vers num="1.55"/>
        <vers num="1.56"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1620" seq="2004-1620" published="2004-10-21" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&amp;view=markup">http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&amp;view=markup</ref>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&amp;view=markup">http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&amp;view=markup</ref>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&amp;view=markup">http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&amp;view=markup</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109841283115808&amp;w=2">20041021 HTTP Response Splitting in Serendipity 0.7-beta4</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011864">1011864</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=276694">http://sourceforge.net/project/shownotes.php?release_id=276694</ref>
      <ref source="CONFIRM" url="http://www.s9y.org/5.html" adv="1" patch="1">http://www.s9y.org/5.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11497" adv="1" patch="1">11497</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17798">serendipity-response-splitting(17798)</ref>
    </refs>
    <vuln_soft>
      <prod name="serendipity" vendor="s9y">
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.5_pl1"/>
        <vers num="0.6"/>
        <vers num="0.6_pl1"/>
        <vers num="0.6_pl2"/>
        <vers num="0.6_pl3"/>
        <vers num="0.6_rc1"/>
        <vers num="0.6_rc2"/>
        <vers num="0.7_beta1"/>
        <vers num="0.7_beta2"/>
        <vers num="0.7_beta3"/>
        <vers num="0.7_beta4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1621" seq="2004-1621" published="2004-10-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">** DISPUTED **  NOTE: this issue has been disputed by the vendor.  Cross-site scripting (XSS) vulnerability in IBM Lotus Notes R6 and Domino R6, and possibly earlier versions, allows remote attackers to execute arbitrary web script or HTML via square brackets at the beginning and end of (1) computed for display, (2) computed when composed, or (3) computed text element fields.  NOTE: the vendor has disputed this issue, saying that it is not a problem with Notes/Domino itself, but with the applications that do not properly handle this feature.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109812960023736&amp;w=2">20041018 IBM Lotus Notes/Domino fails to encode Square Brackets ( [  ] )</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109841682529328&amp;w=2">20041021 Re: IBM Lotus Notes/Domino fails to encode Square Brackets ( [  ] )</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011779" adv="1">1011779</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11458" adv="1">11458</ref>
      <ref source="MISC" url="http://www-1.ibm.com/support/docview.wss?rs=463&amp;uid=swg21187833" adv="1">http://www-1.ibm.com/support/docview.wss?rs=463&amp;uid=swg21187833</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17758">lotus-notes-xss(17758)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_domino" vendor="ibm">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.2_cf2"/>
        <vers num="6.0.3"/>
        <vers num="6.5.0"/>
        <vers num="6.5.1"/>
        <vers num="6.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1622" seq="2004-1622" published="2004-10-21" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in dosearch.php in UBB.threads 3.4.x allows remote attackers to execute arbitrary SQL statements via the Name parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109839925207038&amp;w=2">20041021 SQL Injection in UBB.threads 3.4.x</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11502" adv="1">11502</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17821">ubbthreads-sql-injection(17821)</ref>
    </refs>
    <vuln_soft>
      <prod name="ubb.threads" vendor="ubbcentral">
        <vers num="3.4"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1623" seq="2004-1623" published="2004-10-22" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The WAV file property handler in Windows XP SP1 allows remote attackers to cause a denial of service (infinite loop in Explorer) via a WAV file with an invalid file header whose fmt chunk length is set to 0xFFFFFFFF.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109846319313443&amp;w=2">20041021 [HV-LOW] Unsafe WAV header handling can cause DoS on Windows</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011880">1011880</ref>
      <ref source="MISC" url="http://www.hexview.com/docs/20041021-1.txt" adv="1">http://www.hexview.com/docs/20041021-1.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11503" adv="1">11503</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17864">windowsxp-explorer-wav-dos(17864)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":embedded"/>
        <vers num="" edition=":home"/>
        <vers num="" edition=":media_center"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:embedded"/>
        <vers num="" edition="sp1:home"/>
        <vers num="" edition="sp1:media_center"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1624" seq="2004-1624" published="2004-10-21" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Carbon Copy 6.0.5257 does not drop system privileges when opening external programs through the help topic interface, which allows local users to gain privileges via (1) the help topic interface in CCW32.exe, which launches Notepad, or (2) the help button in the Carbon Copy Scheduler (CCSched.exe).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109846296406459&amp;w=2">20041022 [Fwd: Altiris Carbon Copy Remote Control  local SYSTEM exploitation.]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11500" adv="1">11500</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17838">carboncopy-help-gain-privileges(17838)</ref>
    </refs>
    <vuln_soft>
      <prod name="carbon_copy" vendor="altiris">
        <vers num="5.0"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1625" seq="2004-1625" published="2004-10-22" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">pGina 1.7.6 and possibly older versions, when the Restart or Shutdown options are enabled on the login screen, allows remote attackers to cause a denial of service by connecting via Remote Desktop and clicking restart or shutdown.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109849689808245&amp;w=2">20041022 Windows DoS in certain pGina configurations</ref>
      <ref source="MISC" url="http://www.lovebug.org/pgina_dos.txt">http://www.lovebug.org/pgina_dos.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17836">pgina-dos(17836)</ref>
    </refs>
    <vuln_soft>
      <prod name="pgina" vendor="pgina">
        <vers num="1.7.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1626" seq="2004-1626" published="2004-10-22" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Ability Server 2.34, and possibly other versions, allows remote attackers to execute arbitrary code via a long STOR command.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109850947508816&amp;w=2">20041022 Ability FTP Server 2.34 Buffer Overflow Exploit</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/857846" adv="1">VU#857846</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11508" adv="1">11508</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17823">abilityftpserver-stor-dos(17823)</ref>
    </refs>
    <vuln_soft>
      <prod name="ability_server" vendor="code-crafters">
        <vers num="2.2.5"/>
        <vers num="2.3.2"/>
        <vers num="2.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1627" seq="2004-1627" published="2004-10-22" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Ability Server 2.25, 2.32, 2.34, and possibly other versions, allows remote attackers to execute arbitrary code via a long APPE command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.virus.org/dw-0day-0412/msg00004.html" adv="1">[0day] 20041208 Ability Server 2.25 - 2.34 FTP => 'APPE' Buffer Overflow - PnK:: DCN3T</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012464" adv="1">1012464</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11508" adv="1">11508</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18405">ability-appe-bo(18405)</ref>
    </refs>
    <vuln_soft>
      <prod name="ability_server" vendor="code-crafters">
        <vers num="2.2.5"/>
        <vers num="2.3.2"/>
        <vers num="2.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1628" seq="2004-1628" published="2004-10-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109855982425122&amp;w=2">20041023 rssh: pizzacode security alert</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-28.xml" adv="1" patch="1">GLSA-200410-28</ref>
      <ref source="CONFIRM" url="http://www.pizzashack.org/rssh/" patch="1">http://www.pizzashack.org/rssh/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17831">rssh-format-string(17831)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1629" seq="2004-1629" published="2004-10-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Dwc_articles 1.6 and earlier allow remote attackers to execute arbitrary SQL statements.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109855895702903&amp;w=2">20041023 dwc_articles possible sql injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11509" adv="1">11509</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17830">dwc-articles-sql-injection(17830)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1630" seq="2004-1630" published="2004-10-25" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the login form in Open WorkFlow Engine (OpenWFE) 1.4.x allows remote attackers to execute arbitrary web script or HTML via the url parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109876304705234&amp;w=2">20041024 Two Vulnerabilities in OpenWFE Web Client</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11514" adv="1" patch="1">11514</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17853">openwfe-login-form-xss(17853)</ref>
    </refs>
    <vuln_soft>
      <prod name="work_flow_engine" vendor="openwfe">
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1631" seq="2004-1631" published="2004-10-25" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Open WorkFlow Engine (OpenWFE) 1.4.x allows remote attackers to conduct port scans of remote hosts by specifying the target in an rmi:// Worklist URL, then using the response times to infer the results.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109876304705234&amp;w=2">20041024 Two Vulnerabilities in OpenWFE Web Client</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11514" adv="1" patch="1">11514</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17852">openwfe-rmi-obtain-information(17852)</ref>
    </refs>
    <vuln_soft>
      <prod name="work_flow_engine" vendor="openwfe">
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.3"/>
        <vers num="1.4.4"/>
        <vers num="1.4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1632" seq="2004-1632" published="2004-10-25" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in wiki.php in MoniWiki 1.0.8 and earlier allows remote attackers to inject arbitrary web script or HTML via the arguments to wiki.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109873622006103&amp;w=2">20041025 STG Security Advisory: [SSA-20041022-08] MoniWiki XSS vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11516" adv="1" patch="1">11516</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17835">moniwiki-wiki-xss(17835)</ref>
    </refs>
    <vuln_soft>
      <prod name="moniwiki" vendor="moniwiki">
        <vers num="1.0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1633" seq="2004-1633" published="2004-10-25" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">process_bug.cgi in Bugzilla 2.9 through 2.18rc2 and 2.19 from CVS does not check edit permissions on the keywords field, which allows remote authenticated users to modify the keywords in a bug via the keywordaction parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109872095201238&amp;w=2">20041025 [BUGZILLA] Vulnerabilities in Bugzilla 2.16.6 and 2.18rc2</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=252638" adv="1">https://bugzilla.mozilla.org/show_bug.cgi?id=252638</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17840">bugzilla-bug-change(17840)</ref>
    </refs>
    <vuln_soft>
      <prod name="bugzilla" vendor="mozilla">
        <vers num="2.9"/>
        <vers num="2.10"/>
        <vers num="2.12"/>
        <vers num="2.14"/>
        <vers num="2.14.1"/>
        <vers num="2.14.2"/>
        <vers num="2.14.3"/>
        <vers num="2.14.4"/>
        <vers num="2.14.5"/>
        <vers num="2.16"/>
        <vers num="2.16.1"/>
        <vers num="2.16.2"/>
        <vers num="2.16.3"/>
        <vers num="2.16.4"/>
        <vers num="2.16.5"/>
        <vers num="2.17"/>
        <vers num="2.17.1"/>
        <vers num="2.17.3"/>
        <vers num="2.17.4"/>
        <vers num="2.17.5"/>
        <vers num="2.17.6"/>
        <vers num="2.17.7"/>
        <vers num="2.18" edition="rc1"/>
        <vers num="2.18" edition="rc2"/>
        <vers num="2.19"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1634" seq="2004-1634" published="2004-10-25" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">show_bug.cgi in Bugzilla 2.17.1 through 2.18rc2 and 2.19 from CVS, when using the insidergroup feature and exporting a bug to XML, shows comments and attachment summaries which are marked as private, which allows remote attackers to gain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109872095201238&amp;w=2">20041025 [BUGZILLA] Vulnerabilities in Bugzilla 2.16.6 and 2.18rc2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11511" adv="1" patch="1">11511</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=263780" adv="1">https://bugzilla.mozilla.org/show_bug.cgi?id=263780</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17841">bugzilla-xml-information-disclosure(17841)</ref>
    </refs>
    <vuln_soft>
      <prod name="bugzilla" vendor="mozilla">
        <vers num="2.4"/>
        <vers num="2.6"/>
        <vers num="2.8"/>
        <vers num="2.10"/>
        <vers num="2.12"/>
        <vers num="2.14"/>
        <vers num="2.14.1"/>
        <vers num="2.14.2"/>
        <vers num="2.14.3"/>
        <vers num="2.14.4"/>
        <vers num="2.14.5"/>
        <vers num="2.16"/>
        <vers num="2.16.1"/>
        <vers num="2.16.2"/>
        <vers num="2.16.3"/>
        <vers num="2.16.4"/>
        <vers num="2.16.5"/>
        <vers num="2.17"/>
        <vers num="2.17.1"/>
        <vers num="2.17.3"/>
        <vers num="2.17.4"/>
        <vers num="2.17.5"/>
        <vers num="2.17.6"/>
        <vers num="2.17.7"/>
        <vers num="2.18" edition="rc1"/>
        <vers num="2.18" edition="rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1635" seq="2004-1635" published="2004-10-24" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Bugzilla 2.17.1 through 2.18rc2 and 2.19 from cvs, when using the insidergroup feature, does not sufficiently protect private attachments when there are changes to the metadata, such as filename, description, MIME type, or review flags, which allows remote authenticated users to obtain sensitive information when (1) viewing the bug activity log or (2) receiving bug change notification mails.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109872095201238&amp;w=2">20041025 [BUGZILLA] Vulnerabilities in Bugzilla 2.16.6 and 2.18rc2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11511" adv="1" patch="1">11511</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=250605" adv="1">https://bugzilla.mozilla.org/show_bug.cgi?id=250605</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=253544" adv="1">https://bugzilla.mozilla.org/show_bug.cgi?id=253544</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17842">bugzila-metadata-information-disclosure(17842)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1636" seq="2004-1636" published="2004-10-26" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the WvTFTPServer::new_connection function in wvtftpserver.cc for WvTftp 0.9 allows remote attackers to execute arbitrary code via a long option string in a TFTP packet.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109885074513940&amp;w=2">20041026 wvtfpd remote root heap overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11525" adv="1">11525</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17869">wvtfpd-wvtftpservercc-bo(17869)</ref>
    </refs>
    <vuln_soft>
      <prod name="wvtftp" vendor="net_integration_technologies_inc.">
        <vers num="0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1637" seq="2004-1637" published="2004-10-26" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Hawking Technologies HAR11A modem/router allows remote attackers to obtain sensitive information by connecting to port 254, which displays a management interface and information on established connections.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109882884617886&amp;w=2">20041026 Hawking Technologies HAR11A router considered insecure</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11543" adv="1">11543</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17877">har11a-gain-unauth-access(17877)</ref>
    </refs>
    <vuln_soft>
      <prod name="har11a_dsl_router" vendor="hawking_technology">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1638" seq="2004-1638" published="2004-10-16" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in MailCarrier 2.51 allows remote attackers to execute arbitrary code via a long (1) EHLO and possibly (2) HELO command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109880961630050&amp;w=2">20041026 MailCarrier 2.51 SMTP server Buffer Overflow [PoC included]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11535" adv="1">11535</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17861">mailcarrier-ehlo-helo-bo(17861)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1639" seq="2004-1639" published="2004-10-26" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Mozilla Firefox before 0.10, Mozilla 5.0, and Gecko 20040913 allows remote attackers to cause a denial of service (application crash or memory consumption) via a large binary file with a .html extension.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q4/0017.html" adv="1">20041026 Rendering large binary file as HTML makes Mozilla Firefox stop responding or crash</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109886388528179&amp;w=2">20041026 Rendering large binary file as HTML makes Mozilla Firefox stop responding</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17839">mozilla-html-dos(17839)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1640" seq="2004-1640" published="2004-08-28" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in XOOPS 0.94 and 1.0 allow remote attackers to execute arbitrary web script and HTML via the (1) terme parameter to search.php or (2) letter parameter to letter.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://cyruxnet.org/modulo_dic_xoops.htm">http://cyruxnet.org/modulo_dic_xoops.htm</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109394077209963&amp;w=2">20040828 Cross Site Scripting in XOOPS Version 2.x Dictionary module</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11064" adv="1">11064</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17152">xoops-dictionary-search-xss(17152)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17154">xoops-dictionary-letter-xss(17154)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1641" seq="2004-1641" published="2004-08-29" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in Titan FTP 3.21 and earlier allows remote attackers to cause a denial of service (crash) via a long FTP command such as (1) CWD, (2) STAT, or (3) LIST.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109396159332523&amp;w=2">20040829 [vulnwatch] Titan FTP Server Long Command Heap Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11069" adv="1" patch="1">11069</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17172">titan-long-command-bo(17172)</ref>
    </refs>
    <vuln_soft>
      <prod name="titan_ftp_server" vendor="south_river_technologies">
        <vers num="2.2"/>
        <vers num="2.10"/>
        <vers num="3.01"/>
        <vers num="3.10"/>
        <vers num="3.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1642" seq="2004-1642" published="2004-08-29" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">WFTPD Pro Server 3.21 allows remote authenticated users to cause a denial of service (crash) via a series of long MLIST commands.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109396193723317&amp;w=2">20040829 [vulnwatch] WFTPD Pro Server 3.21 MLST Command Denial of Service Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11067" adv="1">11067</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17169">wftpd-mlst-command-dos(17169)</ref>
    </refs>
    <vuln_soft>
      <prod name="wftpd" vendor="texas_imperial_software">
        <vers num="3.21"/>
        <vers num="3.21_r1"/>
        <vers num="3.21_r2"/>
        <vers num="3.21_r3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1643" seq="2004-1643" published="2004-08-29" modified="2019-08-13" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">WS_FTP 5.0.2 allows remote authenticated users to cause a denial of service (CPU consumption) via a CD command that contains an invalid path with a "../" sequence.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109389890712888&amp;w=2">20040829 [vulnwatch] WS_FTP Server Denial of Service Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11065" adv="1">11065</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17155">wsftp-file-parsing-dos(17155)</ref>
    </refs>
    <vuln_soft>
      <prod name="ipswitch_ws_ftp_server" vendor="progress">
        <vers num="5.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1644" seq="2004-1644" published="2004-08-30" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Xedus 1.0 allows remote attackers to cause a denial of service (refuse connections) by connecting multiple times from the same IP address.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109394018411394&amp;w=2">20040830 Multiple Vulnerabilities In Xedus Webserver</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00047-08302004" adv="1">http://www.gulftech.org/?node=research&amp;article_id=00047-08302004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11071" adv="1">11071</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17165">xedus-mult-connection-dos(17165)</ref>
    </refs>
    <vuln_soft>
      <prod name="xedus" vendor="jerod_moemeka">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1645" seq="2004-1645" published="2004-08-30" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Xedus 1.0 allows remote attackers to execute arbitrary web script or HTML via the (1) username parameter to test.x, (2) username parameter to TestServer.x, or (3) param parameter to testgetrequest.x.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109394018411394&amp;w=2">20040830 Multiple Vulnerabilities In Xedus Webserver</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00047-08302004">http://www.gulftech.org/?node=research&amp;article_id=00047-08302004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11071" adv="1">11071</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17166">xedus-test-xss(17166)</ref>
    </refs>
    <vuln_soft>
      <prod name="xedus" vendor="jerod_moemeka">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1646" seq="2004-1646" published="2004-08-30" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Xedus 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109394018411394&amp;w=2">20040830 Multiple Vulnerabilities In Xedus Webserver</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00047-08302004">http://www.gulftech.org/?node=research&amp;article_id=00047-08302004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11071" adv="1">11071</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17167">xedus-dotdot-directory-traversal(17167)</ref>
    </refs>
    <vuln_soft>
      <prod name="xedus" vendor="jerod_moemeka">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1647" seq="2004-1647" published="2004-08-30" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Password Protect allows remote attackers to execute arbitrary SQL statements and bypass authentication via (1) admin or Pass parameter to index_next.asp, (2) LoginId, OPass, or NPass to CPassChangePassword.asp, (3) users_edit.asp, or (4) users_add.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109414967003192&amp;w=2">20040830 Password Protect XSS and SQL-Injection vulnerabilities.</ref>
      <ref source="MISC" url="http://www.criolabs.net/advisories/passprotect.txt">http://www.criolabs.net/advisories/passprotect.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11073" adv="1">11073</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17188">password-protect-sql-injection(17188)</ref>
    </refs>
    <vuln_soft>
      <prod name="password_protect" vendor="web_animations">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1648" seq="2004-1648" published="2004-08-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in (1) index.asp, (2) ChangePassword.asp, (3) users_list.asp, (4) and users_add.asp in Password Protect allows remote attackers to inject arbitrary web script or HTML via the ShowMsg parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109414967003192&amp;w=2">20040830 Password Protect XSS and SQL-Injection vulnerabilities.</ref>
      <ref source="MISC" url="http://www.criolabs.net/advisories/passprotect.txt" adv="1">http://www.criolabs.net/advisories/passprotect.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11073" adv="1">11073</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17187">password-protect-showmsg-xss(17187)</ref>
    </refs>
    <vuln_soft>
      <prod name="password_protect" vendor="web_animations">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1649" seq="2004-1649" published="2004-08-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Microsoft Msinfo32.exe might allow local users to execute arbitrary code via a long filename in the msinfo_file command line parameter.  NOTE: this issue might not cross security boundaries, so it may be REJECTED in the future.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/025902.html" adv="1">20040830 MSInfo  Buffer Overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109413415205017&amp;w=2">20040831 MSInfo  Buffer Overflow</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=109391133831787&amp;w=2">20040830 MSInfo  Buffer Overflow</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17153">msinfo-msinfofile-bo(17153)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1650" seq="2004-1650" published="2004-08-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">D-Link DCS-900 Internet Camera listens on UDP port 62976 for an IP address, which allows remote attackers to change the IP address of the camera via a UDP broadcast packet.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109396893820049&amp;w=2">20040831 D-Link DCS-900 IP camera remote exploit that change the IP</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011100">1011100</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11072" adv="1">11072</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17171">dlink-dcs900-ip-modification(17171)</ref>
    </refs>
    <vuln_soft>
      <prod name="dcs-900_internet_camera" vendor="d-link">
        <vers num="2.10"/>
        <vers num="2.20"/>
        <vers num="2.28"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1651" seq="2004-1651" published="2004-08-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in the registration page in phpScheduleIt 1.0.0 RC1 allow remote attackers to inject arbitrary web script or HTML via the (1) Name or (2) Lastname fields during new user registration, or (3) the Schedule Name field.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-09/0216.html">20040917 Re: Multiple Vulnerabilities in phpScheduleIt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109399590602709&amp;w=2">20040831 Multiple Vulnerabilities in phpScheduleIt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011127">1011127</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11080" adv="1" patch="1">11080</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17193">phpscheduleit-xss(17193)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17194">phpscheduleit-script-injection(17194)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpscheduleit" vendor="brickhost">
        <vers num="1.0_rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1652" seq="2004-1652" published="2004-08-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">phpScheduleIt 1.0.0 RC1 does not clear administrative privileges if the administrator logs in as a normal user, which allows users with physical access to gain administrative privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109399590602709&amp;w=2">20040831 Multiple Vulnerabilities in phpScheduleIt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17195">phpscheduleit-gain-privileges(17195)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpscheduleit" vendor="brickhost">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1653" seq="2004-1653" published="2004-08-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109413637313484&amp;w=2">20040831 SSHD / AnonCVS Nastyness</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011143">1011143</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17213">openssh-port-bounce(17213)</ref>
    </refs>
    <vuln_soft>
      <prod name="openssh" vendor="openbsd">
        <vers num="3.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1654" seq="2004-1654" published="2004-09-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the calendar module in phpWebsite 0.9.3-4 and earlier allows remote attackers to execute arbitrary SQL commands via cal_template.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109413493005513&amp;w=2">20040901 Multiple Vulnerabilities In phpWebsite</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00048-08312004" adv="1" patch="1">http://www.gulftech.org/?node=research&amp;article_id=00048-08312004</ref>
      <ref source="CONFIRM" url="http://www.phpwebsite.appstate.edu/index.php?module=announce&amp;ANN_user_op=view&amp;ANN_id=822" patch="1">http://www.phpwebsite.appstate.edu/index.php?module=announce&amp;ANN_user_op=view&amp;ANN_id=822</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11088" adv="1" patch="1">11088</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17199">phpwebsite-calendar-module-sql-injection(17199)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpwebsite" vendor="phpwebsite">
        <vers num="0.7.3"/>
        <vers num="0.8.2"/>
        <vers num="0.8.3"/>
        <vers num="0.9.3"/>
        <vers num="0.9.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1655" seq="2004-1655" published="2004-09-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in phpWebsite 0.9.3-4 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) CM_pid parameter in the comments module or (2) the subject or message fields in the notes module.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109413493005513&amp;w=2">20040901 Multiple Vulnerabilities In phpWebsite</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011120">1011120</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00048-08312004" adv="1" patch="1">http://www.gulftech.org/?node=research&amp;article_id=00048-08312004</ref>
      <ref source="CONFIRM" url="http://www.phpwebsite.appstate.edu/index.php?module=announce&amp;ANN_user_op=view&amp;ANN_id=822" adv="1" patch="1">http://www.phpwebsite.appstate.edu/index.php?module=announce&amp;ANN_user_op=view&amp;ANN_id=822</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11088" adv="1" patch="1">11088</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17202">phpwebsite-comments-module-xss(17202)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17203">phpwebsite-notes-script-injection(17203)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpwebsite" vendor="phpwebsite">
        <vers num="0.7.3"/>
        <vers num="0.8.2"/>
        <vers num="0.8.3"/>
        <vers num="0.9.3"/>
        <vers num="0.9.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1656" seq="2004-1656" published="2004-09-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in Comersus Shopping Cart 5.0991 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the redirecturl parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109405777905519&amp;w=2">20040901 ADVISORY: http response splitting hole in Comersus shopping cart</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11083" adv="1">11083</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17201">comersus-cart-response-splitting(17201)</ref>
    </refs>
    <vuln_soft>
      <prod name="comersus_cart" vendor="comersus_open_technologies">
        <vers num="5.0.991"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1657" seq="2004-1657" published="2004-09-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Activity and Events Viewer for Newtelligence DasBlog allows remote attackers to inject arbitrary web script or HTML via the (1) User Agent or (2) Referrer HTTP headers.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109443321830050&amp;w=2">20040901 Cross-Site Scripting Vulnerability in Newtelligence DasBlog</ref>
      <ref source="CONFIRM" url="http://staff.newtelligence.net/clemensv/PermaLink.aspx?guid=69bce168-cb09-4f09-8d53-f0b97f11b198" adv="1">http://staff.newtelligence.net/clemensv/PermaLink.aspx?guid=69bce168-cb09-4f09-8d53-f0b97f11b198</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11086" adv="1" patch="1">11086</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17174">dasblog-useragent-referer-xss(17174)</ref>
    </refs>
    <vuln_soft>
      <prod name="dasblog" vendor="newtelligence">
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1658" seq="2004-1658" published="2004-09-02" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109420310631039&amp;w=2">20040902 Kerio Personal Firewall's Application Launch Protection Can Be Disabled by Direct Service Table Restoration</ref>
      <ref source="MISC" url="http://www.security.org.sg/vuln/kerio4016.html" adv="1">http://www.security.org.sg/vuln/kerio4016.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11096" adv="1">11096</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17270">kerio-pf-protection-dos(17270)</ref>
    </refs>
    <vuln_soft>
      <prod name="personal_firewall" vendor="kerio">
        <vers num="4.0.6"/>
        <vers num="4.0.7"/>
        <vers num="4.0.8"/>
        <vers num="4.0.9"/>
        <vers num="4.0.10"/>
        <vers num="4.0.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1659" seq="2004-1659" published="2004-09-02" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in CuteNews 1.3.6 and earlier allows remote attackers with Administrator, Editor, Journalist or Commenter privileges to inject arbitrary web script or HTML via the mod parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109415338521881&amp;w=2">20040902 [hackgen-2004-#001] - Non-critacal Cross-Site Scripting bug in CuteNews</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11097" adv="1">11097</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17214">cutenews-mod-xss(17214)</ref>
    </refs>
    <vuln_soft>
      <prod name="cutenews" vendor="cutephp">
        <vers num="0.88"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1660" seq="2004-1660" published="2004-08-30" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in CuteNews 1.3.6 and earlier allows remote attackers to execute arbitrary PHP code via the cutepath parameter to (1) show_archives.php or (2) show_news.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://seclists.org/lists/bugtraq/2004/Sep/0014.html" adv="1">20040830 RE: CuteNews News.txt writable to world</ref>
      <ref source="MISC" url="http://www.7a69ezine.org/node/view/130" adv="1">http://www.7a69ezine.org/node/view/130</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17288">cutenews-file-include(17288)</ref>
    </refs>
    <vuln_soft>
      <prod name="cutenews" vendor="cutephp">
        <vers num="1.3.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1661" seq="2004-1661" published="2004-09-02" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">MailWorks Professional allows remote attackers to bypass authentication and gain privileges via a cookie that contains "auth=1" and "uId=1."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109416709710447&amp;w=2">20040902 MailWorks Professional - Authentication bypass</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11095" adv="1">11095</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17217">mailworks-cookie-admin-access(17217)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailworks_professional" vendor="sitecubed">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1662" seq="2004-1662" published="2004-08-25" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">YaBB SE 1.5.1 allows remote attackers to obtain sensitive information via a direct HTTP request to Admin.php, which reveals the full path in a PHP error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://echo.or.id/adv/adv05-y3dips-2004.txt" adv="1">http://echo.or.id/adv/adv05-y3dips-2004.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109441750900432&amp;w=2">20040904 FUll Path Disclosure in YABBSE</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17267">yabb-admin-path-disclosure(17267)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1663" seq="2004-1663" published="2004-09-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Engenio/LSI Logic storage controllers, as used in products such as Storagetek D280, and IBM DS4100 (formerly FastT 100) and Brocade SilkWorm Switches, allow remote attackers to cause a denial of service (freeze and possible data corruption) via crafted TCP packets.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109435831811484&amp;w=2">20040904 Engenio/LSI Logic controllers denial of service/data corruption</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11108" adv="1">11108</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17290">engenio-controller-tcp-dos(17290)</ref>
    </refs>
    <vuln_soft>
      <prod name="silkworm" vendor="brocade">
        <vers num="3200"/>
        <vers num="3250"/>
        <vers num="3800"/>
        <vers num="3850"/>
        <vers num="3900"/>
      </prod>
      <prod name="silkworm_fiber_channel_switch" vendor="brocade">
        <vers num="2010"/>
        <vers num="2040"/>
        <vers num="2050"/>
      </prod>
      <prod name="storage_controller" vendor="engenio">
        <vers num="2822"/>
        <vers num="2882"/>
        <vers num="4884"/>
        <vers num="5884"/>
      </prod>
      <prod name="ds4100" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="d280" vendor="storagetek">
        <vers num=""/>
      </prod>
      <prod name="fabric_os" vendor="brocade">
        <vers num="2.1.2"/>
        <vers num="2.2"/>
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1664" seq="2004-1664" published="2004-09-05" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Call of Duty 1.4 and earlier allows remote attackers to cause a denial of service (game end) via a large (1) query or (2) reply packet, which is not properly handled by the buffer overflow protection mechanism. NOTE: this issue might overlap CVE-2005-0430.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109449953200587&amp;w=2">20040905 Broadcast shutdown in Call of Duty 1.4</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11119" adv="1" patch="1">11119</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17286">callofduty-dos(17286)</ref>
    </refs>
    <vuln_soft>
      <prod name="call_of_duty" vendor="activision">
        <vers num="1.4"/>
      </prod>
      <prod name="call_of_duty_united_offensive" vendor="activision">
        <vers num="1.41"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1665" seq="2004-1665" published="2004-09-05" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in PsNews 1.1 allows remote attackers to inject arbitrary web script or HTML via the no parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109458516524494&amp;w=2">20040905 Bug XSS in PsNews 1.1</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011191">1011191</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11124" adv="1">11124</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17302">psnews-xss(17302)</ref>
    </refs>
    <vuln_soft>
      <prod name="psnews" vendor="psnews">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1666" seq="2004-1666" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the MSN module in Trillian 0.74i allows remote MSN servers to execute arbitrary code via a long string that ends in a newline character.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109466618609375&amp;w=2">20040908 Cerulean Studios Trillian 0.74i Buffer Overflow in MSN module exploit</ref>
      <ref source="MISC" url="http://unsecure.altervista.org/security/trillian.htm" adv="1">http://unsecure.altervista.org/security/trillian.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11142" adv="1">11142</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17292">trillian-msn-bo(17292)</ref>
    </refs>
    <vuln_soft>
      <prod name="trillian" vendor="cerulean_studios">
        <vers num="0.74i"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1667" seq="2004-1667" published="2004-09-09" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Off-by-one error in Halo Combat Evolved 1.04 and earlier allows remote attackers to cause a denial of service (server crash) via a long client response.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/haloboom-adv.txt" adv="1">http://aluigi.altervista.org/adv/haloboom-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109479695022024&amp;w=2">20040909 Off-by-one bug in Halo 1.04</ref>
      <ref source="MISC" url="http://www.bungie.net/News/Story.aspx?link=hpc105" adv="1" patch="1">http://www.bungie.net/News/Story.aspx?link=hpc105</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11147" adv="1" patch="1">11147</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17310">halo-response-offbyone-bo(17310)</ref>
    </refs>
    <vuln_soft>
      <prod name="halo_combat_evolved" vendor="gearbox_software">
        <vers num="1.2"/>
        <vers num="1.4"/>
        <vers num="1.31"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1668" seq="2004-1668" published="2004-09-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in index.php in Subjects 2.0 Postnuke module allow remote attackers to execute arbitrary SQL commands via the (1) pageid, (2) subid, or (3) catid parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109483089621955&amp;w=2">20040910 SQL-Injection in Subjects 2.0 for Postnuke</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11148" adv="1">11148</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17311">subjects-indexphp-sql-injection(17311)</ref>
    </refs>
    <vuln_soft>
      <prod name="factory_subjects_module" vendor="easyweb">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1669" seq="2004-1669" published="2004-09-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in MERAK Mail Server 7.4.5 with Icewarp Web Mail 5.2.7 and possibly other versions allows remote attackers to execute arbitrary web script or HTML via the (1) User name parameter to accountsettings.html or (2) Search string parameter to search.html.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109483971420067&amp;w=2">20040910 Multiple vulnerabilities in Icewarp Web Mail 5.2.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11371" adv="1" patch="1">11371</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17313">merak-icewarp-xss(17313)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_mail" vendor="icewarp">
        <vers num="3.3.2"/>
        <vers num="5.2.7"/>
        <vers num="5.2.8"/>
      </prod>
      <prod name="mail_server" vendor="merak">
        <vers num="7.4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1670" seq="2004-1670" published="2004-09-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities Merak Mail Server 7.4.5 with Icewarp Web Mail 5.2.7, and possibly other versions, allow remote attackers to (1) create arbitrary directories via a .. (dot dot) in the user parameter to viewaction.html or (2) rename arbitrary files via a ....// (doubled dot dot) in the folderold or folder parameters to folders.html.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109483971420067&amp;w=2">20040910 Multiple vulnerabilities in Icewarp Web Mail 5.2.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11371" adv="1" patch="1">11371</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17314">merak-icewarp-create-directory(17314)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_mail" vendor="icewarp">
        <vers num="3.3.2"/>
        <vers num="5.2.7"/>
        <vers num="5.2.8"/>
      </prod>
      <prod name="mail_server" vendor="merak">
        <vers num="7.4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1671" seq="2004-1671" published="2004-10-12" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Merak Mail Server 7.4.5 with Icewarp Web Mail 5.2.7 and possibly other versions allows remote attackers to gain sensitive information via a direct request to (1) accountsettings_add.html or (2) topmenu.html.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109483971420067&amp;w=2">20040910 Multiple vulnerabilities in Icewarp Web Mail 5.2.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11371" adv="1" patch="1">11371</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17315">merak-icewarp-path-disclosure(17315)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_mail" vendor="icewarp">
        <vers num="3.3.2"/>
        <vers num="5.2.7"/>
        <vers num="5.2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1672" seq="2004-1672" published="2004-10-12" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">attachment.html in Merak Mail Server 7.4.5 with Icewarp Web Mail 5.2.7 and possibly other versions allows remote attackers to view other users' attachments by specifying the username and message ID in an HTTP request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109483971420067&amp;w=2">20040910 Multiple vulnerabilities in Icewarp Web Mail 5.2.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11371" adv="1" patch="1">11371</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17316">merak-icewarp-view-attachment(17316)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_mail" vendor="icewarp">
        <vers num="3.3.2"/>
        <vers num="5.2.7"/>
        <vers num="5.2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1673" seq="2004-1673" published="2004-10-12" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">accountsettings_add.html in Merak Mail Server 7.4.5 with Icewarp Web Mail 5.2.7 and possibly other versions allow remote attackers to create text files with arbitrary content via the accountid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109483971420067&amp;w=2">20040910 Multiple vulnerabilities in Icewarp Web Mail 5.2.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11371" adv="1" patch="1">11371</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17317">merak-icewarp-create-file(17317)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_mail" vendor="icewarp">
        <vers num="3.3.2"/>
        <vers num="5.2.7"/>
        <vers num="5.2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1674" seq="2004-1674" published="2004-10-12" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">viewaction.html in Merak Mail Server 7.4.5 with Icewarp Web Mail 5.2.7 and possibly other versions allows remote attackers to (1) delete arbitrary files via the originalfolder parameter or (2) move arbitrary files via the messageid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109483971420067&amp;w=2">20040910 Multiple vulnerabilities in Icewarp Web Mail 5.2.7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11371" adv="1" patch="1">11371</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17976">merak-icewarp-file-deletion(17976)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_mail" vendor="icewarp">
        <vers num="3.3.2"/>
        <vers num="5.2.7"/>
        <vers num="5.2.8"/>
      </prod>
      <prod name="mail_server" vendor="merak">
        <vers num="7.4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1675" seq="2004-1675" published="2004-09-11" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Serv-U FTP server 4.x and 5.x allows remote attackers to cause a denial of service (application crash) via a STORE UNIQUE (STOU) command with an MS-DOS device name argument such as (1) COM1, (2) LPT1, (3) PRN, or (4) AUX.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109495074211638&amp;w=2">20040911 Serv-U up to 5.2 Denial of Service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11155" adv="1" patch="1">11155</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17329">servu-stou-dos(17329)</ref>
    </refs>
    <vuln_soft>
      <prod name="serv-u" vendor="serv-u">
        <vers num="4.0.0.4"/>
        <vers num="4.1.0.0"/>
        <vers num="4.1.0.3"/>
        <vers num="5.0.0.0"/>
        <vers num="5.0.0.4"/>
        <vers num="5.0.0.9"/>
        <vers num="5.0.0.11"/>
        <vers num="5.1.0.0"/>
        <vers num="5.2.0.0"/>
        <vers num="5.2.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1676" seq="2004-1676" published="2004-09-12" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the image sending feature in Gadu-Gadu 6.0 build 149 allows remote attackers to execute arbitrary code via a crafted GG_MSG_IMAGE_REPLY message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109508834910733&amp;w=2">20040912 Gadu-Gadu (all versions with image-send feature) Heap Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11158" adv="1">11158</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17324">gadu-gadu-image-bo(17324)</ref>
    </refs>
    <vuln_soft>
      <prod name="gadu-gadu_instant_messenger" vendor="gadu-gadu">
        <vers num="6.0"/>
        <vers num="6.0_build149"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1677" seq="2004-1677" published="2004-09-12" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">pdesk.cgi in PerlDesk allows remote attackers to gain sensitive information via an invalid lang parameter, which includes pathname information in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109509026406554&amp;w=2">20040912 Posible Inclusion File in Perl Desk</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17343">perldesk-lang-file-include(17343)</ref>
    </refs>
    <vuln_soft>
      <prod name="perldesk" vendor="logicnow">
        <vers num="1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1678" seq="2004-1678" published="2004-09-13" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in pdesk.cgi in PerlDesk allows remote attackers to read portions of arbitrary files and possibly execute arbitrary Perl modules via ".." sequences terminated by a %00 (null) character in the lang parameter, which can leak portions of the requested files if a compilation error message occurs.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109509026406554&amp;w=2">20040912 Posible Inclusion File in Perl Desk</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11160" adv="1">11160</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19712">perldesk-directory-traversal(19712)</ref>
    </refs>
    <vuln_soft>
      <prod name="perldesk" vendor="logicnow">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1679" seq="2004-1679" published="2004-08-04" modified="2017-07-18" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in TwinFTP 1.0.3 R2 allows remote attackers to create arbitrary files via a .../ (triple dot) in the (1) CWD, (2) STOR, or (3) RETR commands.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109509243831121&amp;w=2">20040913 Directory Traversal Vulnerability in TwinFTP Server allows overwriting of files outside FTP directory</ref>
      <ref source="MISC" url="http://www.security.org.sg/vuln/twinftp103r2.html" adv="1">http://www.security.org.sg/vuln/twinftp103r2.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11159" adv="1" patch="1">11159</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17323">twinftp-argument-directory-traversal(17323)</ref>
    </refs>
    <vuln_soft>
      <prod name="twinftp_enterprise" vendor="jigunet">
        <vers num="1.0.3_r2"/>
      </prod>
      <prod name="twinftp_standard" vendor="jigunet">
        <vers num="1.0.3_r2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1680" seq="2004-1680" published="2004-09-13" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">application.cgi in the Pingtel Xpressa handset running firmware 2.1.11.24 allows remote authenticated users to cause a denial of service (VxWorks OS crash) via a long HTTP GET request, possibly triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="ATSTAKE" url="http://www.atstake.com/research/advisories/2004/a091304-2.txt" adv="1" patch="1">A091304-2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11161" adv="1" patch="1">11161</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17346">xpressa-applicationcgi-dos(17346)</ref>
    </refs>
    <vuln_soft>
      <prod name="xpressa" vendor="pingtel">
        <vers num="1.2.5"/>
        <vers num="1.2.7.4"/>
        <vers num="1.2.8"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.1.11.24"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1681" seq="2004-1681" published="2004-08-26" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in (1) phrelay-cfg, (2) phlocale, (3) pkg-installer, or (4) input-cfg in QNX Photon microGUI for QNX RTP 6.1 allow local users to gain privileges via a long -s (server) command line parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109510393407597&amp;w=2">20040913 [RLSA_02-2004] QNX Photon multiple buffer overflows</ref>
      <ref source="MISC" url="http://www.rfdslabs.com.br/qnx-advs-03-2004.txt">http://www.rfdslabs.com.br/qnx-advs-03-2004.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11164" adv="1">11164</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17339">qnx-rtp-photon-bo(17339)</ref>
    </refs>
    <vuln_soft>
      <prod name="photon_microgui" vendor="qnx">
        <vers num=""/>
      </prod>
      <prod name="rtp" vendor="qnx">
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1682" seq="2004-1682" published="2004-08-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in QNX 6.1 FTP client allows remote authenticated users to gain group bin privileges via format string specifiers in the QUOTE command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109511327005476&amp;w=2">20040913 [RLSA_03-2004] QNX ftp client format string bug</ref>
      <ref source="MISC" url="http://www.rfdslabs.com.br/qnx-advs-04-2004.txt">http://www.rfdslabs.com.br/qnx-advs-04-2004.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17347">qnx-ftp-quote-format-string(17347)</ref>
    </refs>
    <vuln_soft>
      <prod name="rtp" vendor="qnx">
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1683" seq="2004-1683" published="2004-09-13" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="3.7" CVSS_base_score="3.7" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">A race condition in crrtrap for QNX RTP 6.1 allows local users to gain privileges by modifying the PATH environment variable to reference a malicious io-graphics program before is executed by crrtrap.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109511737504357&amp;w=2">20040913 [RLSA_04-2004] QNX crrtrap possible race condition vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11165" adv="1">11165</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17345">qnx-rtp-crttrap-race-condition(17345)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1684" seq="2004-1684" published="2004-09-13" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Zyxel P681 running ZyNOS Vt020225a contains portions of memory in an ARP request, which allows remote attackers to obtain sensitive information by sniffing the network.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109510732611448&amp;w=2">20040913 Zyxel Prestige 681 SDSL router information leak</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11167" adv="1">11167</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17372">prestige-information-disclosure(17372)</ref>
    </refs>
    <vuln_soft>
      <prod name="prestige" vendor="zyxel">
        <vers num="681"/>
      </prod>
      <prod name="zynos" vendor="zyxel">
        <vers num="vt020225a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1685" seq="2004-1685" published="2004-09-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SMC routers SMC7004VWBR running firmware 1.00.014 and SMC7008ABR EU running firmware 1.42.003 allow remote attackers to bypass authentication by connecting to it from the same IP address as the administrator who is logged in, then accessing the setup_status.htm or status.HTM pages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109526094614160&amp;w=2">20040915 SMC7004VWBR / SMC7008ABR "spoofing" vulnerability.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11197" adv="1">11197</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17443">smc-router-security-bypass(17443)</ref>
    </refs>
    <vuln_soft>
      <prod name="smc7004vwbr" vendor="smc_networks">
        <vers num="1.21a"/>
        <vers num="1.22"/>
        <vers num="1.23"/>
      </prod>
      <prod name="smc7008abr" vendor="smc_networks">
        <vers num="1.32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1686" seq="2004-1686" published="2004-09-15" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Internet Explorer 6.0 in Windows XP SP2 allows remote attackers to bypass the Information Bar prompt for ActiveX and Javascript via an XHTML page that contains an Internet Explorer formatted comment between the DOCTYPE tag and the HTML tag, as demonstrated using the DesignScience MathPlayer ActiveX plugin.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109539520310153&amp;w=2">20040915 IE6 + XP SP2 Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11200" adv="1">11200</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/20617">ie-information-bar-bypass(20617)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1687" seq="2004-1687" published="2004-09-16" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in down.asp for Snitz Forums 2000 3.4.04 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the location parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forum.snitz.com/forum/topic.asp?ARCHIVE=true&amp;TOPIC_ID=54791" adv="1">http://forum.snitz.com/forum/topic.asp?ARCHIVE=true&amp;TOPIC_ID=54791</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109537195413691&amp;w=2">20040916 ADVISORY: security hole (http response splitting) in snitz forums</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11201" adv="1" patch="1">11201</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17421">snitz-response-splitting(17421)</ref>
    </refs>
    <vuln_soft>
      <prod name="snitz_forums_2000" vendor="snitz_communications">
        <vers num="3.0"/>
        <vers num="3.1" edition="sr4"/>
        <vers num="3.3"/>
        <vers num="3.3.01"/>
        <vers num="3.3.02"/>
        <vers num="3.3.03"/>
        <vers num="3.4.02"/>
        <vers num="3.4.03"/>
        <vers num="3.4.04"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1688" seq="2004-1688" published="2004-09-16" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Pigeon Server 3.02.0143 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a long login name sent to port 3103.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026515.html">20040916 Freeze in Pigeon Server 3.02.0143</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109543366631724&amp;w=2">20040916 Freeze in Pigeon Server 3.02.0143</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11203" adv="1" patch="1">11203</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17427">pigeon-server-dos(17427)</ref>
    </refs>
    <vuln_soft>
      <prod name="pigeon_server" vendor="tech-noel">
        <vers num="3.02.0143"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1689" seq="2004-1689" published="2004-09-16" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">sudoedit (aka sudo -e) in sudo 1.6.8 opens a temporary file with root privileges, which allows local users to read arbitrary files via a symlink attack on the temporary file before quitting sudoedit.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109537972929201&amp;w=2">20040916 [sudo-announce] Sudo version 1.6.8p1 now available (fwd)</ref>
      <ref source="MISC" url="http://packetstormsecurity.nl/0409-exploits/sudoedit.txt" adv="1" patch="1">http://packetstormsecurity.nl/0409-exploits/sudoedit.txt</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-219.shtml" adv="1" patch="1">O-219</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/424358" adv="1" patch="1">VU#424358</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11204" adv="1" patch="1">11204</ref>
      <ref source="CONFIRM" url="http://www.sudo.ws/sudo/alerts/sudoedit.html" adv="1" patch="1">http://www.sudo.ws/sudo/alerts/sudoedit.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17424">sudo-sudoedit-view-files(17424)</ref>
    </refs>
    <vuln_soft>
      <prod name="sudo" vendor="todd_miller">
        <vers num="1.6.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1690" seq="2004-1690" published="2004-09-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Web Server in DNS4Me 3.0.0.4 allows remote attackers to execute arbitrary web script or HTML via the URL.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109552436811493&amp;w=2">20040918 RhinoSoft DNS4ME HTTP Server Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011334" adv="1">1011334</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00049-09162004" adv="1">http://www.gulftech.org/?node=research&amp;article_id=00049-09162004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11213" adv="1">11213</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17425">dns4me-xss(17425)</ref>
    </refs>
    <vuln_soft>
      <prod name="dns4me" vendor="rhinosoft">
        <vers num="3.0.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1691" seq="2004-1691" published="2004-09-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Web Server in DNS4Me 3.0.0.4 allows remote attackers to cause a denial of service (CPU consumption and crash) via a large amount of data.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109552436811493&amp;w=2">20040918 RhinoSoft DNS4ME HTTP Server Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011334" adv="1">1011334</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00049-09162004" adv="1">http://www.gulftech.org/?node=research&amp;article_id=00049-09162004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11213" adv="1">11213</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17426">dns4me-dos(17426)</ref>
    </refs>
    <vuln_soft>
      <prod name="dns4me" vendor="rhinosoft">
        <vers num="3.0.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1692" seq="2004-1692" published="2004-09-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Mambo 4.5 (1.0.9) allows remote attackers to inject arbitrary web script or HTML via the (1) Itemid, (2) mosmsg, or (3) limit parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://mamboforge.net/frs/shownotes.php?release_id=1672" patch="1">http://mamboforge.net/frs/shownotes.php?release_id=1672</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109571849713158&amp;w=2">20040918 Vulnerabilities in TUTOS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11220" adv="1" patch="1">11220</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/20616">mambo-multiple-xss(20616)</ref>
    </refs>
    <vuln_soft>
      <prod name="mambo_open_source" vendor="mambo">
        <vers num="4.5_1.0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1693" seq="2004-1693" published="2004-09-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in Function.php in Mambo 4.5 (1.0.9) allows remote attackers to execute arbitrary PHP code by modifying the mosConfig_absolute_path parameter to reference a URL on a remote web server that contains the code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109571849713158&amp;w=2">20040918 Vulnerabilities in TUTOS</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011365">1011365</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11220" adv="1">11220</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17449">mambo-cachelibrary-execute-code(17449)</ref>
    </refs>
    <vuln_soft>
      <prod name="mambo" vendor="mambo">
        <vers num="4.5_1.0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1694" seq="2004-1694" published="2004-09-21" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Symantec ON Command CCM 5.4.x and iCommand 3.0.x has four default usernames and passwords, one of which is hardcoded, which allows remote attackers to gain unauthorized access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109571689621784&amp;w=2">20040920 Default username/password pairs in ON Command CCM 5.x database</ref>
      <ref source="CONFIRM" url="http://www.sarc.com/avcenter/security/Content/2004.09.29.html" adv="1">http://www.sarc.com/avcenter/security/Content/2004.09.29.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11225" adv="1" patch="1">11225</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17447">oncommand-multiple-default-accounts(17447)</ref>
    </refs>
    <vuln_soft>
      <prod name="on_command_ccm" vendor="symantec">
        <vers num="5.0"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="5.4"/>
      </prod>
      <prod name="on_icommand" vendor="symantec">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1695" seq="2004-1695" published="2004-09-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">EmuLive Server4 Commerce Edition Build 7560 allows remote attackers to bypass authentication for the remote administration feature via a URL that contains an extra leading / (slash).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109577497718374&amp;w=2">20040921 Multiple Vulnerabilities In EmuLive Server4</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00051-09202004" adv="1">http://www.gulftech.org/?node=research&amp;article_id=00051-09202004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11226" adv="1">11226</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17450">emuliveserver4-url-gain-access(17450)</ref>
    </refs>
    <vuln_soft>
      <prod name="server4" vendor="emulive">
        <vers num="commerce_build_7560"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1696" seq="2004-1696" published="2004-09-21" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">EmuLive Server4 Commerce Edition Build 7560 allows remote attackers to cause a denial of service (application crash) via a sequence of carriage returns sent to TCP port 66.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109577497718374&amp;w=2">20040921 Multiple Vulnerabilities In EmuLive Server4</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00051-09202004" adv="1">http://www.gulftech.org/?node=research&amp;article_id=00051-09202004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11226" adv="1">11226</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17451">emulive-tcp-port-dos(17451)</ref>
    </refs>
    <vuln_soft>
      <prod name="server4" vendor="emulive">
        <vers num="commerce_build_7560"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1697" seq="2004-1697" published="2004-09-21" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The "Forgot your Password" link in Computer Associates (CA) Unicenter Management Portal 2.0 and 3.1 displays different error messages for users that exist and users that do not exist, which could allow remote attackers to guess valid usernames.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109579952809320&amp;w=2">20040921 CA UniCenter Management Portal Username Enumeration Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11229" adv="1" patch="1">11229</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17464">unicenter-management-username-bruteforce(17464)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1698" seq="2004-1698" published="2004-09-24" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Base64 function in PopMessenger 1.60 (before 20 Sep 2004) and earlier allows remote attackers to cause a denial of service (application crash) via invalid characters in a message, which causes several alert dialogs to be displayed and leads to a crash.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109581586128899&amp;w=2">20040921 Broadcast crash in Popmessenger 1.60 (before 20 Sep 2004)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11230" adv="1">11230</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17465">popmessenger-base64-dos(17465)</ref>
    </refs>
    <vuln_soft>
      <prod name="popmessenger" vendor="leadmind">
        <vers num="1.60"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1699" seq="2004-1699" published="2004-09-21" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">SettingsBase.php in Pinnacle ShowCenter 1.51 allows remote attackers to cause a denial of service (web interface errors) via an invalid Skin parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026733.html" adv="1">20040921 Pinnacle ShowCenter Skin Denial of Service</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109589167110196&amp;w=2">20040922 Pinnacle ShowCenter 1.51 possible DoS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11232" adv="1">11232</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17463">pinnacle-showcenter-dos(17463)</ref>
    </refs>
    <vuln_soft>
      <prod name="showcenter" vendor="pinnacle_systems">
        <vers num="1.51"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1700" seq="2004-1700" published="2004-10-14" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in SettingsBase.php in Pinnacle ShowCenter 1.51 build 121 allows remote attackers to inject arbitrary HTML or web script via the Skin parameter, which is echoed in an error message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11415">11415</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17708">pinnacle-showcenter-xss(17708)</ref>
    </refs>
    <vuln_soft>
      <prod name="showcenter" vendor="pinnacle_systems">
        <vers num="1.51_build_121"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1701" seq="2004-1701" published="2004-08-09" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in the AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 allows remote attackers to execute arbitrary code via a long SAUTH command during RSA authentication.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109208394910086&amp;w=2">20040809 CORE-2004-0714: Cfengine RSA Authentication Heap Corruption</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110886670528775&amp;w=2">20050219 cfengine rsa heap remote exploit:   part of PTjob project</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-08.xml" adv="1" patch="1">GLSA-200408-08</ref>
      <ref source="MISC" url="http://www.coresecurity.com/common/showdoc.php?idx=387&amp;idxseccion=10" adv="1" patch="1">http://www.coresecurity.com/common/showdoc.php?idx=387&amp;idxseccion=10</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10899" adv="1" patch="1">10899</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16935">cfengine-cfservd-command-execution(16935)</ref>
    </refs>
    <vuln_soft>
      <prod name="cfengine" vendor="gnu">
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5" edition="b1"/>
        <vers num="2.0.5" edition="pre"/>
        <vers num="2.0.5" edition="pre2"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7" edition="p1"/>
        <vers num="2.0.7" edition="p2"/>
        <vers num="2.0.7" edition="p3"/>
        <vers num="2.0.8" edition="p1"/>
        <vers num="2.1.0" edition="a6"/>
        <vers num="2.1.0" edition="a8"/>
        <vers num="2.1.0" edition="a9"/>
        <vers num="2.1.7" edition="p1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1702" seq="2004-1702" published="2004-08-09" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 does not properly check the return value of the ReceiveTransaction function, which leads to a failed malloc call and triggers to a null dereference, which allows remote attackers to cause a denial of service (crash).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109208394910086&amp;w=2">20040809 CORE-2004-0714: Cfengine RSA Authentication Heap Corruption</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200408-08.xml" adv="1" patch="1">GLSA-200408-08</ref>
      <ref source="MISC" url="http://www.coresecurity.com/common/showdoc.php?idx=387&amp;idxseccion=10" adv="1" patch="1">http://www.coresecurity.com/common/showdoc.php?idx=387&amp;idxseccion=10</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10900" adv="1" patch="1">10900</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16937">cfengine-cfservd-dos(16937)</ref>
    </refs>
    <vuln_soft>
      <prod name="cfengine" vendor="gnu">
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5" edition="b1"/>
        <vers num="2.0.5" edition="pre"/>
        <vers num="2.0.5" edition="pre2"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7" edition="p1"/>
        <vers num="2.0.7" edition="p2"/>
        <vers num="2.0.7" edition="p3"/>
        <vers num="2.0.8" edition="p1"/>
        <vers num="2.1.0" edition="a6"/>
        <vers num="2.1.0" edition="a8"/>
        <vers num="2.1.0" edition="a9"/>
        <vers num="2.1.7" edition="p1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1703" seq="2004-1703" published="2004-07-30" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Fusion News 3.6.1 allows remote attackers to add user accounts, if the administrator is logged in, via a comment that contains an img bbcode tag that calls index.php with the signup action, which is executed when the administrator's browser loads the page with the img tag.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109122824523226&amp;w=2">20040729 Fusion News Yet Another Unauthorized Account Addition Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010829" adv="1">1010829</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10836" adv="1">10836</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16853">fusion-news-add-account(16853)</ref>
    </refs>
    <vuln_soft>
      <prod name="fusion_news" vendor="fusionphp">
        <vers num="3.3"/>
        <vers num="3.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1704" seq="2004-1704" published="2004-07-30" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">WpQuiz 2.60b1 through 2.60b8 allows remote attackers to gain privileges via a direct request to adminrestore.php in the extras directory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109122270013514&amp;w=2">20040730 WpQuiz Gain Admin Rightd Exploit found</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16848">wpquiz-extra-gain-access(16848)</ref>
    </refs>
    <vuln_soft>
      <prod name="wpquiz" vendor="wire_plastic_design">
        <vers num="2.60b1"/>
        <vers num="2.60b2"/>
        <vers num="2.60b3"/>
        <vers num="2.60b4"/>
        <vers num="2.60b5"/>
        <vers num="2.60b6"/>
        <vers num="2.60b7"/>
        <vers num="2.60b8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1705" seq="2004-1705" published="2004-07-30" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Citadel/UX 6.23 and earlier allows remote attackers to cause a denial of service via a long username.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109121546120575&amp;w=2">20040731 Citadel/UX Remote DoS Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109146099404071&amp;w=2">20040731 Re: Citadel/UX Remote DoS Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010809" adv="1" patch="1">1010809</ref>
      <ref source="MISC" url="http://www.nosystem.com.ar/advisories/advisory-04.txt" adv="1" patch="1">http://www.nosystem.com.ar/advisories/advisory-04.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10833" adv="1" patch="1">10833</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16840">citadel-user-dos(16840)</ref>
    </refs>
    <vuln_soft>
      <prod name="ux" vendor="citadel">
        <vers num="5.90"/>
        <vers num="5.91"/>
        <vers num="6.07"/>
        <vers num="6.08"/>
        <vers num="6.23"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1706" seq="2004-1706" published="2004-08-02" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The U.S. Robotics USR808054 wireless access point allows remote attackers to cause a denial of service (device crash) and possibly execute arbitrary code via an HTTP GET request with a long version string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109146350605751&amp;w=2">20040802 7a69Adv#13 - USRobotics AP Wireless Denial of Service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10840" adv="1">10840</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16860">usrobotics-wireless-get-bo(16860)</ref>
    </refs>
    <vuln_soft>
      <prod name="usr808054" vendor="u.s.robotics">
        <vers num="1.21_h"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1707" seq="2004-1707" published="2004-07-30" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The (1) dbsnmp and (2) nmo programs in Oracle 8i, Oracle 9i, and Oracle IAS 9.0.2.0.1, on Unix systems, use a default path to find and execute library files while operating at raised privileges, which allows certain Oracle user accounts to gain root privileges via a modified libclntsh.so.9.0.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109147677214087&amp;w=2">20040802 OPEN3S - Local Privilege Elevation through Oracle products (Unix Platform)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10829" adv="1">10829</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16839">oracle-libraries-gain-privileges(16839)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="1.0.2"/>
        <vers num="1.0.2.1s"/>
        <vers num="1.0.2.2"/>
        <vers num="1.0.2.2.2"/>
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.3"/>
        <vers num="9.0.3.1"/>
      </prod>
      <prod name="application_server_portal" vendor="oracle">
        <vers num="3.0.9.8.5"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.2.3a"/>
        <vers num="9.0.2.3b"/>
      </prod>
      <prod name="database_server_lite" vendor="oracle">
        <vers num="5.0"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
      </prod>
      <prod name="oracle8i" vendor="oracle">
        <vers num="enterprise_8.0.5_.0.0"/>
        <vers num="enterprise_8.0.6_.0.0"/>
        <vers num="enterprise_8.0.6_.0.1"/>
        <vers num="enterprise_8.1.5_.0.0"/>
        <vers num="enterprise_8.1.5_.0.2"/>
        <vers num="enterprise_8.1.5_.1.0"/>
        <vers num="enterprise_8.1.6_.0.0"/>
        <vers num="enterprise_8.1.6_.1.0"/>
        <vers num="enterprise_8.1.7_.0.0"/>
        <vers num="enterprise_8.1.7_.1.0"/>
        <vers num="standard_8.0.6"/>
        <vers num="standard_8.0.6_.3"/>
        <vers num="standard_8.1.5"/>
        <vers num="standard_8.1.6"/>
        <vers num="standard_8.1.7"/>
        <vers num="standard_8.1.7_.0.0"/>
        <vers num="standard_8.1.7_.1"/>
        <vers num="standard_8.1.7_.4"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="client_9.2.0.1"/>
        <vers num="client_9.2.0.2"/>
        <vers num="enterprise_9.0.1"/>
        <vers num="enterprise_9.0.1.4"/>
        <vers num="enterprise_9.0.1.5"/>
        <vers num="enterprise_9.2.0"/>
        <vers num="enterprise_9.2.0.1"/>
        <vers num="enterprise_9.2.0.2"/>
        <vers num="enterprise_9.2.0.3"/>
        <vers num="enterprise_9.2.0.4"/>
        <vers num="personal_8.1.7"/>
        <vers num="personal_9.0.1"/>
        <vers num="personal_9.0.1.4"/>
        <vers num="personal_9.0.1.5"/>
        <vers num="personal_9.2"/>
        <vers num="personal_9.2.0.1"/>
        <vers num="personal_9.2.0.2"/>
        <vers num="personal_9.2.0.3"/>
        <vers num="personal_9.2.0.4"/>
        <vers num="standard_9.0"/>
        <vers num="standard_9.0.1"/>
        <vers num="standard_9.0.1.2"/>
        <vers num="standard_9.0.1.3"/>
        <vers num="standard_9.0.1.4"/>
        <vers num="standard_9.0.1.5"/>
        <vers num="standard_9.0.2"/>
        <vers num="standard_9.2"/>
        <vers num="standard_9.2.0.1"/>
        <vers num="standard_9.2.0.2"/>
        <vers num="standard_9.2.0.3"/>
        <vers num="standard_9.2.0.4"/>
        <vers num="standard_9.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1708" seq="2004-1708" published="2004-08-02" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Webbsyte Chat 0.9.0 allows remote attackers to cause a denial of service (crash) via a large number of connections.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109156450320855&amp;w=2">20040803 DoS in Webbsyte Chat 0.9.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10842" adv="1">10842</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16852">webbsyte-chat-dos(16852)</ref>
    </refs>
    <vuln_soft>
      <prod name="webbsyte_chat" vendor="shawn_webb">
        <vers num="0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1709" seq="2004-1709" published="2004-08-04" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Datakey Rainbow iKey2032 USB token, when using the CIP client package, does not encrypt communications between the token and the driver, which could allow local users to obtain the PINs of other users.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109164096013467&amp;w=2">20040804 Clear text password exposure in Datakey's tokens and smartcards</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16887">datakey-plaintext-pin(16887)</ref>
    </refs>
    <vuln_soft>
      <prod name="rainbow_ikey2032_usb_token" vendor="datakey">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1710" seq="2004-1710" published="2004-08-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">page.cgi allows remote attackers to execute arbitrary commands via shell metacharacters in the url parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109181771832634&amp;w=2">20040806 Remote Command Execution</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19713">pagecgi-url-command-execution(19713)</ref>
    </refs>
    <vuln_soft>
      <prod name="page_cgi" vendor="andrew_kilpatrick">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1711" seq="2004-1711" published="2004-08-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in post.php in Moodle before 1.3 allows remote attackers to inject arbitrary web script or HTML via the reply parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109182851216921&amp;w=2">20040806 xss in moodle (post.php)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10884" adv="1" patch="1">10884</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16924">moodle-post-xss(16924)</ref>
    </refs>
    <vuln_soft>
      <prod name="moodle" vendor="moodle">
        <vers num="1.1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1712" seq="2004-1712" published="2004-08-06" modified="2017-07-18" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in TypePad allows remote attackers to inject arbitrary Javascript via the name parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109189453302959&amp;w=2">20040806 Type xxs</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19664">typepad-name-xss(19664)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1713" seq="2004-1713" published="2004-08-10" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in HP Process Resource Manager (PRM) C.02.01[.01] and earlier, as used by HP-UX Workload Manager (WLM), allows local users to corrupt data files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=109215093809027&amp;w=2">SSRT4785</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10907" adv="1" patch="1">10907</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16928">hp-prm-wlm-file-corruption(16928)</ref>
    </refs>
    <vuln_soft>
      <prod name="process_resource_manager" vendor="hp">
        <vers num="c.01.07"/>
        <vers num="c.01.08.02"/>
        <vers num="c.02.01.01"/>
      </prod>
      <prod name="workload_manager" vendor="hp">
        <vers num="a.02.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1714" seq="2004-1714" published="2004-08-11" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">BlackICE PC Protection and Server Protection installs (1) firewall.ini, (2) blackice.ini, (3) sigs.ini and (4) protect.ini with Everyone Full Control permissions, which allows local users to cause a denial of service (crash) or modify configuration, as demonstrated by modifying firewall.ini to contain a large firewall rule.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/025112.html" adv="1" patch="1">20040811 ISS BlackIce Server Protect Unprivileged User Attack</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109223751031166&amp;w=2">20040811 BlackICE unprivileged local user attack</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10915" adv="1">10915</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16959">blackice-firewall-dos(16959)</ref>
    </refs>
    <vuln_soft>
      <prod name="blackice_pc_protection" vendor="iss">
        <vers num="3.6cbd"/>
        <vers num="3.6cbr"/>
        <vers num="3.6cbz"/>
        <vers num="3.6cca"/>
        <vers num="3.6ccb"/>
        <vers num="3.6ccc"/>
        <vers num="3.6ccd"/>
        <vers num="3.6cce"/>
        <vers num="3.6ccf"/>
        <vers num="3.6ccg"/>
      </prod>
      <prod name="blackice_server_protection" vendor="iss">
        <vers num="3.5cdf"/>
        <vers num="3.6cbz"/>
        <vers num="3.6cca"/>
        <vers num="3.6ccb"/>
        <vers num="3.6ccc"/>
        <vers num="3.6ccd"/>
        <vers num="3.6cce"/>
        <vers num="3.6ccf"/>
        <vers num="3.6ccg"/>
        <vers num="3.6cch"/>
        <vers num="3.6cno"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1715" seq="2004-1715" published="2004-08-11" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in MIMEsweeper for Web before 5.0.4 allows remote attackers or local users to read arbitrary files via "..\\", "..\", and similar dot dot sequences in the URL.</descript>
    </desc>
    <sols>
      <sol source="nvd">This was fixed in MIMEsweeper for Web v5.0.4.</sol>
    </sols>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109224211512029&amp;w=2">20040811 Clearswift Mimesweeper Path Traversal Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109225567212978&amp;w=2">20040811 Re: Clearswift Mimesweeper Path Traversal Vulnerability</ref>
      <ref source="MISC" url="http://packetstormsecurity.nl/0408-exploits/clearswift.txt" adv="1">http://packetstormsecurity.nl/0408-exploits/clearswift.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10918" adv="1" patch="1">10918</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16960">mimesweeper-directory-traversal(16960)</ref>
    </refs>
    <vuln_soft>
      <prod name="mimesweeper_for_web" vendor="clearswift">
        <vers num="4.0"/>
        <vers num="5.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1716" seq="2004-1716" published="2004-08-16" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in PForum before 1.26 allows remote attackers to inject arbitrary web script or HTML via the (1) IRC Server or (2) AIM ID fields in the user profile.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109267937212298&amp;w=2">20040814 pscript.de PFORUM XSS Vulnerability</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/674542" adv="1" patch="1">VU#674542</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10954" adv="1" patch="1">10954</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17003">pforum-irc-aim-xss(17003)</ref>
    </refs>
    <vuln_soft>
      <prod name="pforum" vendor="powie">
        <vers num="1.24"/>
        <vers num="1.25"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1717" seq="2004-1717" published="2004-08-16" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in the psscan function in ps.c for gv (ghostview) allow remote attackers to execute arbitrary code via a Postscript file with a long (1) BoundingBox, (2) comment, (3) Orientation, (4) PageOrder, or (5) Pages value.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109267677114331&amp;w=2">20040816 gv buffer overflows: here, there, and everywhere</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10944" adv="1">10944</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17019">gv-psscan-header-bo(17019)</ref>
    </refs>
    <vuln_soft>
      <prod name="gv" vendor="gv">
        <vers num="2.7.6"/>
        <vers num="2.7b1"/>
        <vers num="2.7b2"/>
        <vers num="2.7b3"/>
        <vers num="2.7b4"/>
        <vers num="2.7b5"/>
        <vers num="2.9.4"/>
        <vers num="3.0.0"/>
        <vers num="3.0.4"/>
        <vers num="3.1.4"/>
        <vers num="3.1.6"/>
        <vers num="3.2.4"/>
        <vers num="3.4.2"/>
        <vers num="3.4.3"/>
        <vers num="3.4.12"/>
        <vers num="3.5.2"/>
        <vers num="3.5.3"/>
        <vers num="3.5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1718" seq="2004-1718" published="2004-08-17" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The ZwOpenSection function in Integrity Protection Driver (IPD) 1.4 and earlier allows local users to cause a denial of service (crash) via an invalid pointer in the "oa" argument.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109276749821133&amp;w=2">20040817 [NGSEC-2004-6] IPD, local system denial of service.</ref>
      <ref source="MISC" url="http://www.ngsec.com/docs/advisories/NGSEC-2004-6.txt" adv="1">http://www.ngsec.com/docs/advisories/NGSEC-2004-6.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10965" adv="1">10965</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17010">ipd-oa-pointer-dos(17010)</ref>
    </refs>
    <vuln_soft>
      <prod name="integrity_protection_driver" vendor="pedestal_software">
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1719" seq="2004-1719" published="2004-08-17" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Merak Webmail Server 5.2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) category, (2) cserver, (3) ext, (4) global, (5) showgroups, (6) or showlite parameters to address.html, or the (7) spage or (8) autoresponder parameters to settings.html, the (9) folder parameter to readmail.html, or the (10) attachmentpage_text_error parameter to attachment.html, (11) folder, (12) ct, or (13) cv parameters to calendar.html, (14) an &lt;img&gt; tag, or (15) the subject of an e-mail message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109279057326044&amp;w=2">20040817 Vulnerabilities in Merak Webmail Server</ref>
      <ref source="MISC" url="http://packetstormsecurity.nl/0408-exploits/merak527.txt" adv="1" patch="1">http://packetstormsecurity.nl/0408-exploits/merak527.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010969">1010969</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10966" adv="1" patch="1">10966</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17024">merak-xss(17024)</ref>
    </refs>
    <vuln_soft>
      <prod name="mail_server" vendor="merak">
        <vers num="7.4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1720" seq="2004-1720" published="2004-08-17" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The (1) address.html and possibly (2) calendar.html pages in Merak Mail Server 5.2.7 allow remote attackers to gain sensitive information via an invalid HTTP request, which reveals the installation path. NOTE: it is unclear whether the calendar.html is an exposure, since the path is leaked in web logs that may only be available to the administrators, who would have access to the path through legitimate means.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109279057326044&amp;w=2">20040817 Vulnerabilities in Merak Webmail Server</ref>
      <ref source="MISC" url="http://packetstormsecurity.nl/0408-exploits/merak527.txt" adv="1" patch="1">http://packetstormsecurity.nl/0408-exploits/merak527.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010969">1010969</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10966" adv="1" patch="1">10966</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17027">merak-address-calendar-path-disclosure(17027)</ref>
    </refs>
    <vuln_soft>
      <prod name="mail_server" vendor="merak">
        <vers num="7.4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1721" seq="2004-1721" published="2004-08-17" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The (1) function.php or (2) function.view.php scripts in Merak Mail Server 5.2.7 allow remote attackers to read arbitrary PHP files via a direct HTTP request to port 32000.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109279057326044&amp;w=2">20040817 Vulnerabilities in Merak Webmail Server</ref>
      <ref source="MISC" url="http://packetstormsecurity.nl/0408-exploits/merak527.txt" adv="1" patch="1">http://packetstormsecurity.nl/0408-exploits/merak527.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010969">1010969</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10966" adv="1" patch="1">10966</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17029">merak-view-php-files(17029)</ref>
    </refs>
    <vuln_soft>
      <prod name="mail_server" vendor="merak">
        <vers num="5.2.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1722" seq="2004-1722" published="2004-08-17" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in calendar.html in Merak Mail Server 5.2.7 allows remote attackers to execute arbitrary SQL statements via the schedule parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109279057326044&amp;w=2">20040817 Vulnerabilities in Merak Webmail Server</ref>
      <ref source="MISC" url="http://packetstormsecurity.nl/0408-exploits/merak527.txt" adv="1" patch="1">http://packetstormsecurity.nl/0408-exploits/merak527.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010969">1010969</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10966" adv="1" patch="1">10966</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17022">merak-calendarhtml-sql-injection(17022)</ref>
    </refs>
    <vuln_soft>
      <prod name="mail_server" vendor="merak">
        <vers num="7.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1723" seq="2004-1723" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The (1) updateuser.php and (2) forums_prune.php scripts in PHP-Fusion 4.00 allow remote attackers to obtain sensitive information via a direct HTTP request, which reveals the installation path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109285292901685&amp;w=2">20040818 Multiple vulnerabilities in PHP-FUSION</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17036">phpfusion-path-disclosure(17036)</ref>
    </refs>
    <vuln_soft>
      <prod name="php_fusion" vendor="php_fusion">
        <vers num="4.00"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1724" seq="2004-1724" published="2004-08-18" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The ReadMe First.txt file in PHP-Fusion 4.0 instructs users to set the permissions on the fusion_admin/db_backups directory to world read/write/execute (777), which allows remote attackers to download or view database backups, which have easily guessable filenames and contain the administrator username and password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109285292901685&amp;w=2">20040818 Multiple vulnerabilities in PHP-FUSION</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10974" adv="1">10974</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17037">phpfusion-database-file-access(17037)</ref>
    </refs>
    <vuln_soft>
      <prod name="php_fusion" vendor="php_fusion">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1725" seq="2004-1725" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in xvbmp.c in XV allows remote attackers to execute arbitrary code via a crafted image file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109302498125092&amp;w=2">20040820 XV multiple buffer overflows, exploit included</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10985" patch="1">10985</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17053">xv-image-bo(17053)</ref>
    </refs>
    <vuln_soft>
      <prod name="xv" vendor="john_bradley">
        <vers num="3.10a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1726" seq="2004-1726" published="2004-08-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple integer overflows in (1) xviris.c, (2) xvpcx.c, and (3) xvpm.c in XV allow remote attackers to execute arbitrary code via a crafted image file that triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109302498125092&amp;w=2">20040820 XV multiple buffer overflows, exploit included</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10985" adv="1" patch="1">10985</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17053">xv-image-bo(17053)</ref>
    </refs>
    <vuln_soft>
      <prod name="xv" vendor="john_bradley">
        <vers num="3.10a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1727" seq="2004-1727" published="2004-08-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">BadBlue 2.5 allows remote attackers to cause a denial of service (refuse HTTP connections) via a large number of connections from the same IP address.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109309119502208&amp;w=2">20040820 BadBlue Webserver v2.5 Denial Of Service Vulnerability</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00043-08202004" adv="1">http://www.gulftech.org/?node=research&amp;article_id=00043-08202004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10983" adv="1">10983</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17064">badblue-mult-connection-dos(17064)</ref>
    </refs>
    <vuln_soft>
      <prod name="badblue" vendor="working_resources_inc.">
        <vers num="2.50"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1728" seq="2004-1728" published="2004-08-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in British National Corpus SARA (sarad) allows remote attackers to execute arbitrary code by calling the client with a long string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109308454122827&amp;w=2">20040820 Buffer overflow in sarad</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10984" adv="1" patch="1">10984</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17060">sara-server-bo(17060)</ref>
    </refs>
    <vuln_soft>
      <prod name="sara" vendor="british_national_corpus">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1729" seq="2004-1729" published="2004-08-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Nihuo Web Log Analyzer 1.6 allows remote attackers to inject arbitrary web script or HTML via the User-Agent HTTP header.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109305923208449&amp;w=2">20040820 Cross-Site Scripting (XSS) in Nihuo Web Log Analyzer</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10988" adv="1">10988</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17055">nihuo-http-get-xss(17055)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_log_analyzer" vendor="nihuo_software">
        <vers num="1.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1730" seq="2004-1730" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Mantis bugtracker allows remote attackers to inject arbitrary web script or HTML via (1) the return parameter to login_page.php, (2) e-mail field in signup.php, (3) action parameter to login_select_proj_page.php, or (4) hide_status parameter to view_all_set.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109312225727345&amp;w=2">20040820 Multiple Vulnerabilities in Mantis Bugtracker</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10994">10994</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17066">mantis-loginpage-xss(17066)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17069">mantis-signup-xss(17069)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17070">mantis-loginselectprojpage-xss(17070)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17072">mantis-viewallset-xss(17072)</ref>
    </refs>
    <vuln_soft>
      <prod name="mantis" vendor="mantis">
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.11"/>
        <vers num="0.11.1"/>
        <vers num="0.12"/>
        <vers num="0.13"/>
        <vers num="0.13.1"/>
        <vers num="0.14"/>
        <vers num="0.14.1"/>
        <vers num="0.14.2"/>
        <vers num="0.14.3"/>
        <vers num="0.14.4"/>
        <vers num="0.14.5"/>
        <vers num="0.14.6"/>
        <vers num="0.14.7"/>
        <vers num="0.14.8"/>
        <vers num="0.15"/>
        <vers num="0.15.1"/>
        <vers num="0.15.2"/>
        <vers num="0.15.3"/>
        <vers num="0.15.4"/>
        <vers num="0.15.5"/>
        <vers num="0.15.6"/>
        <vers num="0.15.7"/>
        <vers num="0.15.8"/>
        <vers num="0.15.9"/>
        <vers num="0.15.10"/>
        <vers num="0.15.11"/>
        <vers num="0.15.12"/>
        <vers num="0.16"/>
        <vers num="0.16.0"/>
        <vers num="0.16.1"/>
        <vers num="0.17"/>
        <vers num="0.17.0"/>
        <vers num="0.17.1"/>
        <vers num="0.17.2"/>
        <vers num="0.17.3"/>
        <vers num="0.17.4"/>
        <vers num="0.17.4a"/>
        <vers num="0.17.5"/>
        <vers num="0.18"/>
        <vers num="0.18.0_rc1"/>
        <vers num="0.18.0a2"/>
        <vers num="0.18.0a3"/>
        <vers num="0.18.0a4"/>
        <vers num="0.18a1"/>
        <vers num="0.19.0a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1731" seq="2004-1731" published="2004-08-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">signup_page.php in Mantis bugtracker allows remote attackers to send e-mail bombs by creating multiple users and providing the same e-mail address.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109312225727345&amp;w=2">20040820 Multiple Vulnerabilities in Mantis Bugtracker</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10995" adv="1" patch="1">10995</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17093">mantis-improper-account-validation(17093)</ref>
    </refs>
    <vuln_soft>
      <prod name="mantis" vendor="mantis">
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.11"/>
        <vers num="0.11.1"/>
        <vers num="0.12"/>
        <vers num="0.13"/>
        <vers num="0.13.1"/>
        <vers num="0.14"/>
        <vers num="0.14.1"/>
        <vers num="0.14.2"/>
        <vers num="0.14.3"/>
        <vers num="0.14.4"/>
        <vers num="0.14.5"/>
        <vers num="0.14.6"/>
        <vers num="0.14.7"/>
        <vers num="0.14.8"/>
        <vers num="0.15"/>
        <vers num="0.15.1"/>
        <vers num="0.15.2"/>
        <vers num="0.15.3"/>
        <vers num="0.15.4"/>
        <vers num="0.15.5"/>
        <vers num="0.15.6"/>
        <vers num="0.15.7"/>
        <vers num="0.15.8"/>
        <vers num="0.15.9"/>
        <vers num="0.15.10"/>
        <vers num="0.15.11"/>
        <vers num="0.15.12"/>
        <vers num="0.16"/>
        <vers num="0.16.0"/>
        <vers num="0.16.1"/>
        <vers num="0.17"/>
        <vers num="0.17.0"/>
        <vers num="0.17.1"/>
        <vers num="0.17.2"/>
        <vers num="0.17.3"/>
        <vers num="0.17.4"/>
        <vers num="0.17.4a"/>
        <vers num="0.17.5"/>
        <vers num="0.18"/>
        <vers num="0.18.0_rc1"/>
        <vers num="0.18.0a2"/>
        <vers num="0.18.0a3"/>
        <vers num="0.18.0a4"/>
        <vers num="0.18a1"/>
        <vers num="0.19.0a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1732" seq="2004-1732" published="2004-08-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in out.ViewFolder.php in MyDMS before 1.4.2 allows remote attackers to execute arbitrary SQL commands via the folderid parameter.</descript>
    </desc>
    <sols>
      <sol source="nvd">This was fixed in version 1.4.2.</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109314495007280&amp;w=2">20040820 Multiple vulnerabilities in  MyDMS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10996" adv="1" patch="1">10996</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17054">mydms-folderld-sql-injection(17054)</ref>
    </refs>
    <vuln_soft>
      <prod name="mydms" vendor="mydms">
        <vers num="1.4"/>
        <vers num="1.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1733" seq="2004-1733" published="2004-08-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in MyDMS 1.4.2 and other versions allows remote registered users to read arbitrary files via .. (dot dot) sequences in the URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109314495007280&amp;w=2">20040820 Multiple vulnerabilities in  MyDMS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10996" adv="1" patch="1">10996</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17058">mydms-dotdot-file-download(17058)</ref>
    </refs>
    <vuln_soft>
      <prod name="mydms" vendor="mydms">
        <vers num="1.4"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1734" seq="2004-1734" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in Mantis 0.19.0a allows remote attackers to execute arbitrary PHP code by modifying the (1) t_core_path parameter to bug_api.php or (2) t_core_dir parameter to relationship_api.php to reference a URL on a remote web server that contains the code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109313416727851&amp;w=2">20040820 Mantis Bugtracker Remote PHP Code Execution Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10993" patch="1">10993</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17065">mantis-php-file-include(17065)</ref>
    </refs>
    <vuln_soft>
      <prod name="mantis" vendor="mantis">
        <vers num="0.19.0a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1735" seq="2004-1735" published="2004-08-21" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the create list option in Sympa 4.1.x and earlier allows remote authenticated users to inject arbitrary web script or HTML via the description field.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109312475207604&amp;w=2">20040820 Cross Site Scripting Vulnerability in Sympa</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10992" adv="1">10992</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17057">sympa-description-xss(17057)</ref>
    </refs>
    <vuln_soft>
      <prod name="sympa" vendor="sympa">
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1736" seq="2004-1736" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Cacti 0.8.5a allows remote attackers to gain sensitive information via an HTTP request to (1) auth.php, (2) auth_login.php, (3) auth_changepassword.php, and possibly other php files, which reveal the installation path in a PHP error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/025376.html">20040816 SQL Injection in CACTI</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109272483621038&amp;w=2">20040816 SQL Injection in CACTI</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17014">cacti-error-path-disclosure(17014)</ref>
    </refs>
    <vuln_soft>
      <prod name="cacti" vendor="the_cacti_group">
        <vers num="0.8.5a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1737" seq="2004-1737" published="2004-08-16" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in auth_login.php in Cacti 0.8.5a allows remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) username or (2) password parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/025376.html">20040816 SQL Injection in CACTI</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109272483621038&amp;w=2">20040816 SQL Injection in CACTI</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-21.xml" adv="1" patch="1">GLSA-200408-21</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10960" adv="1" patch="1">10960</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17011">cacti-authlogin-sql-injection(17011)</ref>
    </refs>
    <vuln_soft>
      <prod name="cacti" vendor="the_cacti_group">
        <vers num="0.6"/>
        <vers num="0.6.1"/>
        <vers num="0.6.2"/>
        <vers num="0.6.3"/>
        <vers num="0.6.4"/>
        <vers num="0.6.5"/>
        <vers num="0.6.6"/>
        <vers num="0.6.7"/>
        <vers num="0.6.8"/>
        <vers num="0.6.8a"/>
        <vers num="0.8"/>
        <vers num="0.8.1"/>
        <vers num="0.8.2"/>
        <vers num="0.8.2a"/>
        <vers num="0.8.3"/>
        <vers num="0.8.3a"/>
        <vers num="0.8.4"/>
        <vers num="0.8.5"/>
        <vers num="0.8.5a"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1738" seq="2004-1738" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in page.php in JShop allows remote attackers to inject arbitrary web script or HTML via the xPage parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://indohack.sourceforge.net/drponidi/jshop-vuln.txt">http://indohack.sourceforge.net/drponidi/jshop-vuln.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109327547026265&amp;w=2">20040823 JShop Input Validation Hole in 'page.php' Permits Cross-Site</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011020">1011020</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17075">jshop-page-xpage-xss(17075)</ref>
    </refs>
    <vuln_soft>
      <prod name="jshop_server" vendor="jshop_e-commerce">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1739" seq="2004-1739" published="2004-08-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Bird Chat 1.61 allows remote attackers to cause a denial of service (crash) via invalid users.</descript>
    </desc>
    <sols>
      <sol source="nvd">This has been fixed in version 1.61 Security Release.</sol>
    </sols>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109327938924287&amp;w=2">20040823 DoS in Bird Chat 1.61</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/BirdChat1.61-adv.txt">http://www.autistici.org/fdonato/advisory/BirdChat1.61-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11010" adv="1">11010</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17080">bird-chat-dos(17080)</ref>
    </refs>
    <vuln_soft>
      <prod name="internet_chat_server" vendor="bird_chat">
        <vers num="1.61"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1740" seq="2004-1740" published="2004-08-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Music daemon (musicd) 0.0.3 and earlier allows remote attackers to read arbitrary files by calling LOAD with a full pathname, then calling SHOWLIST.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109329098806595&amp;w=2">20040823 MusicDaemon &lt;= 0.0.3 /etc/shadow Stealer / DoS Exploit</ref>
      <ref source="CONFIRM" url="http://musicdaemon.sourceforge.net/" patch="1">http://musicdaemon.sourceforge.net/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11006" adv="1">11006</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17067">musicd-commands-view-files(17067)</ref>
    </refs>
    <vuln_soft>
      <prod name="music_daemon" vendor="music_daemon">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1741" seq="2004-1741" published="2004-08-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Music daemon (musicd) 0.0.3 and earlier allows remote attackers to cause a denial of service (crash) by calling LOAD with a binary file as an argument, then calling SHOWLIST.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109329098806595&amp;w=2">20040823 MusicDaemon &lt;= 0.0.3 /etc/shadow Stealer / DoS Exploit</ref>
      <ref source="CONFIRM" url="http://musicdaemon.sourceforge.net/" patch="1">http://musicdaemon.sourceforge.net/</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011025">1011025</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11006" adv="1">11006</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17068">musicd-load-showlist-dos(17068)</ref>
    </refs>
    <vuln_soft>
      <prod name="music_daemon" vendor="music_daemon">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1742" seq="2004-1742" published="2004-08-24" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in WebAPP 0.9.9 allows remote attackers to view arbitrary files via a .. (dot dot) in the viewcat parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cornerstone.web-app.org/cgi-bin/index.cgi?action=downloadinfo&amp;cat=updates&amp;id=1">http://cornerstone.web-app.org/cgi-bin/index.cgi?action=downloadinfo&amp;cat=updates&amp;id=1</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109336268002879&amp;w=2">20040824 WebAPP directory traversal and ability to retrieve the DES encrypted password hash</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11028" adv="1">11028</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17100">webapp-dotdot-directory-traversal(17100)</ref>
    </refs>
    <vuln_soft>
      <prod name="webapp" vendor="web-app.org">
        <vers num="0.9.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1743" seq="2004-1743" published="2004-08-24" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Easy File Sharing (EFS) Webserver 1.25 allows remote attackers to view arbitrary files via an HTTP request for the disk_c virtual folder.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109341398102863&amp;w=2">20040824 Easy File Sharing Webserver v1.25 Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011045" adv="1">1011045</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00045-08242004" adv="1">http://www.gulftech.org/?node=research&amp;article_id=00045-08242004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11034" adv="1">11034</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17109">easyfilesharing-obtain-info(17109)</ref>
    </refs>
    <vuln_soft>
      <prod name="efs_web_server" vendor="efs_software">
        <vers num="1.2"/>
        <vers num="1.25"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1744" seq="2004-1744" published="2004-08-24" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Easy File Sharing (EFS) Webserver 1.25 allows remote attackers to cause a denial of service (CPU consumption or crash) via many large HTTP requests.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109341398102863&amp;w=2">20040824 Easy File Sharing Webserver v1.25 Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011045">1011045</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00045-08242004" adv="1">http://www.gulftech.org/?node=research&amp;article_id=00045-08242004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11036" adv="1">11036</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17110">easyfilesharing-http-request-dos(17110)</ref>
    </refs>
    <vuln_soft>
      <prod name="efs_web_server" vendor="efs_software">
        <vers num="1.2"/>
        <vers num="1.25"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1745" seq="2004-1745" published="2004-08-24" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Painkiller 1.3.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109339761608821&amp;w=2">20040824 Limited buffer overflow in Painkiller 1.31</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11029" adv="1">11029</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17101">painkiller-long-password-bo(17101)</ref>
    </refs>
    <vuln_soft>
      <prod name="painkiller" vendor="people_can_fly">
        <vers num="1.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1746" seq="2004-1746" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in PHP Code Snippet Library allows remote attackers to inject arbitrary web script or HTML via the (1) cat_select or (2) show parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109340580218818&amp;w=2">20040824 PHP Code Snippet Library Multiple Cross-Site Scripting (XSS)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11038">11038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17108">snippet-index-xss(17108)</ref>
    </refs>
    <vuln_soft>
      <prod name="php_code_snippet_library" vendor="php_code_snippet_library">
        <vers num="0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1747" seq="2004-1747" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in NetworkEverywhere NR041 running firmware 1.2 Release 03 allows remote attackers to inject arbitrary web script or HTML via the DHCP HOSTNAME option.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109344996523392&amp;w=2">20040825 bug found</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11046">11046</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17120">network-everywhere-dhcp-gain-access(17120)</ref>
    </refs>
    <vuln_soft>
      <prod name="nr041" vendor="network_everywhere">
        <vers num="1.2_release_03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1748" seq="2004-1748" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">NtRegmon before 6.12 allows local users to cause a denial of service (crash), while NtRegmon is running, via invalid pointers to hook functions such as ZwSetQueryValue.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109345177124374&amp;w=2">20040825 [NGSEC-2004-7] NtRegmon, local system denial of service.</ref>
      <ref source="MISC" url="http://www.ngsec.com/docs/advisories/NGSEC-2004-7.txt">http://www.ngsec.com/docs/advisories/NGSEC-2004-7.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11042">11042</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17106">ntregmon-registry-dos(17106)</ref>
    </refs>
    <vuln_soft>
      <prod name="regmon" vendor="sysinternals">
        <vers num="6.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1749" seq="2004-1749" published="2004-07-22" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Attack Mitigator IPS 5500 3.11.008, and possibly other versions, when configured in a one-armed routing configuration, allows remote attackers to cause a denial of service (CPU consumption) via a large number of HTTP requests.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109345253016318&amp;w=2">20040825 IRM 010: Top Layer Attack Mitigator IPS 5500 Denial of Service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11049" adv="1" patch="1">11049</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17125">am-ips5500-http-dos(17125)</ref>
    </refs>
    <vuln_soft>
      <prod name="attack_mitigator" vendor="toplayer">
        <vers num="5500_3.11.008"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1750" seq="2004-1750" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">RealVNC 4.0 and earlier allows remote attackers to cause a denial of service (crash) via a large number of connections to port 5900.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109346198700529&amp;w=2">20040825 RealVNC 4.0 DoS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11048">11048</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17123">realvnc-multiple-connections-dos(17123)</ref>
    </refs>
    <vuln_soft>
      <prod name="realvnc" vendor="vnc">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1751" seq="2004-1751" published="2004-08-26" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Ground Control II: Operation Exodus 1.0.0.7 and earlier allows remote servers to cause a denial of service (client or server crash) via a large packet, which generates a "Message too long" socket error that is treated as a critical error.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/gc2boom-adv.txt" adv="1" patch="1">http://aluigi.altervista.org/adv/gc2boom-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109357154602892&amp;w=2">20040826 Broadcast forced exit in Ground Control II 1.0.0.7</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011075" adv="1" patch="1">1011075</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11058" adv="1" patch="1">11058</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17130">ground-control-dos(17130)</ref>
    </refs>
    <vuln_soft>
      <prod name="ground_control_ii_operation_exodus" vendor="massive_entertainment">
        <vers num="1.0.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1752" seq="2004-1752" published="2004-08-24" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Gaucho 1.4 Build 145 allows remote attackers to execute arbitrary code via a POP3 email with a long Content-Type header.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109364123707953&amp;w=2">20040826 Gaucho v1.4 Build 145 Buffer Overflow</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011032" adv="1" patch="1">1011032</ref>
      <ref source="MISC" url="http://www.security.org.sg/vuln/gaucho140.html" adv="1" patch="1">http://www.security.org.sg/vuln/gaucho140.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11023" adv="1" patch="1">11023</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17090">gaucho-pop3-bo(17090)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1753" seq="2004-1753" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The Apple Java plugin, as used in Netscape 7.1 and 7.2, Mozilla 1.7.2, and Firefox 0.9.3 on MacOS X 10.3.5, when tabbed browsing is enabled, does not properly handle SetWindow(NULL) calls, which allows Java applets from one tab to draw to other tabs and facilitates phishing attacks that spoof tabs.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugzilla.mozilla.org/show_bug.cgi?id=162134">http://bugzilla.mozilla.org/show_bug.cgi?id=162134</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/373080">20040826 Netscape Navigator 7.2 failure to isolate browser tabs (was Re: Computer Network Defence Vulnerability Alert State)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/373232">20040827 Re: Netscape Navigator 7.2 failure to isolate browser tabs (was Re: Computer Network Defence Vulnerability Alert State)</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/373309">20040827 Re: Netscape Navigator 7.2 failure to isolate browser tabs (was Re: Computer Network Defence Vulnerability Alert State)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11059">11059</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17137">netscape-java-tab-spoofing(17137)</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.9.3"/>
      </prod>
      <prod name="mozilla" vendor="mozilla">
        <vers num="1.7.2"/>
      </prod>
      <prod name="navigator" vendor="netscape">
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1754" seq="2004-1754" published="2004-06-15" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The DNS proxy (DNSd) for multiple Symantec Gateway Security products allows remote attackers to poison the DNS cache via a malicious DNS server query response that contains authoritative or additional records.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://lists.virus.org/bugtraq-0406/msg00234.html" adv="1">20040615 Symantec Enterprise Firewall DNSD cache poisoning Vulnerability</ref>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2004.06.21.html" adv="1" patch="1">http://securityresponse.symantec.com/avcenter/security/Content/2004.06.21.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10557" adv="1" patch="1">10557</ref>
    </refs>
    <vuln_soft>
      <prod name="enterprise_firewall" vendor="symantec">
        <vers num="7.0.4" edition=":solaris"/>
        <vers num="7.0.4" edition=":windows_2000_nt"/>
        <vers num="8.0" edition=":solaris"/>
        <vers num="8.0" edition=":windows_2000_nt"/>
      </prod>
      <prod name="gateway_security" vendor="symantec">
        <vers num="5110_1.0"/>
        <vers num="5200_1.0"/>
        <vers num="5300_1.0"/>
        <vers num="5310_1.0"/>
        <vers num="5400_2.0"/>
        <vers num="5400_2.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1755" seq="2004-1755" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Web Services fat client for BEA WebLogic Server and Express 7.0 SP4 and earlier, when using 2-way SSL and multiple certificates to connect to the same URL, may use the incorrect identity after the first connection, which could allow users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_47.00.jsp" patch="1">http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_47.00.jsp</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/858990" adv="1">VU#858990</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9502" patch="1">9502</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15826">weblogic-multiple-connection-gain-access(15826)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1756" seq="2004-1756" published="2004-04-13" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">BEA WebLogic Server and WebLogic Express 8.1 SP2 and earlier, and 7.0 SP4 and earlier, when using 2-way SSL with a custom trust manager, may accept a certificate chain even if the trust manager rejects it, which allows remote attackers to spoof other users or servers.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_54.00.jsp" adv="1" patch="1">http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_54.00.jsp</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009765" adv="1" patch="1">1009765</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/566390" adv="1" patch="1">VU#566390</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10132" adv="1" patch="1">10132</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15862">weblogic-trust-certificate-spoofing(15862)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="7.0" edition=":express"/>
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0" edition="sp1:express"/>
        <vers num="7.0" edition="sp2:express"/>
        <vers num="7.0" edition="sp3:express"/>
        <vers num="7.0" edition="sp4:express"/>
        <vers num="7.0" edition="sp4:win32"/>
        <vers num="8.1" edition=":express"/>
        <vers num="8.1" edition=":win32"/>
        <vers num="8.1" edition="sp1:express"/>
        <vers num="8.1" edition="sp1:win32"/>
        <vers num="8.1" edition="sp2:express"/>
        <vers num="8.1" edition="sp2:win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1757" seq="2004-1757" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">BEA WebLogic Server and Express 8.1, SP1 and earlier, stores the administrator password in cleartext in config.xml, which allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_50.00.jsp" adv="1" patch="1">http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_50.00.jsp</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/350350" adv="1">VU#350350</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9501" patch="1">9501</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14957">weblogic-boot-password-disclosure(14957)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="6.1" edition=":express"/>
        <vers num="6.1" edition=":win32"/>
        <vers num="6.1" edition="sp1:express"/>
        <vers num="6.1" edition="sp1:win32"/>
        <vers num="6.1" edition="sp2:win32"/>
        <vers num="6.1" edition="sp3:express"/>
        <vers num="6.1" edition="sp3:win32"/>
        <vers num="6.1" edition="sp4:express"/>
        <vers num="6.1" edition="sp4:win32"/>
        <vers num="6.1" edition="sp5:express"/>
        <vers num="6.1" edition="sp5:win32"/>
        <vers num="6.1" edition="sp6:win32"/>
        <vers num="7.0" edition=":express"/>
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0" edition="sp1:express"/>
        <vers num="7.0" edition="sp1:win32"/>
        <vers num="7.0" edition="sp2:express"/>
        <vers num="7.0" edition="sp2:win32"/>
        <vers num="7.0" edition="sp3:express"/>
        <vers num="7.0" edition="sp3:win32"/>
        <vers num="7.0" edition="sp4:express"/>
        <vers num="7.0" edition="sp4:win32"/>
        <vers num="7.0" edition="sp5:express"/>
        <vers num="7.0" edition="sp5:win32"/>
        <vers num="8.1" edition=":express"/>
        <vers num="8.1" edition=":win32"/>
        <vers num="8.1" edition="sp1:express"/>
        <vers num="8.1" edition="sp1:win32"/>
        <vers num="8.1" edition="sp2:express"/>
        <vers num="8.1" edition="sp2:win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1758" seq="2004-1758" published="2004-04-13" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">BEA WebLogic Server and WebLogic Express version 8.1 up to SP2, 7.0 up to SP4, and 6.1 up to SP6 may store the database username and password for an untargeted JDBC connection pool in plaintext in config.xml, which allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_53.00.jsp" adv="1" patch="1">http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_53.00.jsp</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009764">1009764</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/920238" adv="1" patch="1">VU#920238</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10131" adv="1" patch="1">10131</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15860">bea-configxml-plaintext-password(15860)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="6.1" edition=":express"/>
        <vers num="6.1" edition=":win32"/>
        <vers num="6.1" edition="sp1:express"/>
        <vers num="6.1" edition="sp1:win32"/>
        <vers num="6.1" edition="sp2:express"/>
        <vers num="6.1" edition="sp2:win32"/>
        <vers num="6.1" edition="sp3:express"/>
        <vers num="6.1" edition="sp4:express"/>
        <vers num="6.1" edition="sp5:express"/>
        <vers num="6.1" edition="sp6"/>
        <vers num="7.0" edition=":express"/>
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0" edition="sp1:express"/>
        <vers num="7.0" edition="sp2:express"/>
        <vers num="7.0" edition="sp3:express"/>
        <vers num="7.0" edition="sp4:express"/>
        <vers num="7.0" edition="sp4:win32"/>
        <vers num="8.1" edition=":express"/>
        <vers num="8.1" edition=":win32"/>
        <vers num="8.1" edition="sp1:express"/>
        <vers num="8.1" edition="sp1:win32"/>
        <vers num="8.1" edition="sp2:express"/>
        <vers num="8.1" edition="sp2:win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1759" seq="2004-1759" published="2004-01-21" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Cisco voice products, when running the IBM Director Agent on IBM servers before OS 2000.2.6, allows remote attackers to cause a denial of service (CPU consumption) via arbitrary packets to TCP port 14247, as demonstrated using port scanning.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-066.shtml">O-066</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040121-voice.shtml" adv="1" patch="1">20040121 Voice Product Vulnerabilities on IBM Servers</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/721092" adv="1" patch="1">VU#721092</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9469" adv="1" patch="1">9469</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008814">1008814</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14901">ciscovoice-ibmservers-dos(14901)</ref>
    </refs>
    <vuln_soft>
      <prod name="emergency_responder" vendor="cisco">
        <vers num="1.1"/>
      </prod>
      <prod name="ip_call_center_express_enhanced" vendor="cisco">
        <vers num="3.0"/>
      </prod>
      <prod name="ip_call_center_express_standard" vendor="cisco">
        <vers num="3.0"/>
      </prod>
      <prod name="ip_interactive_voice_response" vendor="cisco">
        <vers num="3.0"/>
      </prod>
      <prod name="personal_assistant" vendor="cisco">
        <vers num="1.3(1)"/>
        <vers num="1.3(2)"/>
        <vers num="1.3(3)"/>
        <vers num="1.3(4)"/>
        <vers num="1.4(1)"/>
        <vers num="1.4(2)"/>
      </prod>
      <prod name="director_agent" vendor="ibm">
        <vers num="2.2"/>
        <vers num="3.11"/>
      </prod>
      <prod name="call_manager" vendor="cisco">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.1(2)"/>
        <vers num="3.1(3a)"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.3(3)"/>
        <vers num="4.0"/>
      </prod>
      <prod name="internet_service_node" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="mcs-7815-1000" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="mcs-7815i-2.0" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="mcs-7835i-2.4" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="mcs-7835i-3.0" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="x330" vendor="ibm">
        <vers num="8654"/>
        <vers num="8674"/>
      </prod>
      <prod name="x340" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="x342" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="x345" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="conference_connection" vendor="cisco">
        <vers num="1.1(1)"/>
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1760" seq="2004-1760" published="2004-01-21" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The default installation of Cisco voice products, when running the IBM Director Agent on IBM servers before OS 2000.2.6, does not require authentication, which allows remote attackers to gain administrator privileges by connecting to TCP port 14247.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-066.shtml">O-066</ref>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/cisco-sa-20040121-voice.shtml" adv="1" patch="1">20040121 Voice Product Vulnerabilities on IBM Servers</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/602734" adv="1" patch="1">VU#602734</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9468" adv="1" patch="1">9468</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008814">1008814</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14900">ciscovoice-ibmservers-admin-access(14900)</ref>
    </refs>
    <vuln_soft>
      <prod name="emergency_responder" vendor="cisco">
        <vers num="1.1"/>
      </prod>
      <prod name="ip_call_center_express_enhanced" vendor="cisco">
        <vers num="3.0"/>
      </prod>
      <prod name="ip_call_center_express_standard" vendor="cisco">
        <vers num="3.0"/>
      </prod>
      <prod name="ip_interactive_voice_response" vendor="cisco">
        <vers num="3.0"/>
      </prod>
      <prod name="personal_assistant" vendor="cisco">
        <vers num="1.3(1)"/>
        <vers num="1.3(2)"/>
        <vers num="1.3(3)"/>
        <vers num="1.3(4)"/>
        <vers num="1.4(1)"/>
        <vers num="1.4(2)"/>
      </prod>
      <prod name="director_agent" vendor="ibm">
        <vers num="2.2"/>
        <vers num="3.11"/>
      </prod>
      <prod name="call_manager" vendor="cisco">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.1(2)"/>
        <vers num="3.1(3a)"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.3(3)"/>
        <vers num="4.0"/>
      </prod>
      <prod name="internet_service_node" vendor="cisco">
        <vers num=""/>
      </prod>
      <prod name="mcs-7815-1000" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="mcs-7815i-2.0" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="mcs-7835i-2.4" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="mcs-7835i-3.0" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="x330" vendor="ibm">
        <vers num="8654"/>
        <vers num="8674"/>
      </prod>
      <prod name="x340" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="x342" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="x345" vendor="ibm">
        <vers num=""/>
      </prod>
      <prod name="conference_connection" vendor="cisco">
        <vers num="1.1(1)"/>
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1761" seq="2004-1761" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Ethereal 0.8.13 to 0.10.2 allows attackers to cause a denial of service (segmentation fault) via a malformed color filter file.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.ethereal.com/appnotes/enpa-sa-00013.html">http://www.ethereal.com/appnotes/enpa-sa-00013.html</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/695486">VU#695486</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-136.html">RHSA-2004:136</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15572">ethereal-colour-filter-dos(15572)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10013">oval:org.mitre.oval:def:10013</ref>
    </refs>
    <vuln_soft>
      <prod name="ethereal" vendor="ethereal_group">
        <vers num="0.8.13"/>
        <vers num="0.8.14"/>
        <vers num="0.8.15"/>
        <vers num="0.8.16"/>
        <vers num="0.8.17a"/>
        <vers num="0.8.18"/>
        <vers num="0.8.19"/>
        <vers num="0.8.20"/>
        <vers num="0.9.0"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.10"/>
        <vers num="0.9.11"/>
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14"/>
        <vers num="0.9.15"/>
        <vers num="0.9.16"/>
        <vers num="0.10.0"/>
        <vers num="0.10.0a"/>
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1762" seq="2004-1762" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in F-Secure Anti-Virus (FSAV) 4.52 for Linux before Hotfix 3 allows the Sober.D worm to bypass FASV.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-linux-hotfixes.shtml" patch="1">http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-linux-hotfixes.shtml</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/415734" adv="1" patch="1">VU#415734</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15432">fsecure-antivirus-protection-bypass(15432)</ref>
    </refs>
    <vuln_soft>
      <prod name="f-secure_anti-virus" vendor="f-secure">
        <vers num="4.50_hotfix_1" edition=":linux"/>
        <vers num="4.50_hotfix_2" edition=":linux"/>
        <vers num="4.51_hotfix_2" edition=":linux"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1763" seq="2004-1763" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in hsrun.exe for HAHTsite Scenario Server 5.1 Patch 06 (build 91) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long project name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108091662105032&amp;w=2">20040402 Buffer Overflow in HAHTsite Scenario Server 5.1</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/705958" adv="1">VU#705958</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10033" patch="1">10033</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15717">hahtsite-long-request-bo(15717)</ref>
    </refs>
    <vuln_soft>
      <prod name="hahtsite_scenario_server" vendor="haht_commerce">
        <vers num="5.1"/>
        <vers num="5.1_patch_1"/>
        <vers num="5.1_patch_2"/>
        <vers num="5.1_patch_3"/>
        <vers num="5.1_patch_4"/>
        <vers num="5.1_patch_5"/>
        <vers num="5.1_patch_6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1764" seq="2004-1764" published="2004-01-14" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in CDE libDtSvc on HP-UX B.11.00, B.11.04, B.11.11, and B.11.22 allows local users to gain root privileges via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-057.shtml" adv="1">O-057</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/406406" adv="1">VU#406406</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/6237" adv="1" patch="1">HPSBUX0401-308</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14828">hp-libdtsvc-bo(14828)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5789">oval:org.mitre.oval:def:5789</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.00"/>
        <vers num="11.4"/>
        <vers num="11.11"/>
        <vers num="11.22"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1765" seq="2004-1765" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Off-by-one buffer overflow in ModSecurity (mod_security) 1.7.4 for Apache 2.x, when SecFilterScanPost is enabled, allows remote attackers to execute arbitrary code via crafted POST requests.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107945597331370&amp;w=2">20040316 ModSecurity 1.7.4 for Apache 2.x remote off-by-one overflow</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/779438" adv="1">VU#779438</ref>
      <ref source="CONFIRM" url="http://www.modsecurity.org/">http://www.modsecurity.org/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9885" patch="1">9885</ref>
      <ref source="MISC" url="http://www.s-quadra.com/advisories/Adv-20040315.txt">http://www.s-quadra.com/advisories/Adv-20040315.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15489">mod-security-offbyone-bo(15489)</ref>
    </refs>
    <vuln_soft>
      <prod name="mod_security" vendor="mod_security">
        <vers num="1.7.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1766" seq="2004-1766" published="2004-01-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The default installation of NetScreen-Security Manager before Feature Pack 1 does not enable encryption for communication with devices running ScreenOS 5.0, which allows remote attackers to obtain sensitive information via sniffing.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.juniper.net/support/security/alerts/58290.txt">http://www.juniper.net/support/security/alerts/58290.txt</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/927630" adv="1">VU#927630</ref>
      <ref source="CONFIRM" url="http://www.kb.cert.org/vuls/id/CRDY-5VEU8N" adv="1">http://www.kb.cert.org/vuls/id/CRDY-5VEU8N</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9455" adv="1">9455</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14886">netscreen-information-disclosure(14886)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1767" seq="2004-1767" published="2004-12-31" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The kernel in Solaris 2.6, 7, 8, and 9 allows local users to gain privileges by loading arbitrary loadable kernel modules (LKM), possibly involving the modload function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57479-1" adv="1" patch="1">57479</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/702526" adv="1">VU#702526</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9477" patch="1">9477</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14917">solaris-kernel-module-gain-privilege(14917)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4532">oval:org.mitre.oval:def:4532</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="2.6"/>
        <vers num="7.0" edition=":x86"/>
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.7"/>
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1768" seq="2004-1768" published="2004-12-17" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The character converters in the Spamhunter and Language ID modules for Symantec Brightmail AntiSpam 6.0.1 before patch 132 allow remote attackers to cause a denial of service (crash) via messages with the ISO-8859-10 character set, which is not recognized by the converters.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.symantec.com/public/english_us_canada/products/sba/sba_60x/updates/p132_notes.htm" patch="1">ftp://ftp.symantec.com/public/english_us_canada/products/sba/sba_60x/updates/p132_notes.htm</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/697598" adv="1" patch="1">VU#697598</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18530">symantec-brightmail-spamhunter-dos(18530)</ref>
    </refs>
    <vuln_soft>
      <prod name="brightmail_antispam" vendor="symantec">
        <vers num="6.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1769" seq="2004-1769" published="2004-03-11" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The "Allow cPanel users to reset their password via email" feature in cPanel 9.1.0 build 34 and earlier, including 8.x, allows remote attackers to execute arbitrary code via the user parameter to resetpass.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107904890724201&amp;w=2">20040311 cPanel Secuirty Advisory CPANEL-2004:01-01</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/831534" adv="1">VU#831534</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/357064/2004-03-08/2004-03-14/0" adv="1">20040311 Cpanel 8.*.* have a problem ?</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9848" adv="1">9848</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15443">cpanel-resetpass-execute-commands(15443)</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="5.0"/>
        <vers num="5.3"/>
        <vers num="6.0"/>
        <vers num="6.2"/>
        <vers num="6.4"/>
        <vers num="6.4.1"/>
        <vers num="6.4.2"/>
        <vers num="6.4.2_stable_48"/>
        <vers num="7.0"/>
        <vers num="8.0"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1770" seq="2004-1770" published="2004-03-11" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The login page for cPanel 9.1.0, and possibly other versions, allows remote attackers to execute arbitrary code via shell metacharacters in the user parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107911581732035&amp;w=2">20040312 Cpanel 9.1.0 have a problem ?</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/831534" adv="1" patch="1">VU#831534</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9855" adv="1">9855</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15486">cpanel-login-execute-commands(15486)</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="5.0"/>
        <vers num="5.3"/>
        <vers num="6.0"/>
        <vers num="6.2"/>
        <vers num="6.4"/>
        <vers num="6.4.1"/>
        <vers num="6.4.2"/>
        <vers num="6.4.2_stable_48"/>
        <vers num="7.0"/>
        <vers num="8.0"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1771" seq="2004-1771" published="2004-11-30" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Scalable OGo (SOGo) 1.0 allows remote authenticated users to bypass intended permissions and view private appointments of other users.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugzilla.opengroupware.org/bugzilla/show_bug.cgi?id=1060" adv="1">http://bugzilla.opengroupware.org/bugzilla/show_bug.cgi?id=1060</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1013553" adv="1">1013553</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19820">ogo-permission-information-disclosure(19820)</ref>
    </refs>
    <vuln_soft>
      <prod name="scalable_ogo" vendor="open_group">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1772" seq="2004-1772" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows local users to execute arbitrary code via a long -o command line argument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="OPENPKG" url="http://marc.info/?l=bugtraq&amp;m=108137386310299&amp;w=2">OpenPKG-SA-2004.011</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-377.html">RHSA-2005:377</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/359639" patch="1">20040406 GNU Sharutils buffer overflow vulnerability.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10066" patch="1">10066</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2155" patch="1">FLSA:2155</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15759">sharutils-shar-bo(15759)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11722">oval:org.mitre.oval:def:11722</ref>
    </refs>
    <vuln_soft>
      <prod name="sharutils" vendor="gnu">
        <vers num="4.2"/>
        <vers num="4.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1773" seq="2004-1773" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in sharutils 4.2.1 and earlier may allow attackers to execute arbitrary code via (1) long output from wc to shar, or (2) unknown vectors in unshar.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200410-01.xml" adv="1" patch="1">GLSA-200410-01</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-377.html">RHSA-2005:377</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11298" patch="1">11298</ref>
      <ref source="FEDORA" url="https://bugzilla.fedora.us/show_bug.cgi?id=2155" patch="1">FLSA:2155</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11093">oval:org.mitre.oval:def:11093</ref>
    </refs>
    <vuln_soft>
      <prod name="sharutils" vendor="gnu">
        <vers num="4.2"/>
        <vers num="4.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1774" seq="2004-1774" published="2004-08-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the SDO_CODE_SIZE procedure of the MD2 package (MDSYS.MD2.SDO_CODE_SIZE) in Oracle 10g before 10.1.0.2 Patch 2 allows local users to execute arbitrary code via a long LAYER parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/025984.html" adv="1">20040902 [SHATTER Team Security Alert] Multiple vulnerabilities in Oracle Database Server</ref>
      <ref source="MISC" url="http://www.appsecinc.com/resources/alerts/oracle/2004-0001/">http://www.appsecinc.com/resources/alerts/oracle/2004-0001/</ref>
      <ref source="MISC" url="http://www.frsirt.com/exploits/20050413.OracleExploit.sql.php">http://www.frsirt.com/exploits/20050413.OracleExploit.sql.php</ref>
      <ref source="CONFIRM" url="http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf" adv="1">http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf</ref>
      <ref source="MISC" url="http://www.securiteam.com/securitynews/5CP010KE0W.html" adv="1" patch="1">http://www.securiteam.com/securitynews/5CP010KE0W.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/13145" adv="1">13145</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/20078">oracle-mdsysmd2sdocodesize-bo(20078)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="10.1.0.2"/>
      </prod>
      <prod name="oracle10g" vendor="oracle">
        <vers num="enterprise_10.1.0.2"/>
        <vers num="personal_10.1.0.2"/>
        <vers num="standard_10.1.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1775" seq="2004-1775" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml" adv="1" patch="1">20041008 Cisco IOS Software Multiple SNMP Community String Vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/645400" adv="1" patch="1">VU#645400</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/5030" patch="1">5030</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/6179">cisco-snmp-vacm(6179)</ref>
    </refs>
    <vuln_soft>
      <prod name="catos" vendor="cisco">
        <vers num="5.5"/>
        <vers num="6.1"/>
      </prod>
      <prod name="ios" vendor="cisco">
        <vers num="12.0da"/>
        <vers num="12.0db"/>
        <vers num="12.0dc"/>
        <vers num="12.0s"/>
        <vers num="12.0sc"/>
        <vers num="12.0sl"/>
        <vers num="12.0st"/>
        <vers num="12.0t"/>
        <vers num="12.0xa"/>
        <vers num="12.0xb"/>
        <vers num="12.0xc"/>
        <vers num="12.0xd"/>
        <vers num="12.0xe"/>
        <vers num="12.0xf"/>
        <vers num="12.0xg"/>
        <vers num="12.0xh"/>
        <vers num="12.0xi"/>
        <vers num="12.0xj"/>
        <vers num="12.0xk"/>
        <vers num="12.0xl"/>
        <vers num="12.0xm"/>
        <vers num="12.0xn"/>
        <vers num="12.0xp"/>
        <vers num="12.0xq"/>
        <vers num="12.0xr"/>
        <vers num="12.0xs"/>
        <vers num="12.0xu"/>
        <vers num="12.0xv"/>
        <vers num="12.0xw"/>
        <vers num="12.1"/>
        <vers num="12.1aa"/>
        <vers num="12.1cx"/>
        <vers num="12.1da"/>
        <vers num="12.1db"/>
        <vers num="12.1dc"/>
        <vers num="12.1e"/>
        <vers num="12.1ea"/>
        <vers num="12.1ec"/>
        <vers num="12.1ex"/>
        <vers num="12.1t"/>
        <vers num="12.1xa"/>
        <vers num="12.1xb"/>
        <vers num="12.1xc"/>
        <vers num="12.1xd"/>
        <vers num="12.1xe"/>
        <vers num="12.1xf"/>
        <vers num="12.1xg"/>
        <vers num="12.1xh"/>
        <vers num="12.1xi"/>
        <vers num="12.1xk"/>
        <vers num="12.1xl"/>
        <vers num="12.1xm"/>
        <vers num="12.1xp"/>
        <vers num="12.1xq"/>
        <vers num="12.1xr"/>
        <vers num="12.1xs"/>
        <vers num="12.1xt"/>
        <vers num="12.1xu"/>
        <vers num="12.1xv"/>
        <vers num="12.1xw"/>
        <vers num="12.1xx"/>
        <vers num="12.1xy"/>
        <vers num="12.1xz"/>
        <vers num="12.1ya"/>
        <vers num="12.1yb"/>
        <vers num="12.1yc"/>
        <vers num="12.1yd"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1776" seq="2004-1776" published="2001-02-28" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cisco IOS 12.1(3) and 12.1(3)T allows remote attackers to read and modify device configuration data via the cable-docsis read-write community string used by the Data Over Cable Service Interface Specification (DOCSIS) standard.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CISCO" url="http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml" adv="1" patch="1">20041008 Cisco IOS Software Multiple SNMP Community String Vulnerabilities</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/840665" adv="1" patch="1">VU#840665</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/6180">cisco-ios-cable-docsis(6180)</ref>
    </refs>
    <vuln_soft>
      <prod name="ios" vendor="cisco">
        <vers num="12.1(3)"/>
        <vers num="12.1(3)t"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1777" seq="2004-1777" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">A "range check error" in Skype for Windows before 0.98.0.28 allows local and remote attackers to cause a denial of service (application crash) via long command line arguments or a long callto:// URL, a different vulnerability than CVE-2004-1114.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://lists.virus.org/bugtraq-0406/msg00221.html">20040615 Skype URI callto username overflow</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010490">1010490</ref>
      <ref source="CONFIRM" url="http://www.skype.com/security/ssa-2004-01.html" patch="1">http://www.skype.com/security/ssa-2004-01.html</ref>
    </refs>
    <vuln_soft>
      <prod name="skype" vendor="skype_technologies">
        <vers num="0.98.0.04"/>
        <vers num="0.98.0.27" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1778" seq="2004-1778" published="2004-12-22" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Skype 0.92.0.12 and 1.0.0.1 for Linux, and possibly other versions, creates the /usr/share/skype/lang directory with world-writable permissions, which allows local users to modify language files and possibly conduct social engineering or other attacks.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110374568916303&amp;w=2">20041222 Permission problem in Skype BETA for linux</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110868557905786&amp;w=2">20050216 Re: Permission problem in Skype BETA for linux</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12081" adv="1">12081</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18644">skype-lang-insecure-permissions(18644)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1779" seq="2004-1779" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in board.php for ThWboard before beta 2.84 allows remote attackers to inject arbitrary web script or HTML via the lastvisited parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/thwb/thwb/board.php?r1=1.11&amp;r2=1.12" patch="1">http://cvs.sourceforge.net/viewcvs.py/thwb/thwb/board.php?r1=1.11&amp;r2=1.12</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008617" patch="1">1008617</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=207893">http://sourceforge.net/project/shownotes.php?release_id=207893</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9367" patch="1">9367</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14143">thwboard-board-xss(14143)</ref>
    </refs>
    <vuln_soft>
      <prod name="thwboard_beta" vendor="thwboard">
        <vers num="2.8"/>
        <vers num="2.81"/>
        <vers num="2.82"/>
        <vers num="2.83"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1780" seq="2004-1780" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Info Touch Surfnet kiosk allows local users to deposit extra time into Internet kiosk accounts via repeated authentication attempts.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9347">9347</ref>
    </refs>
    <vuln_soft>
      <prod name="surfnet" vendor="info_touch">
        <vers num="1.31"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1781" seq="2004-1781" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Info Touch Surfnet kiosk allows local users to crash Surfnet and access the underlying operating system via the CMD_CREDITCARD_CHARGE command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9348">9348</ref>
    </refs>
    <vuln_soft>
      <prod name="surfnet" vendor="info_touch">
        <vers num="1.31"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1782" seq="2004-1782" published="2004-12-31" modified="2008-09-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">athenareg.php in Athena Web Registration allows remote attackers to execute arbitrary commands via shell metacharacters in the pass parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9349">9349</ref>
    </refs>
    <vuln_soft>
      <prod name="athena_web_registration" vendor="david_maciejak">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1783" seq="2004-1783" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Net2Soft Flash FTP Server 1.0 allows remote attackers to read and create arbitrary files via a /.. (slash dot dot).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008588">1008588</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5FP051FBPQ.html">http://www.securiteam.com/windowsntfocus/5FP051FBPQ.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9350">9350</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1784" seq="2004-1784" published="2004-01-03" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the web server of Webcam Watchdog 3.63 allows remote attackers to execute arbitrary code via a long HTTP GET request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.elitehaven.net/webcamwatchdog.txt">http://www.elitehaven.net/webcamwatchdog.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/348818" adv="1">20040103 Webcam Watchdog Stack Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9351" adv="1">9351</ref>
      <ref source="MISC" url="http://www.webcamsoft.com/en/watchdog_h.html">http://www.webcamsoft.com/en/watchdog_h.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14131">webcam-watchdog-get-bo(14131)</ref>
    </refs>
    <vuln_soft>
      <prod name="webcam_watchdog" vendor="webcam_corp">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="3.63"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1785" seq="2004-1785" published="2004-01-03" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in calendar.php for Invision Power Board 1.3 allows remote attackers to execute arbitrary SQL commands via the m parameter, which sets the $this->chosen_month variable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/348821" adv="1">20040103 [SCSA-025] Invision Power Board SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9353" adv="1" patch="1">9353</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008589">1008589</ref>
    </refs>
    <vuln_soft>
      <prod name="invision_board" vendor="invision_power_services">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1786" seq="2004-1786" published="2004-01-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">PortalApp places user credentials under the web root with insufficient access control, which allows remote attackers to gain access to sensitive information via a direct request to 8275.mdb.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008627" adv="1">1008627</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9354" adv="1">9354</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14169">portalapp-url-access-database(14169)</ref>
    </refs>
    <vuln_soft>
      <prod name="portalapp" vendor="iatek">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1787" seq="2004-1787" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in PostCalendar 4.0.0 allows remote attackers to execute arbitrary SQL commands via search queries.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://news.postnuke.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=2537" patch="1">http://news.postnuke.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=2537</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008621" patch="1">1008621</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9372" patch="1">9372</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14111">postcalendar-search-sql-injection(14111)</ref>
    </refs>
    <vuln_soft>
      <prod name="postcalendar" vendor="postnuke_software_foundation">
        <vers num="4.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1788" seq="2004-1788" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ASP-Nuke 1.3 and earlier places user credentials under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to main.mdb.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9355">9355</ref>
    </refs>
    <vuln_soft>
      <prod name="asp-nuke" vendor="asp-nuke">
        <vers num="1.0"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1789" seq="2004-1789" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the web management interface in ZyWALL 10 4.07 allows remote attackers to inject arbitrary web script or HTML via the rpAuth_1 page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008644">1008644</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/349085">20040106 ZyXEL10 OF ZyWALL Series Router Cross Site Scripting Vulnerabillity</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9373">9373</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14163">zywall-xss(14163)</ref>
    </refs>
    <vuln_soft>
      <prod name="zywall10" vendor="zyxel">
        <vers num="3.20_wa0"/>
        <vers num="3.20_wa1"/>
        <vers num="3.24_wa0"/>
        <vers num="3.24_wa1"/>
        <vers num="3.24_wa2"/>
        <vers num="3.50_wa1"/>
        <vers num="3.50_wa2"/>
        <vers num="4.07"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1790" seq="2004-1790" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the web management interface in Edimax AR-6004 ADSL Routers allows remote attackers to inject arbitrary web script or HTML via the URL.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008643">1008643</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/349089">20040106 EDIMAX AR-6004 Full Rate ADSL Router Cross Site Scripting Vulnerabillity</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9374">9374</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14165">edimax-ar6004-xss(14165)</ref>
    </refs>
    <vuln_soft>
      <prod name="full_rate_adsl_router" vendor="edimax">
        <vers num="ar_6004"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1791" seq="2004-1791" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The web management interface in Edimax AR-6004 ADSL Routers uses a default administrator name and password, which also appear as the default login text for the management interface, which allows remote attackers to gain access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008643">1008643</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/349089">20040106 EDIMAX AR-6004 Full Rate ADSL Router Cross Site Scripting Vulnerabillity</ref>
    </refs>
    <vuln_soft>
      <prod name="full_rate_adsl_router" vendor="edimax">
        <vers num="ar_6004"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1792" seq="2004-1792" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">swnet.dll in YaSoft Switch Off 2.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a long packet with two CRLF sequences to the service management port (TCP 8000).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008581">1008581</ref>
      <ref source="MISC" url="http://www.elitehaven.net/switchoff.txt">http://www.elitehaven.net/switchoff.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/348693">20040102 Switch Off Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9339">9339</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14123">switch-off-swnet-dos(14123)</ref>
    </refs>
    <vuln_soft>
      <prod name="switch_off" vendor="yatsoft">
        <vers num="0.7"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.5.1"/>
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="1.8"/>
        <vers num="1.9"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1793" seq="2004-1793" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in swnet.dll in YaSoft Switch Off 2.3 and earlier allows remote authenticated users to execute arbitrary code via a long message parameter in a SendMsg action to action.htm.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008581">1008581</ref>
      <ref source="MISC" url="http://www.elitehaven.net/switchoff.txt">http://www.elitehaven.net/switchoff.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/348693">20040102 Switch Off Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9340">9340</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14124">switch-off-swnet-bo(14124)</ref>
    </refs>
    <vuln_soft>
      <prod name="switch_off" vendor="yatsoft">
        <vers num="0.7"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.5.1"/>
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="1.8"/>
        <vers num="1.9"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1794" seq="2004-1794" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the VCard4J Toolkit allows remote attackers to inject arbitrary web script or HTML via the NICKNAME tag in a vCard.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008582" patch="1">1008582</ref>
      <ref source="BUGTRAQ" url="http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2004-01/0006.html">20040101 Possible XSS vuln in VCard4J</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9343">9343</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14120">vcard4j-nickname-xss(14120)</ref>
    </refs>
    <vuln_soft>
      <prod name="vcard4j" vendor="vcard4j">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1795" seq="2004-1795" published="2004-12-31" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Info Touch Surfnet kiosk allows local users to access the underlying filesystem via a 'file://' URI.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9346">9346</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1796" seq="2004-1796" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in HotNews 0.7.2 and earlier allows remote attackers to execute arbitrary PHP code via the (1) config[header] parameter to hotnews-engine.inc.php3 or (2) config[incdir] parameter to hnmain.inc.php3.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008608" patch="1">1008608</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=342594" patch="1">http://sourceforge.net/forum/forum.php?forum_id=342594</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/348840" patch="1">20040104 HotNews arbitary file inclusion</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9357" patch="1">9357</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14140">hotnews-php-file-include(14140)</ref>
    </refs>
    <vuln_soft>
      <prod name="hotnews" vendor="hotnews">
        <vers num="0.5.3"/>
        <vers num="0.6.0"/>
        <vers num="0.6.0_pre"/>
        <vers num="0.6.1"/>
        <vers num="0.7.0"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1797" seq="2004-1797" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php for FreznoShop 1.3.0 RC1 and earlier allows remote attackers to inject arbitrary web script or HTML via the search parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008606" patch="1">1008606</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9359">9359</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14147">freznoshop-searchphp-xss(14147)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1798" seq="2004-1798" published="2004-12-31" modified="2017-07-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">RealOne player 6.0.11.868 allows remote attackers to execute arbitrary script in the "My Computer" zone via a Synchronized Multimedia Integration Language (SMIL) presentation with a "file:javascript:" URL, which is executed in the security context of the previously loaded URL, a different vulnerability than CVE-2003-0726.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008647" adv="1">1008647</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/349086" adv="1">20040107 RealNetworks fails to address Cross-Site Scripting in RealOne Player</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9378" adv="1" patch="1">9378</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14168" adv="1">realoneplayer-smil-xss(14168)</ref>
    </refs>
    <vuln_soft>
      <prod name="realone_enterprise_desktop" vendor="realnetworks">
        <vers num="6.0.11.774"/>
      </prod>
      <prod name="realone_player" vendor="realnetworks">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="6.0.10.505"/>
        <vers num="6.0.11.818"/>
        <vers num="6.0.11.830"/>
        <vers num="6.0.11.841"/>
        <vers num="6.0.11.853"/>
        <vers num="6.0.11.868"/>
      </prod>
      <prod name="realplayer" vendor="realnetworks">
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1799" seq="2004-1799" published="2004-12-31" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PF in certain OpenBSD versions, when stateful filtering is enabled, does not limit packets for a session to the original interface, which allows remote attackers to bypass intended packet filters via spoofed packets to other interfaces.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=107331321302113&amp;w=2">20040105 firewall security bug?</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9362">9362</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1800" seq="2004-1800" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Sysbotz SimpleData 4.0.1 and possibly earlier versions allows remote attackers to gain access via a crafted URL and a certain cookie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008695">1008695</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9380">9380</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14206">simpledata-gain-unauth-access(14206)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1801" seq="2004-1801" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in PWebServer 0.3.3 allows remote attackers to read arbitrary files via a .. (dot dot) in the URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107876388211413&amp;w=2">20040308 directory traversal in PWebServer 0.3.3</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/PWebServer0.3.3-adv.txt">http://www.autistici.org/fdonato/advisory/PWebServer0.3.3-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9817" patch="1">9817</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15404">pwebserver-dotdot-directory-traversal(15404)</ref>
    </refs>
    <vuln_soft>
      <prod name="pwebserver_web_server" vendor="pwebserver">
        <vers num="0.3.0"/>
        <vers num="0.3.2"/>
        <vers num="0.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1802" seq="2004-1802" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Chat Anywhere 2.72 and earlier allows remote attackers to hide their IP address by using %00 before the nickname, which causes the IP address to be displayed as $IP$ on the administration web page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/chatany-ghost-adv.txt">http://aluigi.altervista.org/adv/chatany-ghost-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107885946220895&amp;w=2">20040309 Ghost users in Chat Anywhere 2.72</ref>
      <ref source="CONFIRM" url="http://www.lionmax.com/chatanywhere.htm" patch="1">http://www.lionmax.com/chatanywhere.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9823">9823</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15416">chat-anywhere-admin-bypass(15416)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1804" seq="2004-1804" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">wMCam server 2.1.348 allows remote attackers to cause a denial of service (no new connections) via multiple malformed HTTP requests without the GET command.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107894337524376&amp;w=2">20040310 DoS in wMCam server 2.1.348</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9839">9839</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15431">wmcam-multiple-connections-dos(15431)</ref>
    </refs>
    <vuln_soft>
      <prod name="wmcam_server" vendor="invicta">
        <vers num="2.1.348"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1805" seq="2004-1805" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in games using the Epic Games Unreal Engine 436 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in class names.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/unrfs-adv.txt">http://aluigi.altervista.org/adv/unrfs-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107893764406905&amp;w=2">20040310 Format string bug in EpicGames Unreal engine</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107902755204583&amp;w=2">20040311 Re: Format string bug in EpicGames Unreal engine</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9840" patch="1">9840</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15430">ut-class-format-string(15430)</ref>
    </refs>
    <vuln_soft>
      <prod name="unreal_engine" vendor="epic_games">
        <vers num="226f"/>
        <vers num="433"/>
        <vers num="436"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1806" seq="2004-1806" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.cfm in CFWebstore 5.0 allows remote attackers to execute SQL commands via the (1) category_id, (2) product_id, or (3) feature_id parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107911090901744&amp;w=2">20040312 Dogpatch Software CFWebstore 5.0 shopping cart software multiple security vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009403">1009403</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9854">9854</ref>
      <ref source="MISC" url="http://www.s-quadra.com/advisories/Adv-20040312.txt" adv="1">http://www.s-quadra.com/advisories/Adv-20040312.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15447">cfwebstore-index-sql-injection(15447)</ref>
    </refs>
    <vuln_soft>
      <prod name="cfwebstore" vendor="dogpatch_software">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1807" seq="2004-1807" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.cfm in CFWebstore 5.0 allows remote attackers to inject arbitrary web script or HTML via the URL.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107911090901744&amp;w=2">20040312 Dogpatch Software CFWebstore 5.0 shopping cart software multiple security vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009403">1009403</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9856">9856</ref>
      <ref source="MISC" url="http://www.s-quadra.com/advisories/Adv-20040312.txt" adv="1">http://www.s-quadra.com/advisories/Adv-20040312.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15454">cfwebstore-url-xss(15454)</ref>
    </refs>
    <vuln_soft>
      <prod name="cfwebstore" vendor="dogpatch_software">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1808" seq="2004-1808" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Extcompose in metamail does not verify the output file before writing to it, which allows local users to overwrite arbitrary files via a symlink attack.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107910934926062&amp;w=2">20040312 Metamail 'extcompose' script Symlink Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9850">9850</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15460">metamail-extcompose-symlink(15460)</ref>
    </refs>
    <vuln_soft>
      <prod name="metamail" vendor="metamail_corporation">
        <vers num="2.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1809" seq="2004-1809" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in phpBB 2.0.6d and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) postdays parameter to viewtopic.php or (2) topicdays parameter to viewforum.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107920498205324&amp;w=2">20040313 phpBB 2.0.6d &amp;&amp; Earlier Security Issues</ref>
      <ref source="CONFIRM" url="http://www.phpbb.com/support/documents.php?mode=changelog#206">http://www.phpbb.com/support/documents.php?mode=changelog#206</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9865" patch="1">9865</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9866" patch="1">9866</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15464">phpbb-viewforum-viewtopic-xss(15464)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb_group">
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.6c"/>
        <vers num="2.0.6d"/>
        <vers num="2.0_rc1"/>
        <vers num="2.0_rc2"/>
        <vers num="2.0_rc3"/>
        <vers num="2.0_rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1810" seq="2004-1810" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Javascript engine in Opera 7.23 allows remote attackers to cause a denial of service (crash) by creating a new Array object with a large size value, then writing into that array.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107936810909082&amp;w=2">20040314 Opera Array Allocation Managment Exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9869">9869</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15413">safari-array-dos(15413)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="7.22"/>
        <vers num="7.23"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1811" seq="2004-1811" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The SSL HTTP Server in HP Web-enabled Management Software 5.0 through 5.92, with anonymous access enabled, allows remote attackers to compromise the trusted certificates by uploading their own certificates.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0057.html">20040315 Immunity Advisory: Compaq Web Management vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107936784030214&amp;w=2">20040314 Multiple Immunity Advisories</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-100.shtml" patch="1">O-100</ref>
      <ref source="MISC" url="http://www.immunitysec.com/downloads/hp_http.sxw.pdf" adv="1">http://www.immunitysec.com/downloads/hp_http.sxw.pdf</ref>
      <ref source="COMPAQ" url="http://www.securityfocus.com/advisories/6448">SSRT4679</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9859" patch="1">9859</ref>
      <ref source="HP" url="http://www.tru64.org/stories.php?story=04/03/12/0204078" patch="1">HPSBMA01003</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15466">hp-http-certificate-upload(15466)</ref>
    </refs>
    <vuln_soft>
      <prod name="ssl_http_server" vendor="hp">
        <vers num="5.0"/>
        <vers num="5.92"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1812" seq="2004-1812" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple stack-based buffer overflows in Agent Common Services (1) cam.exe and (2) awservices.exe in Unicenter TNG 2.4 allow remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.ca.com/CAproducts/unicenter/CCS31/nt/qi52764/QI52764.DB0" adv="1">ftp://ftp.ca.com/CAproducts/unicenter/CCS31/nt/qi52764/QI52764.DB0</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107936784030214&amp;w=2">20040314 Multiple Immunity Advisories</ref>
      <ref source="VULNWATCH" url="http://www.derkeiler.com/Mailing-Lists/VulnWatch/2004-03/0008.html">20040315 Immunity Advisory: Computer Associates Unicenter TNG</ref>
      <ref source="MISC" url="http://www.immunitysec.com/downloads/awservices.sxw.pdf" adv="1">http://www.immunitysec.com/downloads/awservices.sxw.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9863">9863</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15472">unicentertng-awservices-cam-bo(15472)</ref>
    </refs>
    <vuln_soft>
      <prod name="unicenter_tng" vendor="ca">
        <vers num="2.4"/>
        <vers num="2.4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1813" seq="2004-1813" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">VocalTec VGW4/8 Gateway 8.0 allows remote attackers to bypass authentication via an HTTP request to home.asp with a trailing slash (/).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107936739131657&amp;w=2">20040315 VocalTec Gateway 8 Reverse Directory Transversal + Authorization Bypass</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9876">9876</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15476">vgw48-gateway-directory-traversal(15476)</ref>
    </refs>
    <vuln_soft>
      <prod name="vgw4_8_telephony_gateway" vendor="vocaltec">
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1814" seq="2004-1814" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in VocalTec VGW4/8 Gateway 8.0 allows remote attackers to read protected files via .. (dot dot) sequences in an HTTP request, as demonstrated using home.asp.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107936739131657&amp;w=2">20040315 VocalTec Gateway 8 Reverse Directory Transversal + Authorization Bypass</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9876">9876</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15476">vgw48-gateway-directory-traversal(15476)</ref>
    </refs>
    <vuln_soft>
      <prod name="vgw4_8_telephony_gateway" vendor="vocaltec">
        <vers num="8.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1815" seq="2004-1815" published="2004-03-15" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in ColdFusion MX 6.0 and 6.1, and JRun 4.0, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107936690702515&amp;w=2">20040315 Multiple Vendor SOAP server array DoS</ref>
      <ref source="CONFIRM" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-04.html" adv="1" patch="1">http://www.macromedia.com/devnet/security/security_zone/mpsb04-04.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9877" adv="1" patch="1">9877</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15473">soap-array-dos(15473)</ref>
    </refs>
    <vuln_soft>
      <prod name="coldfusion" vendor="macromedia">
        <vers num="6.0"/>
        <vers num="6.1"/>
      </prod>
      <prod name="jrun" vendor="macromedia">
        <vers num="4.0" edition="sp1"/>
        <vers num="4.0" edition="sp1a"/>
        <vers num="4.0_build_61650"/>
      </prod>
      <prod name="one_application_server" vendor="sun">
        <vers num="7.0" edition=":platform"/>
        <vers num="7.0" edition=":standard"/>
        <vers num="7.0" edition="ur1:platform"/>
        <vers num="7.0" edition="ur1:standard"/>
        <vers num="7.0" edition="ur2:platform"/>
        <vers num="7.0" edition="ur2:standard"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1816" seq="2004-1816" published="2004-03-15" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Sun Java System Application Server 7.0 Update 2 and earlier, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107936690702515&amp;w=2">20040315 Multiple Vendor SOAP server array DoS</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57517-1" adv="1" patch="1">57517</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201713-1">201713</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9877" adv="1" patch="1">9877</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15473">soap-array-dos(15473)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1817" seq="2004-1817" published="2004-03-15" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in modules.php in Php-Nuke 7.1.0 allows remote attackers to inject arbitrary web script or HTML via the (1) Your Name field, (2) e-mail field, (3) nicname field, (4) fname parameter, (5) ratenum parameter, or (6) search field.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107937752811633&amp;w=2">20040315 [waraxe-2004-SA#005 - XSS in Php-Nuke 7.1.0 - part 2]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9879" adv="1">9879</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15491">phpnuke-multiple-parameters-xss(15491)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1818" seq="2004-1818" published="2004-03-15" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in nmimage.php in 4nalbum 0.92 for PHP-Nuke 6.5 through 7.0 allows remote attackers to execute arbitrary script as other users by injecting arbitrary script into the z parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107937780222514&amp;w=2">20040315 [waraxe-2004-SA#006 - Multiple vulnerabilities in 4nalbum module for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9881" adv="1">9881</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15497">4nalbum-nmimagephp-xss(15497)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1819" seq="2004-1819" published="2004-03-15" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">4nalbum 0.92 for PHP-Nuke 6.5 through 7.0 allows remote attackers to obtain sensitive information via a direct request to displaycategory.php, which reveals the path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107937780222514&amp;w=2">20040315 [waraxe-2004-SA#006 - Multiple vulnerabilities in 4nalbum module for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9881" adv="1">9881</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15493">4nalbum-error path-disclosure(15493)</ref>
    </refs>
    <vuln_soft>
      <prod name="4nalbum_module" vendor="warpspeed">
        <vers num="0.92"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1820" seq="2004-1820" published="2004-03-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in displaycategory.php in 4nalbum 0.92 for PHP-Nuke 6.5 through 7.0 allows remote attackers to execute arbitrary PHP code by modifying the basepath parameter to reference a URL on a remote web server that contains fileFunctions.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107937780222514&amp;w=2">20040315 [waraxe-2004-SA#006 - Multiple vulnerabilities in 4nalbum module for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9881" adv="1">9881</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15496">4nalbum-displaycategory-file-include(15496)</ref>
    </refs>
    <vuln_soft>
      <prod name="4nalbum_module" vendor="warpspeed">
        <vers num="0.92"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1821" seq="2004-1821" published="2004-03-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in 4nalbum 0.92 for PHP-Nuke 6.5 through 7.0 allows remote attackers to gain privileges or perform unauthorized database operations via the gid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107937780222514&amp;w=2">20040315 [waraxe-2004-SA#006 - Multiple vulnerabilities in 4nalbum module for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9881" adv="1">9881</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15498">4nalbum-modulesphp-SQL-injection(15498)</ref>
    </refs>
    <vuln_soft>
      <prod name="4nalbum_module" vendor="warpspeed">
        <vers num="0.92"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1822" seq="2004-1822" published="2004-03-15" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Phorum 3.1 through 5.0.3 beta allow remote attackers to inject arbitrary web script or HTML via the (1) HTTP_REFERER parameter to login.php, (2) HTTP_REFERER parameter to register.php, or (3) target parameter to profile.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107939479713136&amp;w=2">20040315 Phorum 5.0.3 Beta &amp;&amp; Earlier XSS Issues</ref>
      <ref source="CONFIRM" url="http://phorum.org/changelog.txt" adv="1">http://phorum.org/changelog.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009433">1009433</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9882" adv="1" patch="1">9882</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15494">phorum-register-xss(15494)</ref>
    </refs>
    <vuln_soft>
      <prod name="phorum" vendor="phorum">
        <vers num="3.1"/>
        <vers num="3.1.1"/>
        <vers num="3.1.1_pre"/>
        <vers num="3.1.1_rc2"/>
        <vers num="3.1.1a"/>
        <vers num="3.1.2"/>
        <vers num="3.2"/>
        <vers num="3.2.2"/>
        <vers num="3.2.3"/>
        <vers num="3.2.3a"/>
        <vers num="3.2.3b"/>
        <vers num="3.2.4"/>
        <vers num="3.2.5"/>
        <vers num="3.2.6"/>
        <vers num="3.2.7"/>
        <vers num="3.2.8"/>
        <vers num="3.3.1"/>
        <vers num="3.3.1a"/>
        <vers num="3.3.2"/>
        <vers num="3.3.2a"/>
        <vers num="3.3.2b3"/>
        <vers num="3.4"/>
        <vers num="3.4.1"/>
        <vers num="3.4.2"/>
        <vers num="3.4.3"/>
        <vers num="3.4.4"/>
        <vers num="3.4.5"/>
        <vers num="3.4.6"/>
        <vers num="5.0.3_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1823" seq="2004-1823" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Jelsoft vBulletin 2.0 beta 3 through 3.0 can4 allows remote attackers to inject arbitrary web script or HTML via the (1) page parameter to showthread.php or (2) order parameter to forumdisplay.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107945556112453&amp;w=2">20040316 JelSoft vBulletin Multiple XSS Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009440">1009440</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9888">9888</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9889">9889</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15495">vbulletin-showthread-xss(15495)</ref>
    </refs>
    <vuln_soft>
      <prod name="vbulletin" vendor="jelsoft">
        <vers num="3.0.0"/>
        <vers num="3.0.0_can4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1824" seq="2004-1824" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Jelsoft vBulletin before 3.0 allows remote attackers to inject arbitrary web script or HTML via the what parameter to memberlist.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2002-11/0276.html">20021121 XSS bug in vBulletin</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107945556112453&amp;w=2">20040316 JelSoft vBulletin Multiple XSS Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009440">1009440</ref>
      <ref source="XF" url="http://www.iss.net/security_center/static/10679.php">vbulletin-memberlist-xss(10679)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/6226">6226</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9887">9887</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15495">vbulletin-showthread-xss(15495)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1825" seq="2004-1825" published="2004-03-16" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Mambo Open Source 4.5 stable 1.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) return or (2) mos_change_template parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107945576020593&amp;w=2">20040316 Mambo Open Source Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9890" adv="1">9890</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15499">mambo-return-moschangetemplate-xss(15499)</ref>
    </refs>
    <vuln_soft>
      <prod name="mambo_open_source" vendor="mambo">
        <vers num="4.5_1.0.0"/>
        <vers num="4.5_1.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1826" seq="2004-1826" published="2004-03-16" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Mambo Open Source 4.5 stable 1.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107945576020593&amp;w=2">20040316 Mambo Open Source Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9891" adv="1">9891</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15500">mambo-id-sql-injection(15500)</ref>
    </refs>
    <vuln_soft>
      <prod name="mambo_open_source_4.5" vendor="mambo">
        <vers num="1.0.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.3beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1827" seq="2004-1827" published="2004-03-15" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in YaBB 1 Gold(SP1.3) and YaBB SE 1.5.1 Final allows remote attackers to inject arbitrary web script via the background:url property in (1) glow or (2) shadow tags.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107936800226430&amp;w=2">20040314 YaBB/YaBBse Cross Site Scripting Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107948064923981&amp;w=2">20040316 RE: YaBB/YaBBse Cross Site Scripting Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009427">1009427</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9873" adv="1" patch="1">9873</ref>
      <ref source="CONFIRM" url="http://www.yabbforum.com/community/YaBB.pl?board=general;action=display;num=1093133233">http://www.yabbforum.com/community/YaBB.pl?board=general;action=display;num=1093133233</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15488">yabb-glow-shadow-xss(15488)</ref>
    </refs>
    <vuln_soft>
      <prod name="simple_machines_smf" vendor="simple_machines">
        <vers num="1.0_b"/>
      </prod>
      <prod name="yabb" vendor="yabb">
        <vers num="1.5.1" edition=":second_edition"/>
        <vers num="1_gold_-_sp_1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1828" seq="2004-1828" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Vcard 2.9 and possibly other versions does not require authorization to run uninstall.php, which could allow remote attackers to uninstall Vcard and delete database tables via a direct request to uninstall.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107957312531199&amp;w=2">20040317 Vcard 2.8 uninstall script problem</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9910" patch="1">9910</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15522">vcard-uninstall-delete-table(15522)</ref>
    </refs>
    <vuln_soft>
      <prod name="vcard" vendor="belchior_foundry">
        <vers num="2.8"/>
        <vers num="2.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1829" seq="2004-1829" published="2004-03-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in error.php in Gijza.net Error Manager 2.1 for PHP-Nuke 6.0 allow remote attackers to inject arbitrary web script or HTML via the (1) pagetitle or (2) error parameters, or (3) certain parameters in the error log.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107963064317560&amp;w=2">20040318 [waraxe-2004-SA#010 - Multiple vulnerabilities in Error Manager</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9911" adv="1">9911</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15529">errormanager-error-xss(15529)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15530">errormanager-error-command-execution(15530)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke_module" vendor="error_manager">
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1830" seq="2004-1830" published="2004-03-18" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">error.php in Error Manager 2.1 for PHP-Nuke 6.0 allows remote attackers to obtain sensitive information via an invalid (1) language, (2) newlang, or (3) lang parameter, which leaks the pathname in a PHP error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107963064317560&amp;w=2">20040318 [waraxe-2004-SA#010 - Multiple vulnerabilities in Error Manager</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9911">9911</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15524">errormanager-error-path-disclosure(15524)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1831" seq="2004-1831" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Chrome 1.2.0.0 and earlier allows remote attackers to cause a denial of service (crash) via a packet with a large length value, which leads to a null dereference or out-of-bounds read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/chrome-boom-adv.txt">http://aluigi.altervista.org/adv/chrome-boom-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107964719614657&amp;w=2">20040318 Chrome 1.2.0.0 server crash</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9898">9898</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15535">chrome-malloc-memcpy-dos(15535)</ref>
    </refs>
    <vuln_soft>
      <prod name="chrome" vendor="techland">
        <vers num="1.2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1832" seq="2004-1832" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the GUI admin service in Mac OS X Server 10.3 allows remote attackers to cause a denial of service (crash and restart) via a large amount of data to TCP port 660.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107965605008575&amp;w=2">20040318 mac osx- admin service buffer overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107971225327629&amp;w=2">20040319 Re: mac osx- admin service buffer overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9914">9914</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15533">macos-admin-servicebo(15533)</ref>
    </refs>
    <vuln_soft>
      <prod name="mac_os_x_server" vendor="apple">
        <vers num="10.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1833" seq="2004-1833" published="2004-03-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The admin.ib file in Borland Interbase 7.1 for Linux has default world writable permissions, which allows local users to gain database administrative privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009500" adv="1" patch="1">1009500</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=80&amp;type=vulnerabilities&amp;flashstatus=true" adv="1">20040319 Borland Interbase admin.ib Administrative Access Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9929" adv="1" patch="1">9929</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15546">interbase-admin-gain-privileges(15546)</ref>
    </refs>
    <vuln_soft>
      <prod name="interbase" vendor="borland_software">
        <vers num="4.0"/>
        <vers num="5.0"/>
        <vers num="6.0"/>
        <vers num="6.4"/>
        <vers num="6.5"/>
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1834" seq="2004-1834" published="2004-03-20" modified="2017-10-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">mod_disk_cache in Apache 2.0 through 2.0.49 stores client headers, including authentication information, on the hard disk, which could allow local users to gain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107981737322495&amp;w=2">20040319 Apache mod_disk_cache stores client authentication credentials on disk</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009509" adv="1">1009509</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1">102198</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm">http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2004-562.html">RHSA-2004:562</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9933" adv="1" patch="1">9933</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/0789">ADV-2006-0789</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15547">apache-moddiskcache-obtain-info(15547)</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="MLIST" url="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11133">oval:org.mitre.oval:def:11133</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0"/>
        <vers num="2.0.9"/>
        <vers num="2.0.28" edition="beta"/>
        <vers num="2.0.32"/>
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.0.40"/>
        <vers num="2.0.41"/>
        <vers num="2.0.42"/>
        <vers num="2.0.43"/>
        <vers num="2.0.44"/>
        <vers num="2.0.45"/>
        <vers num="2.0.46"/>
        <vers num="2.0.47"/>
        <vers num="2.0.48"/>
        <vers num="2.0.49"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1835" seq="2004-1835" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in index.php in Invision Gallery 1.0.1 allow remote attackers to execute arbitrary SQL via the (1) img, (2) cat, (3) sort_key, (4) order_key, (5) user, or (6) album parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107997906500032&amp;w=2">20040322 Invision Gallery SQL Injection Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009512">1009512</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9944">9944</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15566">invision-gallery-sql-injection(15566)</ref>
    </refs>
    <vuln_soft>
      <prod name="invision_gallery" vendor="invision_power_services">
        <vers num="1.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1836" seq="2004-1836" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Invision Power Top Site List 1.1 RC 2 and earlier allows remote attackers to execute arbitrary SQL via the id parameter of the comments action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107997924117652&amp;w=2">20040322 Invision Power Top Site List SQL Injection Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009511">1009511</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9945">9945</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15568">invision-id-sql-injection(15568)</ref>
    </refs>
    <vuln_soft>
      <prod name="invision_power_top_site_list" vendor="invision_power_services">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.1_rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1837" seq="2004-1837" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Mod_survey 3.0.x before 3.0.16-pre2 and 3.2.x before 3.2.0-pre4 allows remote attackers to inject arbitrary web script or HTML via the certain survey fields or error messages for malformed query strings.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107997967421972&amp;w=2">20040322 Mod_Survey security advisory: Script injection bug</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009516" patch="1">1009516</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9941" patch="1">9941</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15582">modsurvey-xss(15582)</ref>
    </refs>
    <vuln_soft>
      <prod name="mod_survey" vendor="joel_palmius">
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.0.9"/>
        <vers num="3.0.10"/>
        <vers num="3.0.11"/>
        <vers num="3.0.12"/>
        <vers num="3.0.13"/>
        <vers num="3.0.14"/>
        <vers num="3.0.14d"/>
        <vers num="3.0.14e"/>
        <vers num="3.0.15"/>
        <vers num="3.0.15_pre1"/>
        <vers num="3.0.15_pre2"/>
        <vers num="3.0.15_pre3"/>
        <vers num="3.0.15_pre4"/>
        <vers num="3.0.15_pre5"/>
        <vers num="3.0.15_pre6"/>
        <vers num="3.0.16_pre1"/>
        <vers num="3.2.0_pre1"/>
        <vers num="3.2.0_pre2"/>
        <vers num="3.2.0_pre3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1838" seq="2004-1838" published="2004-03-22" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in xweb 1.0 allows remote attackers to download arbitrary files via a .. (dot dot) in the URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107997946623770&amp;w=2">20040322 directory traversal in xweb 1.0</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009514" adv="1" patch="1">1009514</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/xweb1.0-adv.txt" adv="1" patch="1">http://www.autistici.org/fdonato/advisory/xweb1.0-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9937" adv="1" patch="1">9937</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15567">xweb-dotdot-directory-traversal(15567)</ref>
    </refs>
    <vuln_soft>
      <prod name="xweb" vendor="xweb">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1839" seq="2004-1839" published="2004-03-22" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">MS Analysis module 2.0 for PHP-Nuke allows remote attackers to obtain sensitive information via a direct request to (1) browsers.php, (2) mstrack.php, or (3) title.php, which reveal the full path in a PHP error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108006319730976&amp;w=2">20040322  [waraxe-2004-SA#011 Multiple vulnerabilities in MS Analysis v2.0 module for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9946" adv="1">9946</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1840" seq="2004-1840" published="2004-03-22" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in MS Analysis module 2.0 for PHP-Nuke allows remote attackers to inject arbitrary web script or HTML via the (1) screen parameter to modules.php, (2) module_name parameter to title.php, (3) sortby parameter to modules.php, or (4) overview parameter to modules.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108006319730976&amp;w=2">20040322  [waraxe-2004-SA#011 Multiple vulnerabilities in MS Analysis v2.0 module for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9947" adv="1">9947</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15575">msanalysis-modules-title-xss(15575)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1841" seq="2004-1841" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in MS Analysis module 2.0 for PHP-Nuke allows remote attackers to execute arbitrary SQL via the referer field in an HTTP request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108006319730976&amp;w=2">20040322  [waraxe-2004-SA#011 Multiple vulnerabilities in MS Analysis v2.0 module for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9948">9948</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15576">msanalysis-referer-sql-injection(15576)</ref>
    </refs>
    <vuln_soft>
      <prod name="website_traffic_analyzer" vendor="ms_analysis">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1842" seq="2004-1842" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in Php-Nuke 6.x through 7.1.0 allows remote attackers to gain administrative privileges via an img tag with a URL to admin.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108006309112075&amp;w=2">20040322 [waraxe-2004-SA#008 - easy way to get superadmin rights in PhpNuke 6.x-7.1.0]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9895">9895</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15596">phpnuke-img-gain-privileges(15596)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1843" seq="2004-1843" published="2004-03-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Member Management System 2.1 allows remote attackers to execute arbitrary SQL via the ID parameter to (1) resend.asp or (2) news_view.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107999697625786&amp;w=2">20040322 Vulnerabilities in Member Management System 2.1</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009508" adv="1" patch="1">1009508</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9931" adv="1" patch="1">9931</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15551">mms-id-sql-injection(15551)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1844" seq="2004-1844" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Member Management System 2.1 allows remote attackers to inject arbitrary web script or HTML via (1) the err parameter to error.asp or (2) register.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107999697625786&amp;w=2">20040322 Vulnerabilities in Member Management System 2.1</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009508">1009508</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9932">9932</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15552">mms-xss(15552)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1845" seq="2004-1845" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in News Manager Lite 2.5 allow remote attackers to inject arbitrary web script or HTML via the (1) email parameter to comment_add.asp, (2) search parameter to search.asp, or (3) n parameter to category_news_headline.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107999733503496&amp;w=2">20040322 Vulnerabilities in News Manager Lite 2.5 &amp; News Manager Lite administration</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009507">1009507</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9935">9935</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15548">news-manager-xss(15548)</ref>
    </refs>
    <vuln_soft>
      <prod name="news_manager_lite" vendor="expinion.net">
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1846" seq="2004-1846" published="2004-03-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in News Manager Lite 2.5 allow remote attackers to execute arbitrary SQL code via the (1) ID parameter to more.asp, (2) ID parameter to category_news.asp, or (3) filter parameter to news_sort.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107999733503496&amp;w=2">20040322 Vulnerabilities in News Manager Lite 2.5 &amp; News Manager Lite administration</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009507" adv="1" patch="1">1009507</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9935" adv="1" patch="1">9935</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15549">news-manager-sql-injection(15549)</ref>
    </refs>
    <vuln_soft>
      <prod name="news_manager_lite" vendor="expinion.net">
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1847" seq="2004-1847" published="2004-03-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">News Manager Lite 2.5 allows remote attackers to bypass authentication and gain administrator privileges by setting the ADMIN parameter in the NEWS_LOGIN cookie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107999733503496&amp;w=2">20040322 Vulnerabilities in News Manager Lite 2.5 &amp; News Manager Lite administration</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009507" adv="1">1009507</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9935" patch="1">9935</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15550">news-manager-admin-access(15550)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1848" seq="2004-1848" published="2004-12-31" modified="2019-08-13" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108006717731989&amp;w=2">20040323 How to crash a harddisk - the Ipswitch WS_FTP Server way</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009529">1009529</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9953">9953</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15560">wsftp-rest-dos(15560)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/41831">wsftp-rest-stor-dos(41831)</ref>
    </refs>
    <vuln_soft>
      <prod name="ws_ftp_server" vendor="ipswitch">
        <vers num="3.0_1"/>
        <vers num="4.01"/>
      </prod>
      <prod name="ipswitch_ws_ftp_server" vendor="progress">
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.4"/>
        <vers num="4.0"/>
        <vers num="4.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1849" seq="2004-1849" published="2004-03-24" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in cPanel 9.1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) email parameter to dodelautores.html or (2) handle parameter to addhandle.html.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108006627005371&amp;w=2">20040323 More Cpanel Vuls (cross site scripting)</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009541" adv="1">1009541</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9965" adv="1">9965</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15517">cpanel-dodelautores-addhandle-xss(15517)</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1850" seq="2004-1850" published="2004-03-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Rage 1.01 and earlier allows remote attackers to cause a denial of service (infinite loop) via a TCP packet with the port and IP address set to zero.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/ragefreeze-adv.txt" adv="1">http://aluigi.altervista.org/adv/ragefreeze-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108006680013576&amp;w=2">20040323 Server freeze in The Rage 1.01</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009540" adv="1">1009540</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9961" adv="1">9961</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15584">therage-packet-dos(15584)</ref>
    </refs>
    <vuln_soft>
      <prod name="the_rage" vendor="fluidgames">
        <vers num="1.0_1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1851" seq="2004-1851" published="2004-03-24" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Dameware Mini Remote Control 4.1.0.0 uses insufficiently random data to create the encryption key, which makes it easier for remote attackers to obtain sensitive information via brute force guessing.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108016344224973&amp;w=2">20030323 Dameware Passes Weak File Encryption Key in the Clear</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009557" adv="1">1009557</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9957" adv="1">9957</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15587">dameware-random-generator-weak(15587)</ref>
    </refs>
    <vuln_soft>
      <prod name="mini_remote_control_server" vendor="dameware_development">
        <vers num="4.1_.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1852" seq="2004-1852" published="2004-03-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">DameWare Mini Remote Control 3.x before 3.74 and 4.x before 4.2 transmits the Blowfish encryption key in plaintext, which allows remote attackers to gain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108016344224973&amp;w=2">20040323 Dameware Passes Weak File Encryption Key in the Clear</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009557" adv="1">1009557</ref>
      <ref source="CONFIRM" url="http://www.dameware.com/support/security/bulletin.asp?ID=SB3" adv="1" patch="1">http://www.dameware.com/support/security/bulletin.asp?ID=SB3</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9959" adv="1" patch="1">9959</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15586">dameware-encryption-key-plaintext(15586)</ref>
    </refs>
    <vuln_soft>
      <prod name="mini_remote_control_server" vendor="dameware_development">
        <vers num="3.70_.0.0"/>
        <vers num="3.71_.0.0"/>
        <vers num="3.72_.0.0"/>
        <vers num="3.73_.0.0"/>
        <vers num="4.0"/>
        <vers num="4.1_.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1853" seq="2004-1853" published="2004-03-19" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Terminator 3: War of the Machines 1.0 allows remote attackers to cause a denial of service via a long ServerInfo variable.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/t3cbof-adv.txt" adv="1" patch="1">http://aluigi.altervista.org/adv/t3cbof-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108016076221855&amp;w=2">20040323 Broadcast client buffer-overflow in Terminator 3 1.0</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009498" adv="1" patch="1">1009498</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9918" adv="1">9918</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15542">terminator3-bo(15542)</ref>
    </refs>
    <vuln_soft>
      <prod name="terminator_3_war_of_the_machines" vendor="atari">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1854" seq="2004-1854" published="2004-03-24" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the logging function in Picophone 1.63 and earlier allows remote attackers to execute arbitrary code via a large packet.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/picobof-adv.txt" adv="1" patch="1">http://aluigi.altervista.org/adv/picobof-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108016032220647&amp;w=2">20040324 Buffer overflow in PicoPhone 1.63</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009551" adv="1" patch="1">1009551</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9969" adv="1" patch="1">9969</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15595">picophone-logging-function-bo(15595)</ref>
    </refs>
    <vuln_soft>
      <prod name="internet_telephone" vendor="picophone">
        <vers num="1.63"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1855" seq="2004-1855" published="2004-03-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Dark Age of Camelot before 1.68 live patch does not sign the RSA public key, which could allow remote malicious servers to gain sensitive information via a man-in-the-middle attack.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://capnbry.net/daoc/advisory20040323/" adv="1">http://capnbry.net/daoc/advisory20040323/</ref>
      <ref source="FULLDISC" url="http://lists.netsys.com/pipermail/full-disclosure/2004-March/019212.html">20040323 Dark Age of Camelot login client vulnerability to man in the middle attack</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108016932816707&amp;w=2">20040324 Dark Age of Camelot login client vulnerability to man in the middle</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9960" adv="1">9960</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15597">daoc-login-mitm(15597)</ref>
    </refs>
    <vuln_soft>
      <prod name="dark_age_of_camelot" vendor="mythic_entertainment">
        <vers num="1.60"/>
        <vers num="1.61"/>
        <vers num="1.62"/>
        <vers num="1.63"/>
        <vers num="1.65"/>
        <vers num="1.66"/>
        <vers num="1.67"/>
        <vers num="1.68"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1856" seq="2004-1856" published="2004-03-24" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">devices_update_printer_fw_upload.hts in HP Web JetAdmin 7.5.2546, when no password is set, allows remote attackers to upload arbitrary files to the printer directory.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108016019623003&amp;w=2">20040324 HP Web JetAdmin vulnerabilities.</ref>
      <ref source="MISC" url="http://sh0dan.org/files/hpjadmadv.txt" adv="1">http://sh0dan.org/files/hpjadmadv.txt</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/6492">SSRT4700</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9971" adv="1">9971</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15605">hp-jetadmin-file-upload(15605)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_jetadmin" vendor="hp">
        <vers num="7.5.2546"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1857" seq="2004-1857" published="2004-03-24" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in setinfo.hts in HP Web Jetadmin 7.5.2546 allows remote authenticated attackers to read arbitrary files via a .. (dot dot) in the setinclude parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108016019623003&amp;w=2">20040324 HP Web JetAdmin vulnerabilities.</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/6492" adv="1">SSRT4700</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9972" adv="1">9972</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15606">hp-jetadmin-setinfo-directory-traversal(15606)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_jetadmin" vendor="hp">
        <vers num="7.5.2546"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1858" seq="2004-1858" published="2004-12-31" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">HP Web Jetadmin 7.5.2546 allows remote attackers to cause a denial of service (crash) via a malformed request, possibly due to a stricmp() error from an invalid use of the "$" character.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108016019623003&amp;w=2">20040324 HP Web JetAdmin vulnerabilities.</ref>
      <ref source="HP" url="http://www.securityfocus.com/advisories/6492">SSRT4700</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1859" seq="2004-1859" published="2004-03-24" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote attackers to read arbitrary files via a .. (dot dot) in the URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://kb.trendmicro.com/solutions/search/main/search/solutionDetail.asp?solutionID=19257" adv="1" patch="1">http://kb.trendmicro.com/solutions/search/main/search/solutionDetail.asp?solutionID=19257</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108014604529316&amp;w=2">20040324 TrendMacro Interscan Viruswall Directory Traversal</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009550" adv="1">1009550</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9966" adv="1">9966</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15590">interscan-dotdot-directory-traversal(15590)</ref>
    </refs>
    <vuln_soft>
      <prod name="interscan_viruswall_for_windows_nt" vendor="trend_micro">
        <vers num="3.4"/>
        <vers num="3.5"/>
        <vers num="3.6"/>
        <vers num="3.51"/>
        <vers num="3.52"/>
        <vers num="3.52_build1466"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1860" seq="2004-1860" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Check Point SmartDashboard in Check Point NG AI R54 and R55 allows remote authenticated users to cause a denial of service (server disconnect) and possibly execute arbitrary code via a large filter on a column when using SmartView Tracker.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108023281112510&amp;w=2">20040325 Check Point SmartDashboard Buffer Overflow</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009490">1009490</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9870">9870</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15539">fw1-smartdashboard-bo(15539)</ref>
    </refs>
    <vuln_soft>
      <prod name="xmb" vendor="xmb_forum">
        <vers num="1.8_sp3"/>
        <vers num="1.9_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1861" seq="2004-1861" published="2004-03-25" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Invision NetSupport School Pro uses a weak encryption algorithm to encrypt passwords, which allows local users to obtain passwords.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108032304932321&amp;w=2">20040326 NetSupport School Pro: Password Encryption Weaknesses</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9981" adv="1">9981</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15621">netsupportschoolpro-weak-encryption(15621)</ref>
    </refs>
    <vuln_soft>
      <prod name="netsupport_school" vendor="netsupport">
        <vers num="7.0"/>
        <vers num="7.0_1"/>
        <vers num="7.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1862" seq="2004-1862" published="2004-03-26" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Extreme Messageboard (XMB) 1.8 SP3 and 1.9 beta allow remote attackers to inject arbitrary web script or HTML via the (1) xmbuser parameter to xmb.php, (2) folder parameter to u2u.php, (3) viewmost, replymost, or latest parameter to stats.php, (4) message or icons parameter to post.php, (5) threadlist, pagelinks, forumlist, navigation, or (6) forumdisplay parameter to forumdisplay.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108032355905265&amp;w=2">20040326 [waraxe-2004-SA#012 - Multiple vulnerabilities in XMB Forum 1.8 Partagium SP3 and 1.9 Nexus Beta]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9983" adv="1">9983</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15654">xmb-forum-multiple-xss(15654)</ref>
    </refs>
    <vuln_soft>
      <prod name="xmb" vendor="xmb_forum">
        <vers num="1.8_sp3"/>
        <vers num="1.9_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1863" seq="2004-1863" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in XMB (aka extreme message board) 1.9 beta (aka Nexus beta) allow remote attackers to inject arbitrary web script or HTML via (1) the u2uheader parameter in editprofile.php, the restrict parameter in (2) member.php, (3) misc.php, and (4) today.php, and (5) an arbitrary parameter in phpinfo.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108032355905265&amp;w=2">20040326 [waraxe-2004-SA#012 - Multiple vulnerabilities in XMB Forum 1.8 Partagium SP3 and 1.9 Nexus Beta]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9983">9983</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15654">xmb-forum-multiple-xss(15654)</ref>
    </refs>
    <vuln_soft>
      <prod name="xmb" vendor="xmb_forum">
        <vers num="1.8_sp3"/>
        <vers num="1.9_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1864" seq="2004-1864" published="2004-03-26" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Extreme Messageboard (XMB) 1.9 beta allows remote attackers to execute arbitrary SQL commands via the restrict parameter to (1) member.php, (2) misc.php, or (3) today.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108032355905265&amp;w=2">20040326 [waraxe-2004-SA#012 - Multiple vulnerabilities in XMB Forum 1.8 SP3 and 1.9 beta]</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009561">1009561</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9983" adv="1">9983</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15655">xmb-forum-sql-injection(15655)</ref>
    </refs>
    <vuln_soft>
      <prod name="xmb" vendor="xmb_forum">
        <vers num="1.8_sp3"/>
        <vers num="1.9_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1865" seq="2004-1865" published="2004-03-26" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="1.9" CVSS_base_score="1.9" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the administration panel in bBlog 0.7.2 allows remote authenticated users with superuser privileges to inject arbitrary web script or HTML via a blog name ($blogname).  NOTE: if administrators are normally allowed to add HTML by other means, e.g. through Smarty templates, then this issue would not give any additional privileges, and thus would not be considered a vulnerability.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108034226717745&amp;w=2">20040326 bblog 0.7.2 cross site scripting</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009564" adv="1">1009564</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/13397">13397</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15635">bblog-name-xss(15635)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1866" seq="2004-1866" published="2004-03-26" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">nstxd in Nstx 1.1 beta3 and earlier allows remote attackers to cause a denial of service (crash) via a large packet, which triggers a null dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108034249916453&amp;w=2">20040326 Nstxd vulnerability</ref>
      <ref source="CONFIRM" url="http://nstx.dereference.de/nstx/nstx-1.1-beta4.tgz" patch="1">http://nstx.dereference.de/nstx/nstx-1.1-beta4.tgz</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009567" adv="1" patch="1">1009567</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9989" adv="1" patch="1">9989</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15638">nstx-null-dos(15638)</ref>
    </refs>
    <vuln_soft>
      <prod name="ip_over_dns_utility" vendor="nstx">
        <vers num="1.0"/>
        <vers num="1.1_beta1"/>
        <vers num="1.1_beta2"/>
        <vers num="1.1_beta3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1867" seq="2004-1867" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in guest.cgi in Fresh Guest Book allows remote attackers to inject arbitrary web script or HTML via the Name field.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108057935827431&amp;w=2">20040328 vuln</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9995">9995</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15649">freshguestbook-guest-xss(15649)</ref>
    </refs>
    <vuln_soft>
      <prod name="fresh_guest_book" vendor="web_fresh">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1868" seq="2004-1868" published="2004-03-25" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in WinSig.exe in eSignal 7.5 and 7.6 allows remote attackers to execute arbitrary code via a long STREAMQUOTE tag.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-04/0056.html" patch="1">20040406 Re: eSignal v7 remote buffer overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108025234317408&amp;w=2">20040325 eSignal v7 remote buffer overflow (exploit)</ref>
      <ref source="MISC" url="http://viziblesoft.com/insect/advisories/vz012004-esignal7.txt" adv="1">http://viziblesoft.com/insect/advisories/vz012004-esignal7.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9978" adv="1" patch="1">9978</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15624">esignal-specs-bo(15624)</ref>
    </refs>
    <vuln_soft>
      <prod name="esignal" vendor="esignal">
        <vers num="7.5"/>
        <vers num="7.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1869" seq="2004-1869" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Etherlords I 1.07 and earlier and Etherlords II 1.03 and earlier allows remote attackers to cause a denial of service (crash) by sending a packet that specifies the size for the next packet, then sending a larger packet than specified, which causes Etherlords to read unallocated memory.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/ethboom-adv.txt">http://aluigi.altervista.org/adv/ethboom-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108024309814423&amp;w=2">20040325 Remote crash in Etherlords I 1.07 and II 1.03</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9979">9979</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15618">etherlords1-packet-dos(15618)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15619">etherlords2-packet-dos(15619)</ref>
    </refs>
    <vuln_soft>
      <prod name="etherlords" vendor="nival_interactive">
        <vers num="1.0"/>
        <vers num="1.0_1"/>
        <vers num="1.0_2"/>
        <vers num="1.0_3"/>
        <vers num="1.0_4"/>
        <vers num="1.0_5"/>
        <vers num="1.0_6"/>
        <vers num="1.0_7"/>
      </prod>
      <prod name="etherlords_ii" vendor="nival_interactive">
        <vers num="1.0"/>
        <vers num="1.0_1"/>
        <vers num="1.0_2"/>
        <vers num="1.0_3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1870" seq="2004-1870" published="2004-03-29" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in PhotoPost PHP Pro 4.6.x and earlier allow remote attackers to gain users' passwords via the (1) photo parameter to addfav.php, (2) photo parameter to comments.php, (3) credit parameter to comments.php, (4) cat parameter to index.php, (5) ppuser parameter to showgallery.php, (6) cat parameter to showgallery.php, (7) cat parameter to uploadphoto.php, (8) albumid parameter to useralbums.php, or (9) albumid parameter to useralbums.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108057790723123&amp;w=2">20040328 PhotoPost PHP Pro Multiple Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009571" adv="1">1009571</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9994" adv="1">9994</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15642">photopost-php-sql-injection(15642)</ref>
    </refs>
    <vuln_soft>
      <prod name="photopost_php_pro" vendor="photopost">
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.6"/>
        <vers num="4.8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1871" seq="2004-1871" published="2004-03-29" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in PhotoPost PHP Pro 4.6.x and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) ppuser, (2) password, (3) stype, (4) perpage, (5) sort, (6) page, (7) si, or (8) cat parameters to showmembers.php, or the (9) photo name, (10) photo description, (11) album name, or (12) album description fields.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108057790723123&amp;w=2">20040328 PhotoPost PHP Pro Multiple Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009571" adv="1">1009571</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9994" adv="1" patch="1">9994</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15643">photopost-php-xss(15643)</ref>
    </refs>
    <vuln_soft>
      <prod name="photopost_php_pro" vendor="photopost">
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.6"/>
        <vers num="4.8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1872" seq="2004-1872" published="2004-03-29" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WebCT Campus Edition 4.1.1.5 allows remote attackers to inject arbitrary web script or HTML via the @import URL function in a CSS style tag.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108057915916365&amp;w=2">20040329 WebCT Campus Edition 4.1 - Cross site scripting using CSS @import</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9999" adv="1" patch="1">9999</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15652">webct-import-xss(15652)</ref>
    </refs>
    <vuln_soft>
      <prod name="webct" vendor="webct">
        <vers num="campus_3.8"/>
        <vers num="campus_3.8.4"/>
        <vers num="campus_4.0"/>
        <vers num="campus_4.1"/>
        <vers num="campus_4.1.1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1873" seq="2004-1873" published="2004-12-31" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in category.asp in A-CART Pro and A-CART 2.0 allows remote attackers to gain privileges via the catcode parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108057887008983&amp;w=2">20040329 A-CART Pro &amp; A-CART 2.0 Input Validation Holes</ref>
      <ref source="MISC" url="http://s-a-p.ca/index.php?page=OurAdvisories&amp;id=27">http://s-a-p.ca/index.php?page=OurAdvisories&amp;id=27</ref>
      <ref source="MISC" url="http://www.aria-security.com/forum/showthread.php?t=31">http://www.aria-security.com/forum/showthread.php?t=31</ref>
      <ref source="MISC" url="http://www.aria-security.com/forum/showthread.php?t=32">http://www.aria-security.com/forum/showthread.php?t=32</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/451594/100/100/threaded">20061114 A-Cart pro[ injection sql (post&amp;get)]</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/452005/100/0/threaded">20061118 A-Cart 2.0 SQL Injection</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/452006/100/0/threaded">20061118 A-Cart PRO SQL Injection</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/452023/100/0/threaded">20061118 Re: A-Cart PRO SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9997">9997</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15661">acart-categoryasp-sql-injection(15661)</ref>
    </refs>
    <vuln_soft>
      <prod name="a-cart" vendor="alan_ward">
        <vers num="2.0" edition=":pro"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1874" seq="2004-1874" published="2004-03-29" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in (1) deliver.asp and (2) billing.asp in A-CART Pro and A-CART 2.0 allow remote attackers to inject arbitrary web script or HTML via the user information forms.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108057887008983&amp;w=2">20040329 A-CART Pro &amp; A-CART 2.0 Input Validation Holes</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9997" adv="1">9997</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15660">acart-deliverasp-billingasp-xss(15660)</ref>
    </refs>
    <vuln_soft>
      <prod name="a-cart" vendor="alan_ward">
        <vers num="2.0" edition=":pro"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1875" seq="2004-1875" published="2004-03-30" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in cPanel 9.1.0-R85 allow remote attackers to inject arbitrary web script or HTML via the (1) email parameter to testfile.html, (2) file parameter to erredit.html, (3) dns parameter to dnslook.html, (4) account parameter to ignorelist.html, (5) account parameter to showlog.html, (6) db parameter to repairdb.html, (7) login parameter to doaddftp.html (8) account parameter to editmsg.htm, or (9) ip parameter to del.html.  NOTE: the dnslook.html vector was later reported to exist in cPanel 10.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108066561608676&amp;w=2">20040330 Exensive cPanel Cross Site Scripting</ref>
      <ref source="MISC" url="http://www.aria-security.com/forum/showthread.php?t=30">http://www.aria-security.com/forum/showthread.php?t=30</ref>
      <ref source="MISC" url="http://www.cirt.net/advisories/cpanel_xss.shtml" adv="1" patch="1">http://www.cirt.net/advisories/cpanel_xss.shtml</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10002" adv="1">10002</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/21142">21142</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/4658" adv="1">ADV-2006-4658</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15671">cpanel-multiple-scripts-xss(15671)</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="9.1.0_r85"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1876" seq="2004-1876" published="2004-03-30" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The "%f" feature in the VirusEvent directive in Clam AntiVirus daemon (clamd) before 0.70 allows local users to execute arbitrary commands via shell metacharacters in a file name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108066864608615&amp;w=2">20040330 clamd - NEVER use "%f" in your "VirusEvent"</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-03.xml" adv="1" patch="1">GLSA-200405-03</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10007" adv="1" patch="1">10007</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15692">clamantivirus-virusevent-gain-privileges(15692)</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clam_anti-virus">
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.60"/>
        <vers num="0.65"/>
        <vers num="0.67"/>
        <vers num="0.68"/>
        <vers num="0.68.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1877" seq="2004-1877" published="2004-03-30" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The p_submit_url value in the sample login form in the Oracle 9i Application Server (9iAS) Single Sign-on Administrators Guide, Release 2(9.0.2) for Oracle SSO allows remote attackers to spoof the login page, which could allow users to inadvertently reveal their username and password.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108067040722235&amp;w=2">20040330 Problem with customized login pages for Oracle SSO</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10009" adv="1" patch="1">10009</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15676">oracle-sso-login-spoofing(15676)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="1.0.2"/>
        <vers num="1.0.2.1s"/>
        <vers num="1.0.2.2"/>
        <vers num="1.0.2.2.2"/>
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.3"/>
        <vers num="9.0.3.1"/>
      </prod>
      <prod name="http_server" vendor="oracle">
        <vers num="8.1.7"/>
        <vers num="9.0.1"/>
        <vers num="9.2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1878" seq="2004-1878" published="2004-03-30" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">LINBOX LIN:BOX allows remote attackers to bypass authentication, obtain sensitive information, or gain access via a direct request to admin/user.pl preceded by // (double leading slash).</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108067245401673&amp;w=2">20040330 Linbit linbox Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10010" adv="1" patch="1">10010</ref>
      <ref source="MISC" url="http://www.websec.org/adv/linbit.txt.html" adv="1">http://www.websec.org/adv/linbit.txt.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15677">linbox-slashslash-security-bypass(15677)</ref>
    </refs>
    <vuln_soft>
      <prod name="linbox_officeserver" vendor="linbit_technologies">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1879" seq="2004-1879" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in PHPKIT 1.6.03 allows allows remote attackers to inject arbitrary web script or HTML via forum messages.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108067894822358&amp;w=2">20040330 phpkit suffers (reale stupid) XSS vuln.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10013">10013</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15681">phpkit-forum-message-xss(15681)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpkit" vendor="phpkit">
        <vers num="1.6.03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1880" seq="2004-1880" published="2004-12-31" modified="2008-09-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Memory leak in the back-bdb backend for OpenLDAP 2.1.12 and earlier allows remote attackers to cause a denial of service (memory consumption).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONECTIVA" url="http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000685" patch="1">CLSA-2003:685</ref>
    </refs>
    <vuln_soft>
      <prod name="openldap" vendor="openldap">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.1.0"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.2.8"/>
        <vers num="1.2.9"/>
        <vers num="1.2.10"/>
        <vers num="1.2.11"/>
        <vers num="1.2.12"/>
        <vers num="1.2.13"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.0.10"/>
        <vers num="2.0.11"/>
        <vers num="2.0.12"/>
        <vers num="2.0.13"/>
        <vers num="2.0.14"/>
        <vers num="2.0.15"/>
        <vers num="2.0.16"/>
        <vers num="2.0.17"/>
        <vers num="2.0.18"/>
        <vers num="2.0.19"/>
        <vers num="2.0.20"/>
        <vers num="2.0.21"/>
        <vers num="2.0.22"/>
        <vers num="2.0.23"/>
        <vers num="2.0.24"/>
        <vers num="2.0.25"/>
        <vers num="2.0.26"/>
        <vers num="2.0.27"/>
        <vers num="2.1.2"/>
        <vers num="2.1.3"/>
        <vers num="2.1.4"/>
        <vers num="2.1.5"/>
        <vers num="2.1.6"/>
        <vers num="2.1.7"/>
        <vers num="2.1.8"/>
        <vers num="2.1.9"/>
        <vers num="2.1.10"/>
        <vers num="2.1.11"/>
        <vers num="2.1.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1881" seq="2004-1881" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in (1) mailorder.asp or (2) payonline.asp in CactuShop 5.x allows remote attackers to execute arbitrary SQL commands via the strItems parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108075059013762&amp;w=2">20040331 CactuSoft CactuShop v5.x shopping cart software multiple security</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009601">1009601</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10019">10019</ref>
      <ref source="MISC" url="http://www.s-quadra.com/advisories/Adv-20040331.txt">http://www.s-quadra.com/advisories/Adv-20040331.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15686">cactushop-multiple-sql-injection(15686)</ref>
    </refs>
    <vuln_soft>
      <prod name="cactushop" vendor="cactusoft">
        <vers num="5.0"/>
        <vers num="5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1882" seq="2004-1882" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in popuplargeimage.asp in CactuShop 5.x allows remote attackers to inject arbitrary web script or HTML via the strImageTag parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/019566.html">2004031 CactuSoft CactuShop v5.x shopping cart software multiple security vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108075059013762&amp;w=2">20040331 CactuSoft CactuShop v5.x shopping cart software multiple security</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009601">1009601</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10020">10020</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15687">cactushop-popularlargeimageasp-xss(15687)</ref>
    </refs>
    <vuln_soft>
      <prod name="cactushop" vendor="cactusoft">
        <vers num="5.0"/>
        <vers num="5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1883" seq="2004-1883" published="2004-12-31" modified="2019-08-13" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Ipswitch WS_FTP Server 4.0.2 (1) allow remote authenticated users to execute arbitrary code by causing a large error string to be generated by the ALLO handler, or (2) may allow remote FTP administrators to execute arbitrary code by causing a long hostname or username to be inserted into a reply to a STAT command while a file is being transferred.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108006553222397&amp;w=2">20040323 ALLO ALLO WS_FTP Server</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/358361">20040323 Think of the buffers! Won't somebody think of the buffers?!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9953">9953</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15561">wsftp-allo-bo(15561)</ref>
    </refs>
    <vuln_soft>
      <prod name="ipswitch_ws_ftp_server" vendor="progress">
        <vers num="4.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1884" seq="2004-1884" published="2004-03-23" modified="2019-08-13" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108006581418116&amp;w=2">20040323 Open the WS_FTP Server backdoor to SYSTEM</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9953" adv="1">9953</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15558">wftp-site-gain-priviliege(15558)</ref>
    </refs>
    <vuln_soft>
      <prod name="ws_ftp_pro" vendor="ipswitch">
        <vers num="6.0"/>
        <vers num="7.5"/>
        <vers num="8.0_2"/>
        <vers num="8.0_3"/>
      </prod>
      <prod name="ws_ftp_server" vendor="ipswitch">
        <vers num="3.0_1"/>
        <vers num="4.01"/>
      </prod>
      <prod name="ipswitch_ws_ftp_server" vendor="progress">
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.4"/>
        <vers num="4.0"/>
        <vers num="4.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1885" seq="2004-1885" published="2004-12-31" modified="2019-08-13" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Ipswitch WS_FTP Server 4.0.2 allows remote authenticated users to execute arbitrary programs as SYSTEM by using the SITE command to modify certain iFtpSvc options that are handled by iftpmgr.exe.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108006581418116&amp;w=2">20040323 Open the WS_FTP Server backdoor to SYSTEM</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9953">9953</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15558">wftp-site-gain-priviliege(15558)</ref>
    </refs>
    <vuln_soft>
      <prod name="ipswitch_ws_ftp_server" vendor="progress">
        <vers num="4.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1886" seq="2004-1886" published="2004-03-23" modified="2008-05-21" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-1848.  Reason: This candidate is a duplicate of CVE-2004-1848.  Notes: All CVE users should reference CVE-2004-1848 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-1887" seq="2004-1887" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Ada Image Server (ImgSvr) 0.4 allows remote attackers to view directories or download files via an HTTP request with a trailing %00 (null).</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108083813528255&amp;w=2">20040401 Index viewing in imgSvr 0.4</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=230023">http://sourceforge.net/project/shownotes.php?release_id=230023</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/imgSvr0.4-adv.txt">http://www.autistici.org/fdonato/advisory/imgSvr0.4-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10026">10026</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10027">10027</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15706">imgsvr-obtain-information(15706)</ref>
    </refs>
    <vuln_soft>
      <prod name="imgsvr" vendor="ada">
        <vers num="0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1888" seq="2004-1888" published="2004-12-31" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">display.cgi in Aborior Encore WebForum allows remote to execute arbitrary commands via shell metacharacters in the file variable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108100973820868&amp;w=2">20040403 Remote Exploit for Aborior's Encore Web Forum</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/437813/100/0/threaded">20060620 display.cgi</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/437978/100/0/threaded">20060621 Re: display.cgi</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10040">10040</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1009652">1009652</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15725">encore-display-command-execution(15725)</ref>
    </refs>
    <vuln_soft>
      <prod name="encore_web_forum" vendor="aborior">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1889" seq="2004-1889" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in ftpd in SGI IRIX 6.5.20 through 6.5.23 allows remote attackers to cause a denial of service (hang) via a link failure with Microsoft Windows.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040401-01-P.asc">20040401-01-P</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10037">10037</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15722">irix-ftpd-link-dos(15722)</ref>
    </refs>
    <vuln_soft>
      <prod name="irix" vendor="sgi">
        <vers num="6.5.20"/>
        <vers num="6.5.20f"/>
        <vers num="6.5.20m"/>
        <vers num="6.5.21"/>
        <vers num="6.5.21f"/>
        <vers num="6.5.21m"/>
        <vers num="6.5.22"/>
        <vers num="6.5.23"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1890" seq="2004-1890" published="2004-04-02" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in ftpd in SGI IRIX 6.5.20 through 6.5.23 allows remote attackers to cause a denial of service (hang) via the PORT mode.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040401-01-P.asc" adv="1" patch="1">20040401-01-P</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10037" adv="1" patch="1">10037</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15723">irix-ftpd-port-dos(15723)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1891" seq="2004-1891" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The ftp_syslog function in ftpd in SGI IRIX 6.5.20 "doesn't work with anonymous FTP," which has an unknown impact, possibly preventing the actions of anonymous users from being logged.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040401-01-P.asc">20040401-01-P</ref>
    </refs>
    <vuln_soft>
      <prod name="irix" vendor="sgi">
        <vers num="6.5.20"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1892" seq="2004-1892" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in DecodeBase16 function, as used in the (1) IRC module and (2) web server in eMule 0.42d, allows remote attackers to execute arbitrary code via a long string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108100987429960&amp;w=2">20040403 eMule v0.42d Buffer Overflow</ref>
      <ref source="CONFIRM" url="http://www.emule-project.net/home/perl/news.cgi?l=1&amp;cat_id=22" adv="1" patch="1">http://www.emule-project.net/home/perl/news.cgi?l=1&amp;cat_id=22</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10039" adv="1" patch="1">10039</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15730">emule-decodebase16-bo(15730)</ref>
    </refs>
    <vuln_soft>
      <prod name="emule" vendor="emule">
        <vers num="0.42d"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1893" seq="2004-1893" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Dreamweaver MX, when "Using Driver On Testing Server" or "Using DSN on Testing Server" is selected, uploads the mmhttpdb.asp script to the web site but does not require authentication, which allows remote attackers to obtain sensitive information and possibly execute arbitrary SQL commands via a direct request to mmhttpdb.asp.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108102481929451&amp;w=2">20040403 [securityzone@macromedia.com: New Macromedia Security Zone Bulletin Posted]</ref>
      <ref source="CONFIRM" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-05.html" adv="1">http://www.macromedia.com/devnet/security/security_zone/mpsb04-05.html</ref>
      <ref source="MISC" url="http://www.nextgenss.com/advisories/dreamweaver.txt">http://www.nextgenss.com/advisories/dreamweaver.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10036">10036</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15721">dreamweaver-test-script-sql-injection(15721)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1894" seq="2004-1894" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">TEXutil in ConTEXt, when executed with the --silent option, allows local users to overwrite arbitrary files via a symlink attack on texutil.log.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019777.html" patch="1">20040404 Texutil symlink vulnerability.</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108118755923319&amp;w=2">20040404 Texutil symlink vulnerability.</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009661">1009661</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10042" patch="1">10042</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15728">texutil-symlink-attack(15728)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1895" seq="2004-1895" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">YaST Online Update (YOU) in SuSE 8.2 and 9.0 allows local users to overwrite arbitrary files via a symlink attack on you-$USER/cookies.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-04/0058.html">20040406 Re: SuSEs YaST Online Update - possible symlink attack</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108118395519164&amp;w=2">20040405 SuSEs YaST Online Update - possible symlink attack</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009668">1009668</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10047">10047</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15731">suse-you-symlink(15731)</ref>
    </refs>
    <vuln_soft>
      <prod name="suse_linux" vendor="suse">
        <vers num="8.2"/>
        <vers num="9.0" edition=":x86_64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1896" seq="2004-1896" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.6" CVSS_base_score="7.6" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in in_mod.dll in Nullsoft Winamp 2.91 through 5.02 allows remote attackers to execute arbitrary code via a Fasttracker 2 (.xm) mod media file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108118289208693&amp;w=2">20040405 NGSSoftware Insight Security Research Advisory</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009660">1009660</ref>
      <ref source="MISC" url="http://www.nextgenss.com/advisories/winampheap.txt" patch="1">http://www.nextgenss.com/advisories/winampheap.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10045" patch="1">10045</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15727">winamp-inmod-bo(15727)</ref>
    </refs>
    <vuln_soft>
      <prod name="winamp" vendor="nullsoft">
        <vers num="2.91"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1897" seq="2004-1897" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Administration interface in Monit 1.4 through 4.2 allows remote attackers to cause a denial of service (segmentation fault) by sending a Basic Authentication request without a password, which causes Monit to decrement a null pointer and perform an out-of-bounds read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108119149103696&amp;w=2">20040405 Advisory: Multiple Vulnerabilities in Monit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10051" patch="1">10051</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15734">monit-basic-auth-dos(15734)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1898" seq="2004-1898" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the administration interface in Monit 1.4 through 4.2 allows remote attackers to execute arbitrary code via a long username.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108119149103696&amp;w=2">20040405 Advisory: Multiple Vulnerabilities in Monit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10051" patch="1">10051</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15735">monit-offbyone-bo(15735)</ref>
    </refs>
    <vuln_soft>
      <prod name="monit" vendor="tildeslash">
        <vers num="1.4"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.1.1"/>
        <vers num="4.2"/>
        <vers num="4.3_beta_2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1899" seq="2004-1899" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The administration interface in Monit 1.4 through 4.2 allows remote attackers to cause an off-by-one overflow via a POST that contains 1024 bytes.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108119149103696&amp;w=2">20040405 Advisory: Multiple Vulnerabilities in Monit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10051" patch="1">10051</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15736">monit-post-offbyone-bo(15736)</ref>
    </refs>
    <vuln_soft>
      <prod name="monit" vendor="tildeslash">
        <vers num="1.4"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.1.1"/>
        <vers num="4.2"/>
        <vers num="4.3_beta_2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1900" seq="2004-1900" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the logging function in IGI 2 Covert Strike server 1.3 and earlier allows remote attackers to execute arbitrary code via format string specifiers in RCON commands.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/igi2fs-adv.txt">http://aluigi.altervista.org/adv/igi2fs-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108120385811815&amp;w=2">20040405 Format string bug in IGI 2: Covert Strike 1.3</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009667">1009667</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10053">10053</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15742">igi2covertstrike-rcon-format-string(15742)</ref>
    </refs>
    <vuln_soft>
      <prod name="i.g.i-2_covert_strike" vendor="pan_vision">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1901" seq="2004-1901" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Portage before 2.0.50-r3 allows local users to overwrite arbitrary files via a hard link attack on the lockfiles.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-01.xml" patch="1">GLSA-200404-01</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10060" patch="1">10060</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15754">portage-lockfile-hardlink(15754)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1902" seq="2004-1902" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Citrix MetaFrame Password Manager 2.0, when a central credential store is not configured, does not encrypt passwords entered immediately after executing the First Time User Wizards, which allows local users to gain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108127948610311&amp;w=2">20040406 Foundstone Labs Advisory: Citrix MetaFrame Password Manager 2.0</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009659">1009659</ref>
      <ref source="CONFIRM" url="http://support.citrix.com/kb/entry.jspa?entryID=4062&amp;categoryID=256" adv="1" patch="1">http://support.citrix.com/kb/entry.jspa?entryID=4062&amp;categoryID=256</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10049" patch="1">10049</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15737">metaframe-wizard-info-disclosure(15737)</ref>
    </refs>
    <vuln_soft>
      <prod name="metaframe_password_manager" vendor="citrix">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1903" seq="2004-1903" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in blaxxun 3D 7.0 allows remote attackers to execute arbitrary code via a long URL property inside an object tag.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108127833002955&amp;w=2">20040406 blaxxun3D(blaxxun Platform) 7 - Remote Buffer Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10064">10064</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15625">blaxxun-applicationxcc3d-bo(15625)</ref>
    </refs>
    <vuln_soft>
      <prod name="contact_3d" vendor="blaxxun">
        <vers num="7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1904" seq="2004-1904" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in ascontrol.dll in Panda ActiveScan 5.0 allows remote attackers to execute arbitrary code via the Internacional property followed by a long string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108130573130482&amp;w=2">20040406 Panda ActiveScan 5.0 - Remote Buffer Overflow and A Crash(D.O.S)</ref>
      <ref source="MISC" url="http://theinsider.deep-ice.com/texts/advisory53.txt">http://theinsider.deep-ice.com/texts/advisory53.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10065">10065</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15764">panda-activescan-ascontrol-bo(15764)</ref>
    </refs>
    <vuln_soft>
      <prod name="activescan" vendor="panda">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1905" seq="2004-1905" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">ascontrol.dll in Panda ActiveScan 5.0 allows remote attackers to cause a denial of service (crash) by calling the SetSitesFile function.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108130573130482&amp;w=2">20040406 Panda ActiveScan 5.0 - Remote Buffer Overflow and A Crash(D.O.S)</ref>
      <ref source="MISC" url="http://theinsider.deep-ice.com/texts/advisory53.txt">http://theinsider.deep-ice.com/texts/advisory53.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10067">10067</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15831">panda-activescan-ascontrol-dos(15831)</ref>
    </refs>
    <vuln_soft>
      <prod name="activescan" vendor="panda">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1906" seq="2004-1906" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Mcafee FreeScan allows remote attackers to cause a denial of service and possibly arbitrary code via a long string in the ScanParam property of a COM object, which may trigger a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019877.html">20040407 Mcafee FreeScan - Remote Buffer Overflow and Private Information Disclosure</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019891.html">20040407 Symantec, McAfee and Panda ActiveX controls</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108136872711898&amp;w=2">20040407 Mcafee FreeScan - Remote Buffer Overflow and Private Information Disclosure</ref>
      <ref source="MISC" url="http://theinsider.deep-ice.com/texts/advisory54.txt">http://theinsider.deep-ice.com/texts/advisory54.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10071">10071</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15772">freescan-mcfscan-bo(15772)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1907" seq="2004-1907" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Web Filtering functionality in Kerio Personal Firewall (KPF) 4.0.13 allows remote attackers to cause a denial of service (crash) by sending hex-encoded URLs containing "%13%12%13".</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-04/0061.html">20040406 Kerio Personal Firewall 4 and IE 6 "Bug"</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108137421524251&amp;w=2">20040407 Kerio Personal Firewall 4.0.13 - Remote DoS (Crash)</ref>
      <ref source="MISC" url="http://www.cipher.org.uk/index.php?p=advisories/HEX-Kerio_Personal_Firewall_Remote_DOS_7-04-2004.advisory">http://www.cipher.org.uk/index.php?p=advisories/HEX-Kerio_Personal_Firewall_Remote_DOS_7-04-2004.advisory</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10075">10075</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15821">kerio-pf-webfilter-dos(15821)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1908" seq="2004-1908" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">McFreeScan.CoMcFreeScan.1 ActiveX object in Mcafee FreeScan allows remote attackers to obtain sensitive information via the GetSpecialFolderLocation function with certain parameters.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019877.html">20040407 Mcafee FreeScan - Remote Buffer Overflow and Private Information Disclosure</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019891.html">20040407 Symantec, McAfee and Panda ActiveX controls</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108136872711898&amp;w=2">20040407 Mcafee FreeScan - Remote Buffer Overflow and Private Information Disclosure</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108137545531496&amp;w=2">20040407 McAfee Freescan ActiveX Information Disclosure [Additional Details &amp; PoC]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10077">10077</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15782">freescan-mcfscan-info-disclosure(15782)</ref>
    </refs>
    <vuln_soft>
      <prod name="freescan" vendor="mcafee">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1909" seq="2004-1909" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Claim Anti-Virus (ClamAV) 0.68 and earlier allows remote attackers to cause a denial of service (crash) via certain RAR archives, such as those generated by the Beagle/Bagle worm.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://freshmeat.net/projects/clamav/?branch_id=29355&amp;release_id=154462">http://freshmeat.net/projects/clamav/?branch_id=29355&amp;release_id=154462</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-07.xml" patch="1">GLSA-200404-07</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9897" patch="1">9897</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15553">clam-antivirus-rar-dos(15553)</ref>
    </refs>
    <vuln_soft>
      <prod name="clamav" vendor="clam_anti-virus">
        <vers num="0.65"/>
        <vers num="0.67"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1910" seq="2004-1910" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">rufsi.dll in Symantec Virus Detection allows remote attackers to cause a denial of service (crash) via a long string to the GetPrivateProfileString function.  NOTE: this issue was originally reported as a buffer overflow, but that specific claim is disputed by the vendor, although a crash is acknowledged.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019891.html">20040407 Symantec, McAfee and Panda ActiveX controls</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108136901406896&amp;w=2">20040407 Symantec Virus Detection(Free ActiveX) - Remote Buffer Overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108143485021721&amp;w=2">20040408 Re:  Symantec Virus Detection(Free ActiveX) - Remote Buffer Overflow, Apr 7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10069">10069</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15778">symantec-sc-rufsi-bo(15778)</ref>
    </refs>
    <vuln_soft>
      <prod name="security_check_virus_detection" vendor="symantec">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1911" seq="2004-1911" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in AzDGDatingLite 2.1.1 allows remote attackers to inject arbitrary web script or HTML via the (1) l parameter (aka language variable) to index.php or (2) id parameter to view.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108144342317973&amp;w=2">20040408 [waraxe-2004-SA#014 - Cross-Site Scripting aka XSS in AzDGDatingLite]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10084">10084</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15796">azdgdating-index-view-xss(15796)</ref>
    </refs>
    <vuln_soft>
      <prod name="azdgdating" vendor="azerbaijan_development_group">
        <vers num="2.1.1" edition=":lite"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1912" seq="2004-1912" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The (1) modules.php, (2) block-Calendar.php, (3) block-Calendar1.php, (4) block-Calendar_center.php scripts in NukeCalendar 1.1.a, as used in PHP-Nuke, allow remote attackers to obtain sensitive information via a URL with an invalid argument, which reveals the full path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108144168932458&amp;w=2">20040408 [waraxe-2004-SA#015 - Multiple vulnerabilities in NukeCalendar v1.1.a]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10082">10082</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15795">nuke-calendar-path-disclosure(15795)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="8.0_final"/>
      </prod>
      <prod name="nukecalendar" vendor="shiba-design">
        <vers num="1.1.a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1913" seq="2004-1913" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in modules.php in NukeCalendar 1.1.a, as used in PHP-Nuke, allows remote attackers to inject arbitrary web script or HTML via the eid parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108144168932458&amp;w=2">20040408 [waraxe-2004-SA#015 - Multiple vulnerabilities in NukeCalendar v1.1.a]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10082">10082</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15798">nuke-calendar-modulesphp-xss(15798)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="8.0_final"/>
      </prod>
      <prod name="nukecalendar" vendor="shiba-design">
        <vers num="1.1.a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1914" seq="2004-1914" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in modules.php in NukeCalendar 1.1.a, as used in PHP-Nuke, allows remote attackers to execute arbitrary SQL commands via the eid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108144168932458&amp;w=2">20040408 [waraxe-2004-SA#015 - Multiple vulnerabilities in NukeCalendar v1.1.a]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10082">10082</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15799">nukecalendar-modulesphp-sql-injection(15799)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="8.0_final"/>
      </prod>
      <prod name="nukecalendar" vendor="shiba-design">
        <vers num="1.1.a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1915" seq="2004-1915" published="2004-04-08" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the parse_all_client_messages function in LCDproc 0.4.x up to 0.4.4 allows remote attackers to execute arbitrary code via a large number of arguments.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://lists.omnipotent.net/pipermail/lcdproc/2004-April/008884.html" adv="1">http://lists.omnipotent.net/pipermail/lcdproc/2004-April/008884.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108145722229810&amp;w=2">20040408 PSR - #2004-001 Remote - LCDProc</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-19.xml" adv="1" patch="1">GLSA-200404-19</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10085" adv="1" patch="1">10085</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15803">lcdproc-parseallclientmessages-bo(15803)</ref>
    </refs>
    <vuln_soft>
      <prod name="lcdproc" vendor="lcdproc">
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.4.1_r1"/>
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1916" seq="2004-1916" published="2004-04-08" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in LCDProc 0.4.1, and possibly other 0.4.x versions up to 0.4.4, allows remote attackers to execute arbitrary code via (1) a long invalid command to parse_all_client_messages function, or (2) long argv command to test_func_func function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://lists.omnipotent.net/pipermail/lcdproc/2004-April/008884.html" adv="1">http://lists.omnipotent.net/pipermail/lcdproc/2004-April/008884.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108146376315229&amp;w=2">20040408 PSR - #2004-002 Remote - LCDProc</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-19.xml" adv="1">GLSA-200404-19</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10085" adv="1" patch="1">10085</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15814">lcdproc-testfuncfunc-bo(15814)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1917" seq="2004-1917" published="2004-04-08" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in test_func_func in LCDProc 0.4.1 and earlier allows remote attackers to execute arbitrary code via format string specifiers in the str variable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://lists.omnipotent.net/pipermail/lcdproc/2004-April/008884.html" adv="1">http://lists.omnipotent.net/pipermail/lcdproc/2004-April/008884.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108146376315229&amp;w=2">20040408 PSR - #2004-002 Remote - LCDProc</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-19.xml" adv="1" patch="1">GLSA-200404-19</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10085" adv="1" patch="1">10085</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15817">lcdproc-testfuncfunc-format-string(15817)</ref>
    </refs>
    <vuln_soft>
      <prod name="lcdproc" vendor="lcdproc">
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.4.1_r1"/>
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1918" seq="2004-1918" published="2004-04-09" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">RSniff 1.0 allows remote attackers to cause a denial of service (connection exhaustion) via a large number of connections with a command other than AUTHENTICATE, or without any data, which prevents the socket from being closed properly.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/rsniff-adv.txt">http://aluigi.altervista.org/adv/rsniff-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108152508004665&amp;w=2">20040409 DoS in Rsniff 1.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10093" adv="1" patch="1">10093</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15823">rsniff-connection-dos(15823)</ref>
    </refs>
    <vuln_soft>
      <prod name="rsniff" vendor="rsniff">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1919" seq="2004-1919" published="2004-04-09" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The hash_strcmp function in hasch.c in Crackalaka 1.0.8 allows remote attackers to cause a denial of service (crash) via large malformed strings.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108152479316967&amp;w=2">20040409 DoS in Crackalaka 1.0.8</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10092" adv="1">10092</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15824">crackalaka-hashstrcmp-dos(15824)</ref>
    </refs>
    <vuln_soft>
      <prod name="crackalaka" vendor="crackalaka">
        <vers num="1.0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1920" seq="2004-1920" published="2004-04-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">X-Micro WLAN 11b Broadband Router 1.2.2, 1.2.2.3, 1.2.2.4, and 1.6.0.0 has a hardcoded "super" username and password, which could allow remote attackers to gain access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108162529229947&amp;w=2">20040410 Backdoor in X-Micro WLAN 11b Broadband Router</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10095" adv="1" patch="1">10095</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15829">xmicro-router-default-account(15829)</ref>
    </refs>
    <vuln_soft>
      <prod name="wlan_11b_broadband_router_firmware" vendor="x-micro">
        <vers num="1.2.2"/>
        <vers num="1.2.2.3"/>
        <vers num="1.2.2.4"/>
        <vers num="1.6.0"/>
        <vers num="1.6.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1921" seq="2004-1921" published="2004-04-10" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">X-Micro WLAN 11b Broadband Router 1.6.0.1 has a hardcoded "1502" username and password, which could allow remote attackers to gain access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108213608111111&amp;w=2">20040416 Re: Backdoor in X-Micro WLAN 11b Broadband Router</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108223222519855&amp;w=2">20040416 NEW backdoor in X-Micro WLAN 11b Broadband Router</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10095" adv="1" patch="1">10095</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15890">xmicro-router-default-login(15890)</ref>
    </refs>
    <vuln_soft>
      <prod name="wlan_11b_broadband_router_firmware" vendor="x-micro">
        <vers num="1.2.2"/>
        <vers num="1.2.2.3"/>
        <vers num="1.2.2.4"/>
        <vers num="1.6.0"/>
        <vers num="1.6.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1922" seq="2004-1922" published="2004-04-11" modified="2016-10-17" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 5.5 and 6.0 allocates memory based on the memory size written in the BMP file instead of the actual BMP file size, which allows remote attackers to cause a denial of service (memory consumption) via a small BMP file with has a large memory size.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108183130827872&amp;w=2">20040411 Microsoft Internet Explorer BMP file memory DoS vulnerability</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.5"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1923" seq="2004-1923" published="2004-04-11" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to gain sensitive information via a direct request to (1) banner_click.php, (2) categorize.php, (3) tiki-admin_include_directory.php, (4) tiki-directory_search.php, which reveal the web server path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108180073206947&amp;w=2">20040412 Multiple Vulnerabilities In Tiki CMS/Groupware [ TikiWiki ]</ref>
      <ref source="CONFIRM" url="http://tikiwiki.org/tiki-read_article.php?articleId=66" patch="1">http://tikiwiki.org/tiki-read_article.php?articleId=66</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10100" adv="1" patch="1">10100</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15847">tikiwiki-path-disclosure(15847)</ref>
    </refs>
    <vuln_soft>
      <prod name="tikiwiki_cms/groupware" vendor="tiki">
        <vers num="1.6.1"/>
        <vers num="1.8.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1924" seq="2004-1924" published="2004-04-11" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allow remote attackers to inject arbitrary web script or HTML via via the (1) theme parameter to tiki-switch_theme.php, (2) find and priority parameters to messu-mailbox.php, (3) flag, priority, flagval, sort_mode, or find parameters to messu-read.php, (4) articleId parameter to tiki-read_article.php, (5) parentId parameter to tiki-browse_categories.php, (6) comments_threshold parameter to tiki-index.php (7) articleId parameter to tiki-print_article.php, (8) galleryId parameter to tiki-list_file_gallery.php, (9) galleryId parameter to tiki-upload_file.php, (10) faqId parameter to tiki-view_faq.php, (11) chartId parameter to tiki-view_chart.php, or (12) surveyId parameter to tiki-survey_stats_survey.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108180073206947&amp;w=2">20040412 Multiple Vulnerabilities In Tiki CMS/Groupware [ TikiWiki ]</ref>
      <ref source="CONFIRM" url="http://tikiwiki.org/tiki-read_article.php?articleId=66" patch="1">http://tikiwiki.org/tiki-read_article.php?articleId=66</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10100" adv="1" patch="1">10100</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15846">tikiwiki-xss(15846)</ref>
    </refs>
    <vuln_soft>
      <prod name="tikiwiki_cms/groupware" vendor="tiki">
        <vers num="1.6.1"/>
        <vers num="1.8.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1925" seq="2004-1925" published="2004-04-12" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allow remote attackers to execute arbitrary SQL commands via the sort_mode parameter in (1) tiki-usermenu.php, (2) tiki-list_file_gallery.php, (3) tiki-directory_ranking.php, (4) tiki-browse_categories.php, (5) tiki-index.php, (6) tiki-user_tasks.php, (7) tiki-directory_ranking.php, (8) tiki-directory_search.php, (9) tiki-file_galleries.php, (10) tiki-list_faqs.php, (11) tiki-list_trackers.php, (12) tiki-list_blogs.php, or via the offset parameter in (13) tiki-usermenu.php, (14) tiki-browse_categories.php, (15) tiki-index.php, (16) tiki-user_tasks.php, (17) tiki-list_faqs.php, (18) tiki-list_trackers.php, or (19) tiki-list_blogs.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108180073206947&amp;w=2">20040411 Multiple Vulnerabilities In Tiki CMS/Groupware [ TikiWiki ]</ref>
      <ref source="CONFIRM" url="http://tikiwiki.org/tiki-read_article.php?articleId=66" adv="1" patch="1">http://tikiwiki.org/tiki-read_article.php?articleId=66</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10100" adv="1" patch="1">10100</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15845">tikiwiki-sql-injection(15845)</ref>
    </refs>
    <vuln_soft>
      <prod name="tikiwiki_cms/groupware" vendor="tiki">
        <vers num="1.6.1"/>
        <vers num="1.8.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1926" seq="2004-1926" published="2004-04-11" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to inject arbitrary code via the (1) Theme, (2) Country, (3) Real Name, or (4) Displayed time zone fields in a User Profile, or the (5) Name, (6) Description, (7) URL, or (8) Country fields in a Directory/Add Site operation.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108180073206947&amp;w=2">20040412 Multiple Vulnerabilities In Tiki CMS/Groupware [ TikiWiki ]</ref>
      <ref source="CONFIRM" url="http://tikiwiki.org/tiki-read_article.php?articleId=66" patch="1">http://tikiwiki.org/tiki-read_article.php?articleId=66</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10100" adv="1" patch="1">10100</ref>
    </refs>
    <vuln_soft>
      <prod name="tikiwiki_cms/groupware" vendor="tiki">
        <vers num="1.6.1"/>
        <vers num="1.8.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1927" seq="2004-1927" published="2004-04-11" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the map feature (tiki-map.phtml) in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to determine the existence of arbitrary files via .. (dot dot) sequences in the mapfile parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108180073206947&amp;w=2">20040412 Multiple Vulnerabilities In Tiki CMS/Groupware [ TikiWiki ]</ref>
      <ref source="CONFIRM" url="http://tikiwiki.org/tiki-read_article.php?articleId=66" patch="1">http://tikiwiki.org/tiki-read_article.php?articleId=66</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10100" adv="1" patch="1">10100</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15848">tikiwiki-tikimap-file-disclosure(15848)</ref>
    </refs>
    <vuln_soft>
      <prod name="tikiwiki_cms/groupware" vendor="tiki">
        <vers num="1.6.1"/>
        <vers num="1.8.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1928" seq="2004-1928" published="2004-04-12" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The image upload feature in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to upload and possibly execute arbitrary files via the img/wiki_up URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108180073206947&amp;w=2">20040412 Multiple Vulnerabilities In Tiki CMS/Groupware [ TikiWiki ]</ref>
      <ref source="CONFIRM" url="http://tikiwiki.org/tiki-read_article.php?articleId=66" adv="1" patch="1">http://tikiwiki.org/tiki-read_article.php?articleId=66</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10100" adv="1" patch="1">10100</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15849">tikiwiki-file-upload(15849)</ref>
    </refs>
    <vuln_soft>
      <prod name="tikiwiki_cms/groupware" vendor="tiki">
        <vers num="1.6.1"/>
        <vers num="1.8.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1929" seq="2004-1929" published="2004-04-13" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the bblogin function in functions.php in PHP-Nuke 6.x through 7.2 allows remote attackers to bypass authentication and gain access by injecting base64-encoded SQL code into the user parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108180111826852&amp;w=2">20040412 [waraxe-2004-SA#017 - User-level authentication bypass in phpnuke 6.x-7.2]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10135" adv="1">10135</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=17" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=17</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15839">phpnuke-bypass-authentication(15839)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="5.5"/>
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1930" seq="2004-1930" published="2004-04-12" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the cookiedecode function in mainfile.php for PHP-Nuke 6.x through 7.2, when themes are used, allows remote attackers to inject arbitrary web script or HTML via a base64-encoded user parameter or cookie.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108182759214035&amp;w=2">20040412 [waraxe-2004-SA#016 - Cross-Site Scripting aka XSS in phpnuke 6.x-7.2 part 3]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10128" adv="1">10128</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=16" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=16</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15842">phpnuke-cookiedecode-xss(15842)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1932" seq="2004-1932" published="2004-04-12" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in (1) auth.php and (2) admin.php in PHP-Nuke 6.x through 7.2 allows remote attackers to execute arbitrary SQL code and create an administrator account via base64-encoded SQL in the admin parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108180334918576&amp;w=2">20040412 [waraxe-2004-SA#018 - Admin-level authentication bypass in phpnuke 6.x-7.2]</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=18" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=18</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15835">phpnuke-admin-bypass-authentication(15835)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1933" seq="2004-1933" published="2004-04-12" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Citadel/UX 5.00 through 6.14 installs the database directory and files with world-read permissions, which could allow local users to bypass access controls and read unauthorized messages.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108180024428804&amp;w=2">20040412 Citadel/UX 6.20 fixes local permissions vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10102" adv="1" patch="1">10102</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15850">citadel-database-insecure-permissions(15850)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1934" seq="2004-1934" published="2004-04-15" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in affich.php in Gemitel 3.50 allows remote attackers to execute arbitrary PHP code via the base parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108206642725505&amp;w=2">20040415 Include vulnerability in GEMITEL v 3.50</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009824">1009824</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10156" adv="1" patch="1">10156</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15887">gemitel-spturnphpfile-include(15887)</ref>
    </refs>
    <vuln_soft>
      <prod name="gemitel" vendor="isesam">
        <vers num="3.50"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1935" seq="2004-1935" published="2004-04-15" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in SCT Campus Pipeline allows remote attackers to inject arbitrary web script or HTML via onload, onmouseover, and other Javascript events in an e-mail attachment.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108207280917231&amp;w=2">20040415 SCT javascript execution vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10154" adv="1" patch="1">10154</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15878">sct-campus-attachment-xss(15878)</ref>
    </refs>
    <vuln_soft>
      <prod name="campus_pipeline" vendor="sct_corporation">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1936" seq="2004-1936" published="2004-04-14" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ZoneAlarm Pro 4.5.538.001 and possibly other versions allows remote attackers to bypass e-mail protection via attachments whose names contain certain non-English characters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108206751931251&amp;w=2">20040414 ZA Security Hole</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108248415509417&amp;w=2">20040420 Re: ZA Security Hole</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10148">10148</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15884">zonealarm-email-bypass-security(15884)</ref>
    </refs>
    <vuln_soft>
      <prod name="zonealarm" vendor="zonelabs">
        <vers num="2.4" edition=":pro"/>
        <vers num="2.6" edition=":pro"/>
        <vers num="3.0" edition=":pro"/>
        <vers num="3.1" edition=":pro"/>
        <vers num="4.0" edition=":plus"/>
        <vers num="4.0" edition=":pro"/>
        <vers num="4.5" edition=":pro"/>
        <vers num="4.5.538.001" edition=":plus"/>
        <vers num="4.5.538.001" edition=":pro"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1937" seq="2004-1937" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in Nuked-KlaN 1.4b and 1.5b allow remote attackers to read or include arbitrary files via .. sequences in (1) the user_langue parameter to index.php or (2) the langue parameter to update.php, or modify arbitrary GLOBAL variables by causing globals.php to be loaded before conf.inc.php via (3) .. sequences in the file parameter with the page parameter set to globals, or (4) ../globals.php in the user_langue parameter, as demonstrated by modifying $nuked[prefix] in the Suggest module.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108222826225823&amp;w=2">20040417 [SCSA-028] Nuked-Klan Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://www.phpsecure.info/v2/tutos/frog/Nuked-KlaN.txt" patch="1">http://www.phpsecure.info/v2/tutos/frog/Nuked-KlaN.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10104" patch="1">10104</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15843">nuked-klan-file-include(15843)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15844">nuked-klan-configurtion-corruption(15844)</ref>
    </refs>
    <vuln_soft>
      <prod name="nuked-klan" vendor="nuked-klan">
        <vers num="1.2"/>
        <vers num="1.2_beta"/>
        <vers num="1.3"/>
        <vers num="1.3_beta"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.5_sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1938" seq="2004-1938" published="2004-04-19" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in userlogin.php in Phorum 3.4.7 allows remote attackers to execute arbitrary SQL commands via doubly hex-encoded characters such as "%2527", which is translated to "'", as demonstrated using the phorum_uriauth parameter to list.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108239796512897&amp;w=2">20040419 [waraxe-2004-SA#019 - Critical sql injection bug in Phorum 3.4.7]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10173" adv="1" patch="1">10173</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=19" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=19</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15894">phorum-userlogin-sql-injection(15894)</ref>
    </refs>
    <vuln_soft>
      <prod name="phorum" vendor="phorum">
        <vers num="3.4.7"/>
        <vers num="3.4.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1939" seq="2004-1939" published="2004-04-14" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Zaep AntiSpam 2.0 allows remote attackers to inject arbitrary web script or HTML via double encoded slashes (%252F) in the key parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108241507812681&amp;w=2">20040419 Zaep AntiSpam Cross Site Scripting</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5EP0I15CKK.html" adv="1" patch="1">http://www.securiteam.com/windowsntfocus/5EP0I15CKK.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10139" patch="1">10139</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15858">zaep-antispam-xss(15858)</ref>
    </refs>
    <vuln_soft>
      <prod name="zaep_antispam" vendor="rhinosoft">
        <vers num="2.0"/>
        <vers num="2.0_.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1940" seq="2004-1940" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">sipclient.cpp in KPhone 4.0.1 and earlier allows remote attackers to cause a denial of service (crash) via a STUN response packet with a large attrLen value that causes an out-of-bounds read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108244325924859&amp;w=2">20040419 KPhone STUN DoS (Malformed STUN Packets)</ref>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/5PP0B1FCLY.html">http://www.securiteam.com/unixfocus/5PP0B1FCLY.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10159" patch="1">10159</ref>
      <ref source="CONFIRM" url="http://www.wirlab.net/kphone/changes-4.0.2.html" patch="1">http://www.wirlab.net/kphone/changes-4.0.2.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15874">kphone-stun-dos(15874)</ref>
    </refs>
    <vuln_soft>
      <prod name="kphone" vendor="kphone">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.11"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.11"/>
        <vers num="3.12"/>
        <vers num="3.13"/>
        <vers num="3.14"/>
        <vers num="4.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1941" seq="2004-1941" published="2004-04-19" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Fastream NETFile FTP/Web Server 6.5.1.980 allows remote attackers to cause a denial of service via a username that does not exist.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108239249613861&amp;w=2">20040419 DoS in  NETFile FTP/Web Server</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009868">1009868</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/FastreamNETFileFWServer6.5.1.980-adv.txt" adv="1">http://www.autistici.org/fdonato/advisory/FastreamNETFileFWServer6.5.1.980-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10169" patch="1">10169</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15899">fastream-user-pass-dos(15899)</ref>
    </refs>
    <vuln_soft>
      <prod name="netfile_ftp_web_server" vendor="fastream">
        <vers num="6.5.1.980"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1942" seq="2004-1942" published="2004-04-19" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Solaris 9 patches 113579-02 through 113579-05, and 114342-02 through 114342-05, prevent ypserv and ypxfrd from properly restricting access to secure NIS maps, which allows local users to use ypcat or ypmatch to extract the contents of a secure map such as passwd.adjunct.byname.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108241638500417&amp;w=2">20040419 Solaris 9 patch 113579-03 introduces a NIS security bug</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57554-1" adv="1" patch="1">57554</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-144.shtml" adv="1" patch="1">O-144</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10261" adv="1" patch="1">10261</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15908">solaris-nis-unauth-privileges(15908)</ref>
    </refs>
    <vuln_soft>
      <prod name="patch_manager" vendor="sun">
        <vers num="113579-02"/>
        <vers num="113579-03"/>
        <vers num="113579-04"/>
        <vers num="113579-05"/>
        <vers num="114342-02"/>
        <vers num="114342-03"/>
        <vers num="114342-04"/>
        <vers num="114342-05"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1943" seq="2004-1943" published="2004-04-19" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in album_portal.php in phpBB modified by Przemo 1.8 allows remote attackers to execute arbitrary PHP code via the phpbb_root_path parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108244738102532&amp;w=2">20040419 phpBB modified by Przemo arbitary code execution</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10177" adv="1" patch="1">10177</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15916">phpbb-albumportal-file-include(15916)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb_group">
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.6c"/>
        <vers num="2.0.6d"/>
        <vers num="2.0.7"/>
        <vers num="2.0.7a"/>
        <vers num="2.0.8"/>
        <vers num="2.0.8a"/>
        <vers num="2.0_beta1"/>
        <vers num="2.0_rc1"/>
        <vers num="2.0_rc2"/>
        <vers num="2.0_rc3"/>
        <vers num="2.0_rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1944" seq="2004-1944" published="2004-04-14" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Eudora 6.1 and 6.0.3 for Windows allows remote attackers to cause a denial of service (crash) via a deeply nested multipart MIME message.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.html" adv="1">20040414 Eudora 6.0.3 nested MIME DoS</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108241694627321&amp;w=2">20040419 Eudora 6.1 is evil</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10137" adv="1">10137</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15857">eudora-mime-message-dos(15857)</ref>
    </refs>
    <vuln_soft>
      <prod name="eudora" vendor="qualcomm">
        <vers num="6.0.3"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1945" seq="2004-1945" published="2004-04-20" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Kinesphere eXchange POP3 allows remote attackers to execute arbitrary code via a long MAIL FROM field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108247921402458&amp;w=2">20040419 Exchange pop3 remote exploit</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108568462428096&amp;w=2">20040527 Re: Exchange pop3 remote exploit</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009882" adv="1">1009882</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10180" adv="1" patch="1">10180</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15922">exchange-pop3-smtp-bo(15922)</ref>
    </refs>
    <vuln_soft>
      <prod name="exchange_pop3" vendor="kinesphere_corporation">
        <vers num="4.0"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1946" seq="2004-1946" published="2004-04-19" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the PRINT_ERROR function in common.c for Cherokee Web Server 0.4.16 and earlier allows local users to execute arbitrary code via format string specifiers in the -C command line argument.  NOTE: it is not clear whether this issue could be exploited remotely, or if Cherokee is running at escalated privileges. Therefore it might not be a vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108249818308672&amp;w=2">20040420 Format String in Cherokee</ref>
      <ref source="MISC" url="http://www.nosystem.com.ar/advisories/advisory-03.txt" adv="1">http://www.nosystem.com.ar/advisories/advisory-03.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15924">cherokee-printerror-format-string(15924)</ref>
    </refs>
    <vuln_soft>
      <prod name="cherokee_httpd" vendor="cherokee">
        <vers num="0.4.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1947" seq="2004-1947" published="2004-04-19" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The AVXSCANONLINE.AvxScanOnlineCtrl.1 ActiveX control in BitDefender Scan Online allows remote attackers to (1) obtain sensitive information such as system drives and contents or (2) use the RequestFile method to download and execute arbitrary code via an object codebase that uses bitdefender.cab.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108240639427412&amp;w=2">20040419 BitDefender Scan Online(ActiveX) - Remote File Download &amp; Execute &amp; Private Information Disclosure</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108248367901616&amp;w=2">20040420 Re: BitDefender Scan Online(ActiveX) - Remote File Download &amp; Execute &amp; Private Information Disclosure</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009862">1009862</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10174">10174</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10175" adv="1" patch="1">10175</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15911">bitdefender-avxscanonline-code-execution(15911)</ref>
    </refs>
    <vuln_soft>
      <prod name="bitdefender" vendor="softwin">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1948" seq="2004-1948" published="2004-04-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">NcFTP client 3.1.6 and 3.1.7, when the username and password are included in an FTP URL that is provided on the command line, allows local users to obtain sensitive information via "ps aux," which displays the URL in the process list.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108247943201685&amp;w=2">20040419 NcFTP - password leaking</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10182" adv="1">10182</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15919">ncftp-info-disclosure(15919)</ref>
    </refs>
    <vuln_soft>
      <prod name="ncftp" vendor="ncftp_software">
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.1.0"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.4"/>
        <vers num="3.1.5"/>
        <vers num="3.1.6"/>
        <vers num="3.1.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1949" seq="2004-1949" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in PostNuke 7.2.6 and earlier allows remote attackers to execute arbitrary SQL via (1) the sif parameter to index.php in the Comments module or (2) timezoneoffset parameter to changeinfo.php in the Your_Account module.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020154.html">20040414 [SCAN Associates Sdn Bhd Security Advisory] Postnuke v 0.726 and below SQL injection</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108256503718978&amp;w=2">20040420 [PNSA 2004-2] PostNuke Security Advisory PNSA 2004-2</ref>
      <ref source="CONFIRM" url="http://news.postnuke.com/Article2580.html" adv="1">http://news.postnuke.com/Article2580.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009801">1009801</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10146" patch="1">10146</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15869">postnuke-indexphp-sql-injection(15869)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15875">postnuke-changeinfo-sql-injection(15875)</ref>
    </refs>
    <vuln_soft>
      <prod name="postnuke" vendor="postnuke_software_foundation">
        <vers num="0.726"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1950" seq="2004-1950" published="2004-04-19" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">phpBB 2.0.8a and earlier trusts the IP address that is in the X-Forwarded-For in the HTTP header, which allows remote attackers to spoof IP addresses.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108239864203144&amp;w=2">20040419 phpBB 2.0.8a and lower - IP spoofing vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108241122908409&amp;w=2">20040419 Re: phpBB 2.0.8a and lower - IP spoofing vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10170" adv="1" patch="1">10170</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15909">phbb-common-ip-spoofing(15909)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb_group">
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.6c"/>
        <vers num="2.0.6d"/>
        <vers num="2.0.7"/>
        <vers num="2.0.7a"/>
        <vers num="2.0.8"/>
        <vers num="2.0.8a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1951" seq="2004-1951" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">xine 1.x alpha, 1.x beta, and 1.0rc through 1.0rc3a, and xine-ui 0.9.21 to 0.9.23 allows remote attackers to overwrite arbitrary files via the (1) audio.sun_audio_device or (2) dxr3.devicename options in an MRL link.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200404-20.xml" patch="1">GLSA-200404-20</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10193" patch="1">10193</ref>
      <ref source="SLACKWARE" url="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2004&amp;m=slackware-security.372791">SSA:2004-111</ref>
      <ref source="CONFIRM" url="http://www.xinehq.de/index.php/security/XSA-2004-1" adv="1">http://www.xinehq.de/index.php/security/XSA-2004-1</ref>
      <ref source="CONFIRM" url="http://www.xinehq.de/index.php/security/XSA-2004-2" adv="1">http://www.xinehq.de/index.php/security/XSA-2004-2</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15939">xine-mrl-file-overwrite(15939)</ref>
    </refs>
    <vuln_soft>
      <prod name="xine" vendor="xine">
        <vers num="0.9.8"/>
        <vers num="0.9.13"/>
        <vers num="1_beta1"/>
        <vers num="1_beta2"/>
        <vers num="1_beta3"/>
        <vers num="1_beta4"/>
        <vers num="1_beta5"/>
        <vers num="1_beta6"/>
        <vers num="1_beta7"/>
        <vers num="1_beta8"/>
        <vers num="1_beta9"/>
        <vers num="1_beta10"/>
        <vers num="1_beta11"/>
        <vers num="1_beta12"/>
        <vers num="1_rc0a"/>
        <vers num="1_rc1"/>
        <vers num="1_rc2"/>
        <vers num="1_rc3"/>
        <vers num="1_rc3a"/>
        <vers num="1_rc3b"/>
      </prod>
      <prod name="xine-lib" vendor="xine">
        <vers num="1_rc2"/>
        <vers num="1_rc3a"/>
        <vers num="1_rc3b"/>
        <vers num="1_rc3c"/>
      </prod>
      <prod name="xine-ui" vendor="xine">
        <vers num="0.9.21"/>
        <vers num="0.9.22"/>
        <vers num="0.9.23"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1952" seq="2004-1952" published="2004-04-23" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Advanced Guestbook 2.2 allows remote attackers to execute arbitrary SQL commands and gain privileges via the password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2005-02/0138.html" adv="1">20050212 Re: Advanced Guestbook 2.2 -- SQL Injection Exploit</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108258046402890&amp;w=2">20040421 Advanced Guestbook 2.2 -- SQL Injection Exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10209" adv="1" patch="1">10209</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15892">advancedguestbook-sql-injection(15892)</ref>
    </refs>
    <vuln_soft>
      <prod name="advanced_guestbook" vendor="advanced_guestbook">
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1953" seq="2004-1953" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">phProfession 2.5 allows remote attackers to gain sensitive information via a direct HTTP request to upload.php, which reveals the path in a PHP error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108258931430060&amp;w=2">20040421 [waraxe-2004-SA#021 - Multiple vulnerabilities in phprofession 2.5 module for PostNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10190">10190</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=21">http://www.waraxe.us/index.php?modname=sa&amp;id=21</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15930">phprofession-upload-path-disclosure(15930)</ref>
    </refs>
    <vuln_soft>
      <prod name="phprofession" vendor="phprofession">
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1954" seq="2004-1954" published="2004-04-21" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in modules.php in phProfession 2.5 allows remote attackers to inject arbitrary web script or HTML via the jcode parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108258931430060&amp;w=2">20040421 [waraxe-2004-SA#021 - Multiple vulnerabilities in phprofession 2.5 module for PostNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10190" adv="1">10190</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=21" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=21</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15931">phprofession-jcode-xss(15931)</ref>
    </refs>
    <vuln_soft>
      <prod name="phprofession" vendor="phprofession">
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1955" seq="2004-1955" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in modules.php in phProfession 2.5 allows remote attackers to execute arbitrary SQL code via the offset parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108258931430060&amp;w=2">20040421 [waraxe-2004-SA#021 - Multiple vulnerabilities in phprofession 2.5 module for PostNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10190">10190</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=21">http://www.waraxe.us/index.php?modname=sa&amp;id=21</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15932">phprofession-offset-sql-injection(15932)</ref>
    </refs>
    <vuln_soft>
      <prod name="phprofession" vendor="phprofession">
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1956" seq="2004-1956" published="2004-04-21" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">PostNuke 0.7.2.6 allows remote attackers to gain information via a direct HTTP request to files in the (1) includes/blocks directory, (2) pnadodb directory, (3) NS-NewUser module, (4) NS-Your_Account, (5) NS-LostPassword module, or (6) NS-User module which reveals the path to the web server in a PHP error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108258902000472&amp;w=2">20040421 [waraxe-2004-SA#022 - Multiple vulnerabilities in PostNuke 0.726 Phoenix - part 2]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10191" adv="1">10191</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=22" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=22</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15933">postnuke-scripts-modules-path-disclosure(15933)</ref>
    </refs>
    <vuln_soft>
      <prod name="postnuke" vendor="postnuke_software_foundation">
        <vers num="0.726"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1957" seq="2004-1957" published="2004-04-21" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in PostNuke 0.726 allows remote attackers to inject arbitrary web script or HTML via the (1) lid and query parameters to the Downloads module, (2) query parameter to the Web_links module, or (3) hlpfile parameter to openwindow.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108258902000472&amp;w=2">20040421 [waraxe-2004-SA#022 - Multiple vulnerabilities in PostNuke 0.726 Phoenix - part 2]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10191" adv="1">10191</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=22" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=22</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15934">postnuke-openwindow-xss(15934)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1958" seq="2004-1958" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in manifest.ini in Unreal engine allows remote attackers to overwrite arbitrary files via .. (dot dot) sequences in a UMOD (Unreal MOD) file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/umod-adv.txt">http://aluigi.altervista.org/adv/umod-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108267310519459&amp;w=2">20040422 Arbitrary file overwriting in Unreal engine through UMOD</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10196">10196</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15942">unreal-umod-dotdot-file-overwrite(15942)</ref>
    </refs>
    <vuln_soft>
      <prod name="unreal_engine" vendor="epic_games">
        <vers num="433"/>
        <vers num="436"/>
      </prod>
      <prod name="unreal_tournament" vendor="epic_games">
        <vers num="451b"/>
      </prod>
      <prod name="unreal_tournament_2003" vendor="epic_games">
        <vers num="2199_macos"/>
        <vers num="2199_win32"/>
        <vers num="2225_macos"/>
        <vers num="2225_win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1959" seq="2004-1959" published="2004-04-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">blocker_query.php in Protector System 1.15b1 for PHP-Nuke allows remote attackers to gain sensitive information via a string in the portNum parameter, which reveals the full path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108276299810121&amp;w=2">20040423 [waraxe-2004-SA#025 - Multiple vulnerabilities in Protector for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10206" adv="1" patch="1">10206</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=25" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=25</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15963">protector-blockerquery-path-disclosure(15963)</ref>
    </refs>
    <vuln_soft>
      <prod name="protector_system" vendor="protector_system">
        <vers num="1.15b1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1960" seq="2004-1960" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in blocker_query.php in Protector System 1.15b1 allows remote attackers to inject arbitrary web script or HTML via the (1) target or (2) portNum parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/361300/2004-04-21/2004-04-27/0">20040423 [waraxe-2004-SA#025 - Multiple vulnerabilities in Protector System 1.15b1 for PhpNuke]</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/bid/10206">20040423 [waraxe-2004-SA#025 - Multiple vulnerabilities in Protector for PhpNuke]</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=25">http://www.waraxe.us/index.php?modname=sa&amp;id=25</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15965">protector-blockerquery-xss(15965)</ref>
    </refs>
    <vuln_soft>
      <prod name="protector_system" vendor="protector_system">
        <vers num="1.15b1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1961" seq="2004-1961" published="2004-04-23" modified="2016-12-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">blocker.php in Protector System 1.15b1 allows remote attackers to bypass SQL injection protection and execute limited SQL commands via URL-encoded "'" characters ("%27").</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/361300/2004-04-21/2004-04-27/0">20040423 [waraxe-2004-SA#025 - Multiple vulnerabilities in Protector System 1.15b1 for PhpNuke]</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/bid/10206">20040423 [waraxe-2004-SA#025 - Multiple vulnerabilities in Protector for PhpNuke]</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=25" adv="1" patch="1">http://www.waraxe.us/index.php?modname=sa&amp;id=25</ref>
    </refs>
    <vuln_soft>
      <prod name="protector_system" vendor="protector_system">
        <vers num="1.15b1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1962" seq="2004-1962" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in Protector System 1.15b1 allows remote attackers to bypass SQL injection filters by using "/**/" sequences in the targeted fields.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/361300/2004-04-21/2004-04-27/0">20040423 [waraxe-2004-SA#025 - Multiple vulnerabilities in Protector System 1.15b1 for PhpNuke]</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/bid/10206">20040423 [waraxe-2004-SA#025 - Multiple vulnerabilities in Protector for PhpNuke]</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=25">http://www.waraxe.us/index.php?modname=sa&amp;id=25</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15969">protector-sql-filter-bypass(15969)</ref>
    </refs>
    <vuln_soft>
      <prod name="protector_system" vendor="protector_system">
        <vers num="1.15b1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1963" seq="2004-1963" published="2004-04-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">nqt.php in Network Query Tool (NQT) 1.6 allows remote attackers to obtain sensitive information via a string in the portNum parameter, which reveals the full path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108276405108267&amp;w=2">20040423 [waraxe-2004-SA#024 - XSS and full path disclosure in Network Query Tool 1.6]</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=24" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=24</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15957">nqt-nqtphp-path-disclosure(15957)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1964" seq="2004-1964" published="2004-04-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in nqt.php in Network Query Tool (NQT) 1.6 allows remote attackers to inject arbitrary web script or HTML via the portNum parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108276405108267&amp;w=2">20040423 [waraxe-2004-SA#024 - XSS and full path disclosure in Network Query Tool 1.6]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10205" adv="1">10205</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=24">http://www.waraxe.us/index.php?modname=sa&amp;id=24</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15929">nqt-nqtphp-xss(15929)</ref>
    </refs>
    <vuln_soft>
      <prod name="network_query_tool" vendor="freshmeat">
        <vers num="1.0"/>
        <vers num="1.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1965" seq="2004-1965" published="2004-04-25" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108301983206107&amp;w=2">20040425 Multiple Vulnerabilities In OpenBB</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009935" adv="1">1009935</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10214" adv="1">10214</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15966">openbb-multiple-scripts-xss(15966)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1966" seq="2004-1966" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) FID parameter in board.php, (2) sortorder, perpage, or id parameters in member.php, (3) forums parameter in search.php, or (4) PID or FID parameters in post.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108301983206107&amp;w=2">20040425 Multiple Vulnerabilities In OpenBB</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009935">1009935</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10214">10214</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15964">openbb-multiplescripts-sql-injection(15964)</ref>
    </refs>
    <vuln_soft>
      <prod name="openbb" vendor="openbb">
        <vers num="1.0.0_beta1"/>
        <vers num="1.0.0_rc1"/>
        <vers num="1.0.0_rc2"/>
        <vers num="1.0.0_rc3"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1967" seq="2004-1967" published="2004-04-25" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerabilities in (1) cp_forums.php, (2) cp_usergroup.php, (3) cp_ipbans.php, (4) myhome.php, (5) post.php, or (6) moderator.php in Open Bulletin Board (OpenBB) 1.0.6 and earlier allow remote attackers to execute arbitrary code by including the code in an image tag or a link.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108301983206107&amp;w=2">20040425 Multiple Vulnerabilities In OpenBB</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009935" adv="1">1009935</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15967">openbb-tags-execute-code(15967)</ref>
    </refs>
    <vuln_soft>
      <prod name="openbb" vendor="openbb">
        <vers num="1.0.0_beta1"/>
        <vers num="1.0.0_rc1"/>
        <vers num="1.0.0_rc2"/>
        <vers num="1.0.0_rc3"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1968" seq="2004-1968" published="2004-04-26" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The readmsg action in myhome.php in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to read arbitrary messages by modifying the id parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108301983206107&amp;w=2">20040425 Multiple Vulnerabilities In OpenBB</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009935" adv="1">1009935</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10217" adv="1">10217</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15970">openbb-myhomephp-obtain-information(15970)</ref>
    </refs>
    <vuln_soft>
      <prod name="openbb" vendor="openbb">
        <vers num="1.0_.0_beta1"/>
        <vers num="1.0_.0_rc1"/>
        <vers num="1.0_.0_rc2"/>
        <vers num="1.0_.0_rc3"/>
        <vers num="1.0_.5"/>
        <vers num="1.0_.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1969" seq="2004-1969" published="2004-04-25" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The avatar upload capability in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to execute arbitrary script by uploading files that include scripting code such as Javascript.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108301983206107&amp;w=2">20040425 Multiple Vulnerabilities In OpenBB</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009935" adv="1">1009935</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10218" adv="1">10218</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15971">openbb-file-upload(15971)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1970" seq="2004-1970" published="2004-04-26" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Samsung SmartEther SS6215S switch, and possibly other Samsung switches, allows remote attackers and local users to gain administrative access by providing the admin username followed by a password that is the maximum allowed length, then pressing the enter key after the resulting error message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108300407424571&amp;w=2">20040426 Samsung SmartEther SS6215S Switch</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10219" adv="1">10219</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15973">samsung-smartether-admin-access(15973)</ref>
    </refs>
    <vuln_soft>
      <prod name="smartether_ss6215s_switch" vendor="securecomputing">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1971" seq="2004-1971" published="2004-04-26" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">modules.php in PHP-Nuke Video Gallery Module 0.1 Beta 5 allows remote attackers to gain sensitive information via an HTTP request with an invalid (1) catid or (2) clipid parameter, which reveals the full path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108308660628557&amp;w=2">20040426 Multiple vulnerabilities PHP-Nuke Video Gallery Module for PHP-Nuke</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15978">video-gallery-error-path-disclosure(15978)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1972" seq="2004-1972" published="2004-04-26" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in modules.php in PHP-Nuke Video Gallery Module 0.1 Beta 5 allows remote attackers to execute arbitrary SQL code via the (1) clipid or (2) catid parameters in a viewclip, viewcat, or voteclip action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108308660628557&amp;w=2">20040426 Multiple vulnerabilities PHP-Nuke Video Gallery Module for PHP-Nuke</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10215" adv="1">10215</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15979">video-gallery-sql-injection(15979)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1973" seq="2004-1973" published="2004-04-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">DiGi Web Server allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request that contains a large number of / (slash) characters, which consumes resources when DiGi converts the slashes to \ (backslash) characters.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108311170018203&amp;w=2">20040427 resources consumption in DiGi WWW Server</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Apr/1009957.html">1009957</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=234261" patch="1">http://sourceforge.net/project/shownotes.php?release_id=234261</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/DiGiWwwServerC1-adv.txt">http://www.autistici.org/fdonato/advisory/DiGiWwwServerC1-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10228" adv="1" patch="1">10228</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15987">digi-www-slash-dos(15987)</ref>
    </refs>
    <vuln_soft>
      <prod name="www_server" vendor="digi">
        <vers num="compieuw" edition="beta1"/>
        <vers num="compieuw" edition="beta2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1974" seq="2004-1974" published="2004-04-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">paFileDB 3.1 allows remote attackers to gain sensitive information via a direct request to (1) login.php, (2) category.php, (3) search.php, (4) main.php, (5) viewall.php, (6) download.php, (7) email.php, (8) file.php, (9) rate.php, or (10) stats.php, which reveals the path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108311096022485&amp;w=2">20040427 Multiple vulnerabilities paFileDB</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15990">pafiledb-loginphp-path-disclosure(15990)</ref>
    </refs>
    <vuln_soft>
      <prod name="pafiledb" vendor="php_arena">
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1975" seq="2004-1975" published="2004-04-27" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the category module in pafiledb.php for paFileDB 3.1 allows remote attackers to inject arbitrary web script or HTML via the id parameter, a vulnerability that is closely related to CVE-2004-1551.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108311096022485&amp;w=2">20040427 Multiple vulnerabilities paFileDB</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109613031414184&amp;w=2">20040925 New XSS vulnerabilities in paFileDB 3.1 final</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10229" adv="1">10229</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15992">pafiledb-pafiledbphp-xss(15992)</ref>
    </refs>
    <vuln_soft>
      <prod name="pafiledb" vendor="php_arena">
        <vers num="3.0"/>
        <vers num="3.0_beta_3.1"/>
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1976" seq="2004-1976" published="2004-04-28" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SMC Barricade broadband router 7008ABR and 7004VBR enable remote administration by default, which allows remote attackers to gain access by connecting to port 1900.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0101.html" patch="1">20040605 SMC 7008ABRv2 and 7004VBRv1 updated firmware corrects port 1900 issue.</ref>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020580.html">20040427 SMC Routers have remote administration enabled by default</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108317929931816&amp;w=2">20040428 SMC Routers have remote administration enabled by default</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10232" adv="1" patch="1">10232</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15993">barricade-router-gain-access(15993)</ref>
    </refs>
    <vuln_soft>
      <prod name="smc7004vbr" vendor="smc_networks">
        <vers num="1.032"/>
        <vers num="1.231"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1977" seq="2004-1977" published="2004-04-29" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">3com NBX IP VOIP NetSet Configuration Manager allows remote attackers to cause a denial of service (crash) via a Nessus scan in safeChecks mode.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108334887408554&amp;w=2">20040429 3com NBX VOIP NetSet Denial of Service Attack</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10240" adv="1">10240</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16015">3com-nbx-scan-dos(16015)</ref>
    </refs>
    <vuln_soft>
      <prod name="webbngss3nbxnts" vendor="3com">
        <vers num="4.0.17"/>
        <vers num="4.1.4"/>
        <vers num="4.1.21"/>
        <vers num="4.2.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1978" seq="2004-1978" published="2004-04-30" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in help.php in Moodle before 1.3 allows remote attackers to inject arbitrary HTML and web script via the text parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108335043825605&amp;w=2">20040430 Cross Site Scripting in Moodle &lt; 1.3</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010008">1010008</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10251" adv="1" patch="1">10251</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16023">moodle-help-xss(16023)</ref>
    </refs>
    <vuln_soft>
      <prod name="moodle" vendor="moodle">
        <vers num="1.1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1979" seq="2004-1979" published="2004-04-30" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in do_search.php in PROPS 0.6.1 allows remote attackers to inject arbitrary HTML or web script via the search_string parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108342671616155&amp;w=2">20040501 Props 0.6.1 XSS and Remote File Viewing Vulnerability</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=29581&amp;release_id=234433" patch="1">http://sourceforge.net/project/shownotes.php?group_id=29581&amp;release_id=234433</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10258" adv="1" patch="1">10258</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16035">props-dosearch-xss(16035)</ref>
    </refs>
    <vuln_soft>
      <prod name="props" vendor="props">
        <vers num="0.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1980" seq="2004-1980" published="2004-04-30" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in glossary.php in PROPS 0.6.1 allows remote attackers to view arbitrary files via a .. (dot dot) in (1) module or (2) format variables.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108342671616155&amp;w=2">20040501 Props 0.6.1 XSS and Remote File Viewing Vulnerability</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=29581&amp;release_id=234433" patch="1">http://sourceforge.net/project/shownotes.php?group_id=29581&amp;release_id=234433</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16036">props-glossary-obtain-information(16036)</ref>
    </refs>
    <vuln_soft>
      <prod name="props" vendor="props">
        <vers num="0.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1981" seq="2004-1981" published="2004-05-02" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The web interface for Crystal Reports allows remote attackers to cause a denial of service (disk exhaustion) by repeatedly requesting reports without retrieving the associated image files, which are not cleared from the image file folder.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360413811017&amp;w=2">20040502 Crystal Reports Vulnerabilities</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108671836127360&amp;w=2">20040608 Vulnerability: Arbitrary File Access &amp; DoS in Crystal Reports</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16046">crystalreports-dos(16046)</ref>
    </refs>
    <vuln_soft>
      <prod name="crystal_enterprise" vendor="businessobjects">
        <vers num="9"/>
        <vers num="10"/>
      </prod>
      <prod name="crystal_reports" vendor="businessobjects">
        <vers num="9"/>
        <vers num="10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1982" seq="2004-1982" published="2004-05-03" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Post.pl in YaBB 1 Gold SP 1.2 allows remote attackers to modify records in the board's .txt file via carriage return characters in the subject field.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360430703935&amp;w=2">20040502 Vulnerability in YaBB forum (Perl version without SQL)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10263" adv="1" patch="1">10263</ref>
      <ref source="CONFIRM" url="http://www.yabbforum.com/community/YaBB.pl?board=general;action=display;num=1093133233" adv="1">http://www.yabbforum.com/community/YaBB.pl?board=general;action=display;num=1093133233</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16050">yabb-subject-modify-file(16050)</ref>
    </refs>
    <vuln_soft>
      <prod name="yabb" vendor="yabb">
        <vers num="1_gold_-_sp_1"/>
        <vers num="1_gold_-_sp_1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1983" seq="2004-1983" published="2004-05-02" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The arch_get_unmapped_area function in mmap.c in the PaX patches for Linux kernel 2.6, when Address Space Layout Randomization (ASLR) is enabled, allows local users to cause a denial of service (infinite loop) via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360001130312&amp;w=2">20040502 PaX Linux Kernel 2.6 Patches DoS Advisory</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108420555920369&amp;w=2">20040509 PaX DoS proof-of-concept</ref>
      <ref source="CONFIRM" url="http://pax.grsecurity.net/" patch="1">http://pax.grsecurity.net/</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200407-02.xml" adv="1">GLSA-200407-02</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10264" adv="1" patch="1">10264</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16037">pax-aslr-enabled-dos(16037)</ref>
    </refs>
    <vuln_soft>
      <prod name="pax_linux" vendor="the_pax_team">
        <vers num="2.6.5"/>
      </prod>
      <prod name="linux" vendor="gentoo">
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1984" seq="2004-1984" published="2004-05-02" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers to obtain sensitive information via a direct HTTP request to (1) phpinfo.php, (2) addpic.php, (3) config.php, (4) db_input.php, (5) displayecard.php, (6) ecard.php, (7) crop.inc.php, which reveal the full path in a PHP error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360247732014&amp;w=2">20040502 [waraxe-2004-SA#026 - Multiple vulnerabilities in Coppermine Photo Gallery for PhpNuke]</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010001">1010001</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=26" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=26</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16039">coppermine-multiple-path-disclosure(16039)</ref>
    </refs>
    <vuln_soft>
      <prod name="coppermine_photo_gallery" vendor="coppermine">
        <vers num="1.0_rc3"/>
        <vers num="1.1_.0"/>
        <vers num="1.1_beta_2"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2_b"/>
      </prod>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1985" seq="2004-1985" published="2004-04-30" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in menu.inc.php in Coppermine Photo Gallery 1.2.2b allows remote attackers to inject arbitrary HTML or web script via the CPG_URL parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360247732014&amp;w=2">20040502 [waraxe-2004-SA#026 - Multiple vulnerabilities in Coppermine Photo Gallery for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10253" adv="1">10253</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=26">http://www.waraxe.us/index.php?modname=sa&amp;id=26</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16040">coppermine-menuincpho-xss(16040)</ref>
    </refs>
    <vuln_soft>
      <prod name="coppermine_photo_gallery" vendor="coppermine">
        <vers num="1.0_rc3"/>
        <vers num="1.1_.0"/>
        <vers num="1.1_beta_2"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2_b"/>
      </prod>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1986" seq="2004-1986" published="2004-04-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in modules.php in Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers with administrative privileges to read arbitrary files via a .. (dot dot) in the startdir parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360247732014&amp;w=2">20040502 [waraxe-2004-SA#026 - Multiple vulnerabilities in Coppermine Photo Gallery for PhpNuke]</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010001">1010001</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10253" adv="1">10253</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=26" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=26</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16042">coppermine-modulesphp-directory-traversal(16042)</ref>
    </refs>
    <vuln_soft>
      <prod name="coppermine_photo_gallery" vendor="coppermine">
        <vers num="1.0_rc3"/>
        <vers num="1.1_.0"/>
        <vers num="1.1_beta_2"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2_b"/>
      </prod>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1987" seq="2004-1987" published="2004-04-30" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">picmgmtbatch.inc.php in Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers with administrative privileges to execute arbitrary commands via shell metacharacters in the (1) $CONFIG['impath'] or (2) $CONFIG['jpeg_qual'] parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360247732014&amp;w=2">20040502  [waraxe-2004-SA#026 - Multiple vulnerabilities in Coppermine Photo Gallery for PhpNuke]</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010001">1010001</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10253" adv="1">10253</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=26" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=26</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16043">coppermine-parameters-execute-commands(16043)</ref>
    </refs>
    <vuln_soft>
      <prod name="coppermine_photo_gallery" vendor="coppermine">
        <vers num="1.0_rc3"/>
        <vers num="1.1_.0"/>
        <vers num="1.1_beta_2"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2_b"/>
      </prod>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1988" seq="2004-1988" published="2004-04-30" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in init.inc.php in Coppermine Photo Gallery 1.2.0 RC4 allows remote attackers to execute arbitrary PHP code by modifying the CPG_M_DIR to reference a URL on a remote web server that contains functions.inc.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360247732014&amp;w=2">20040502 [waraxe-2004-SA#026 - Multiple vulnerabilities in Coppermine Photo Gallery for PhpNuke]</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010001">1010001</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10253" adv="1">10253</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=26" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=26</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16041">coppermine-multiple-file-include(16041)</ref>
    </refs>
    <vuln_soft>
      <prod name="coppermine_photo_gallery" vendor="coppermine">
        <vers num="1.0_rc3"/>
        <vers num="1.1_.0"/>
        <vers num="1.1_beta_2"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2_b"/>
      </prod>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1989" seq="2004-1989" published="2004-04-30" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in theme.php in Coppermine Photo Gallery 1.2.2b allows remote attackers to execute arbitrary PHP code by modifying the THEME_DIR parameter to reference a URL on a remote web server that contains user_list_info_box.inc.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360247732014&amp;w=2">20040502 [waraxe-2004-SA#026 - Multiple vulnerabilities in Coppermine Photo Gallery for PhpNuke]</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010001">1010001</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10253" adv="1">10253</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=26" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=26</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16041">coppermine-multiple-file-include(16041)</ref>
    </refs>
    <vuln_soft>
      <prod name="coppermine_photo_gallery" vendor="coppermine">
        <vers num="1.0_rc3"/>
        <vers num="1.1_.0"/>
        <vers num="1.1_beta_2"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2_b"/>
      </prod>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1990" seq="2004-1990" published="2004-03-03" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Aldo's Web Server (aweb) 1.5 allows remote attackers to gain sensitive information via an arbitrary character, which reveals the full path and the user running the aweb process, possibly due to a malformed request.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360629031227&amp;w=2">20040503 Multible_Vulnerabilites_in_Aldos_Webserver</ref>
      <ref source="MISC" url="http://www.oliverkarow.de/research/AldosWebserverMultipleVulns.txt" adv="1">http://www.oliverkarow.de/research/AldosWebserverMultipleVulns.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10262" adv="1">10262</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16047">aweb-path-disclosure(16047)</ref>
    </refs>
    <vuln_soft>
      <prod name="aldos_web_server" vendor="aldo_vargas">
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1991" seq="2004-1991" published="2004-05-03" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Aldo's Web Server (aweb) 1.5 allows remote attackers to view arbitrary files via a .. (dot dot) in an HTTP GET request.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360629031227&amp;w=2">20040503 Multible_Vulnerabilites_in_Aldos_Webserver</ref>
      <ref source="MISC" url="http://www.oliverkarow.de/research/AldosWebserverMultipleVulns.txt" adv="1">http://www.oliverkarow.de/research/AldosWebserverMultipleVulns.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10262" adv="1">10262</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16048">aweb-dotdot-directory-traversal(16048)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-1992" seq="2004-1992" published="2004-04-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Serv-U FTP server before 5.0.0.6 allows remote attackers to cause a denial of service (crash) via a long -l parameter, which triggers an out-of-bounds read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108360377119290&amp;w=2">20040503 Serv-U LIST -l Parameter Buffer Overflow</ref>
      <ref source="NTBUGTRAQ" url="http://marc.info/?l=ntbugtraq&amp;m=108359620108234&amp;w=2">20040503 Serv-U LIST -l Parameter Buffer Overflow</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009869">1009869</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5ZP0G2KCKA.html" adv="1">http://www.securiteam.com/windowsntfocus/5ZP0G2KCKA.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10181" adv="1">10181</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15913">servu-list-command-bo(15913)</ref>
    </refs>
    <vuln_soft>
      <prod name="serv-u" vendor="serv-u">
        <vers num="3.0.0.16"/>
        <vers num="3.0.0.17"/>
        <vers num="3.1.0.0"/>
        <vers num="3.1.0.1"/>
        <vers num="3.1.0.3"/>
        <vers num="4.0.0.4"/>
        <vers num="4.1.0.0"/>
        <vers num="4.1.0.3"/>
        <vers num="5.0.0.0"/>
        <vers num="5.0.0.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1993" seq="2004-1993" published="2004-05-04" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The patch to the checklogin function in omail.pl for omail webmail 0.98.5 is incomplete, which allows remote attackers to execute arbitrary commands via shell metacharacters such as "`" (backticks) in the password.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108377215015515&amp;w=2">20040504 remote root exec vulnerability in omail</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10274" adv="1">10274</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/12948">omailwebmail-checklogin-code-execution(12948)</ref>
    </refs>
    <vuln_soft>
      <prod name="omail_webmail" vendor="omail">
        <vers num="0.97.3"/>
        <vers num="0.98.3"/>
        <vers num="0.98.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1994" seq="2004-1994" published="2004-05-05" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">FuseTalk 4.0 allows remote attackers to ban other users via a direct request to banning.cfm.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108377423825478&amp;w=2">20040505 Fuse Talk Vunerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10278" adv="1">10278</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16081">fusetalk-banning-unauth-access(16081)</ref>
    </refs>
    <vuln_soft>
      <prod name="fusetalk" vendor="e-zone_media_inc.">
        <vers num="2.0"/>
        <vers num="3.0"/>
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1995" seq="2004-1995" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-Site Request Forgery (CSRF) vulnerability in FuseTalk 2.0 allows remote attackers to create arbitrary accounts via a link to adduser.cfm.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108377423825478&amp;w=2">20040505 Fuse Talk Vunerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010080">1010080</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10276" adv="1">10276</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16080">fusetalk-get-add-users(16080)</ref>
    </refs>
    <vuln_soft>
      <prod name="fusetalk" vendor="e-zone_media_inc.">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1996" seq="2004-1996" published="2004-05-05" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Simple Machines Forum (SMF) 1.0 allows remote attackers to inject arbitrary web script via the size tag.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108377364615934&amp;w=2">20040505 SMF SIZE Tag Script Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10281" adv="1">10281</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16067">smf-size-html-injection(16067)</ref>
    </refs>
    <vuln_soft>
      <prod name="smf" vendor="simple_machines">
        <vers num="1.0_beta4.1"/>
        <vers num="1.0_beta4p"/>
        <vers num="1.0_beta5p"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1997" seq="2004-1997" published="2004-05-05" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Kolab stores OpenLDAP passwords in plaintext in the slapd.conf file, which may be installed world-readable, which allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="OPENPKG" url="http://marc.info/?l=bugtraq&amp;m=108377525924422&amp;w=2">OpenPKG-SA-2004.019</ref>
      <ref source="CONFIRM" url="http://www.erfrakon.de/projects/kolab/download/kolab-server-1.0/src/Changelog">http://www.erfrakon.de/projects/kolab/download/kolab-server-1.0/src/Changelog</ref>
      <ref source="MLIST" url="http://www.kolab.org/pipermail/kolab-users/2004-April/000215.html" adv="1">[kolab-users] 20040420 Possible Kolab LDAP configuration information disclosure</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:052">MDKSA-2004:052</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10277" adv="1" patch="1">10277</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16068">kolab-root-password-plaintext(16068)</ref>
    </refs>
    <vuln_soft>
      <prod name="kolab_groupware_server" vendor="kolab">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.3"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
      </prod>
      <prod name="openpkg" vendor="openpkg">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1998" seq="2004-1998" published="2004-05-05" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Downloads module in Php-Nuke 6.x through 7.2 allows remote attackers to gain sensitive information via an invalid show parameter to modules.php, which reveals the full path in a PHP error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108378804809891&amp;w=2">20040505 [waraxe-2004-SA#027 - Once again - critical vulnerabilities in PhpNuke 6.x - 7.2]</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=27" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=27</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.8"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-1999" seq="2004-1999" published="2004-05-05" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Downloads module in Php-Nuke 6.x through 7.2 allows remote attackers to inject arbitrary HTML and web script via the (1) ttitle or (2) sid parameters to modules.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108378804809891&amp;w=2">20040505 [waraxe-2004-SA#027 - Once again - critical vulnerabilities in PhpNuke 6.x - 7.2]</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=27" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=27</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16073">phpnuke-ttitle-sid-xss(16073)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.8"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2000" seq="2004-2000" published="2004-05-05" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Downloads module in Php-Nuke 6.x through 7.2 allows remote attackers to execute arbitrary SQL via the (1) orderby or (2) sid parameters to modules.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108378804809891&amp;w=2">20040505 [waraxe-2004-SA#027 - Once again - critical vulnerabilities in PhpNuke 6.x - 7.2]</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/488452/100/0/threaded">20080221 PHP-Nuke Module Downloads SQL Injection(sid)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10282" adv="1">10282</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/27932">27932</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=27">http://www.waraxe.us/index.php?modname=sa&amp;id=27</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16074">phpnuke-orderby-sid-sql-injection(16074)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2001" seq="2004-2001" published="2004-05-05" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ifconfig "-arp" in SGI IRIX 6.5 through 6.5.22m does not properly disable ARP requests from being sent or received.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040502-01-P.asc" adv="1" patch="1">20040502-01-P</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10289" adv="1" patch="1">10289</ref>
    </refs>
    <vuln_soft>
      <prod name="irix" vendor="sgi">
        <vers num="6.5"/>
        <vers num="6.5.1"/>
        <vers num="6.5.2"/>
        <vers num="6.5.3"/>
        <vers num="6.5.4"/>
        <vers num="6.5.5"/>
        <vers num="6.5.6"/>
        <vers num="6.5.7"/>
        <vers num="6.5.8"/>
        <vers num="6.5.9"/>
        <vers num="6.5.10"/>
        <vers num="6.5.11"/>
        <vers num="6.5.12"/>
        <vers num="6.5.13"/>
        <vers num="6.5.14"/>
        <vers num="6.5.15"/>
        <vers num="6.5.16"/>
        <vers num="6.5.17f"/>
        <vers num="6.5.17m"/>
        <vers num="6.5.18f"/>
        <vers num="6.5.18m"/>
        <vers num="6.5.19f"/>
        <vers num="6.5.19m"/>
        <vers num="6.5.20f"/>
        <vers num="6.5.20m"/>
        <vers num="6.5.21f"/>
        <vers num="6.5.21m"/>
        <vers num="6.5.22m"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2002" seq="2004-2002" published="2004-05-05" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in SGI IRIX 6.5 through 6.5.22m allows remote attackers to cause a denial of service via a certain UDP packet.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20040502-01-P.asc" patch="1">20040502-01-P</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10287" adv="1">10287</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16158">irix-udp-dos(16158)</ref>
    </refs>
    <vuln_soft>
      <prod name="irix" vendor="sgi">
        <vers num="6.5"/>
        <vers num="6.5.1"/>
        <vers num="6.5.2"/>
        <vers num="6.5.2f"/>
        <vers num="6.5.2m"/>
        <vers num="6.5.3"/>
        <vers num="6.5.3f"/>
        <vers num="6.5.3m"/>
        <vers num="6.5.4"/>
        <vers num="6.5.4f"/>
        <vers num="6.5.4m"/>
        <vers num="6.5.5"/>
        <vers num="6.5.5f"/>
        <vers num="6.5.5m"/>
        <vers num="6.5.6"/>
        <vers num="6.5.6f"/>
        <vers num="6.5.6m"/>
        <vers num="6.5.7"/>
        <vers num="6.5.7f"/>
        <vers num="6.5.7m"/>
        <vers num="6.5.8"/>
        <vers num="6.5.8f"/>
        <vers num="6.5.8m"/>
        <vers num="6.5.9"/>
        <vers num="6.5.9f"/>
        <vers num="6.5.9m"/>
        <vers num="6.5.10"/>
        <vers num="6.5.10f"/>
        <vers num="6.5.10m"/>
        <vers num="6.5.11"/>
        <vers num="6.5.11f"/>
        <vers num="6.5.11m"/>
        <vers num="6.5.12"/>
        <vers num="6.5.12f"/>
        <vers num="6.5.12m"/>
        <vers num="6.5.13"/>
        <vers num="6.5.13f"/>
        <vers num="6.5.13m"/>
        <vers num="6.5.14"/>
        <vers num="6.5.14f"/>
        <vers num="6.5.14m"/>
        <vers num="6.5.15"/>
        <vers num="6.5.15f"/>
        <vers num="6.5.15m"/>
        <vers num="6.5.16"/>
        <vers num="6.5.16f"/>
        <vers num="6.5.16m"/>
        <vers num="6.5.17"/>
        <vers num="6.5.17f"/>
        <vers num="6.5.17m"/>
        <vers num="6.5.18"/>
        <vers num="6.5.18f"/>
        <vers num="6.5.18m"/>
        <vers num="6.5.19"/>
        <vers num="6.5.19f"/>
        <vers num="6.5.19m"/>
        <vers num="6.5.20"/>
        <vers num="6.5.20f"/>
        <vers num="6.5.20m"/>
        <vers num="6.5.21"/>
        <vers num="6.5.21f"/>
        <vers num="6.5.21m"/>
        <vers num="6.5.22"/>
        <vers num="6.5.22m"/>
        <vers num="6.5_20"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2003" seq="2004-2003" published="2004-05-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the ssl_prcert function in the SSLway filter (sslway.c) for DeleGate 8.9.2 and earlier allows remote attackers to execute arbitrary code via a certificate with a long (1) subject or (2) issuer name field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108386181021070&amp;w=2">20040506 [0xbadc0ded #03] DeleGate (SSL-filter) &lt;= 8.9.2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10295" adv="1" patch="1">10295</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16078">delegate-sslway-bo(16078)</ref>
    </refs>
    <vuln_soft>
      <prod name="delegate" vendor="delegate">
        <vers num="7.7.0"/>
        <vers num="7.7.1"/>
        <vers num="7.8.0"/>
        <vers num="7.8.1"/>
        <vers num="7.8.2"/>
        <vers num="7.9.11"/>
        <vers num="8.3.3"/>
        <vers num="8.3.4"/>
        <vers num="8.4.0"/>
        <vers num="8.5.0"/>
        <vers num="8.9"/>
        <vers num="8.9.1"/>
        <vers num="8.9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2004" seq="2004-2004" published="2004-05-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Live CD in SUSE LINUX 9.1 Personal edition is configured without a password for root, which allows remote attackers to gain privileges via SSH.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10297" adv="1" patch="1">10297</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16084">livecd-ssh-gain-access(16084)</ref>
    </refs>
    <vuln_soft>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.1" edition=":personal"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2005" seq="2004-2005" published="2004-05-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote attackers to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108395487628044&amp;w=2">20040507 Eudora file URL buffer overflow</ref>
      <ref source="CONFIRM" url="http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt">http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10298" adv="1" patch="1">10298</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16086">eudora-long-url-bo(16086)</ref>
    </refs>
    <vuln_soft>
      <prod name="eudora" vendor="qualcomm">
        <vers num="5.2.1"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.3"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2006" seq="2004-2006" published="2004-05-07" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108395366909344&amp;w=2">20040507 Security issue with Trend OfficeScan Corporate Edition</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10300" adv="1">10300</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16092">officescan-configuration-modify(16092)</ref>
    </refs>
    <vuln_soft>
      <prod name="officescan" vendor="trend_micro">
        <vers num="3.0" edition=":corporate"/>
        <vers num="corporate_3.5"/>
        <vers num="corporate_3.11"/>
        <vers num="corporate_3.13"/>
        <vers num="corporate_3.54"/>
        <vers num="corporate_5.02"/>
        <vers num="corporate_5.58"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2007" seq="2004-2007" published="2004-05-08" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in modules.php in NukeJokes 1.7 and 2 Beta allows remote attackers to inject arbitrary HTML or web script via the (1) cat parameter in a CatView function or (2) jokeid parameter in a JokeView function.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108404714232579&amp;w=2">20040508 [waraxe-2004-SA#028 - Multiple vulnerabilities in NukeJokes module for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10306" adv="1">10306</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16096">nukejokes-modules-xss(16096)</ref>
    </refs>
    <vuln_soft>
      <prod name="nukejokes" vendor="adam_webb">
        <vers num="1.7"/>
        <vers num="2.0_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2008" seq="2004-2008" published="2004-05-08" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in modules.php in NukeJokes 1.7 and 2 Beta allows remote attackers to execute arbitrary SQL via the jokeid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108404714232579&amp;w=2">20040508 [waraxe-2004-SA#028 - Multiple vulnerabilities in NukeJokes module for PhpNuke]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10306" adv="1">10306</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=28" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=28</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16099">nukejokes-sql-injection(16099)</ref>
    </refs>
    <vuln_soft>
      <prod name="nukejokes" vendor="adam_webb">
        <vers num="1.7"/>
        <vers num="2.0_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2009" seq="2004-2009" published="2004-05-08" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">NukeJokes 1.7 and 2 Beta allows remote attackers to obtain the full path of the server via (1) a direct call to mainfunctions.php, (2) an invalid jokeid parameter in a JokeView function or (3) an invalid cat parameter in a CatView function, which reveals the path in a PHP error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108404714232579&amp;w=2">20040508 [waraxe-2004-SA#028 - Multiple vulnerabilities in NukeJokes module for PhpNuke]</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16094">nukejokes-multiple-path-disclosure(16094)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2010" seq="2004-2010" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in index.php in phpShop 0.7.1 and earlier allows remote attackers to execute arbitrary PHP code by modifying the base_dir parameter to reference a URL on a remote web server that contains phpshop.cfg.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108420702317870&amp;w=2">20040509 Arbitrary code inclusion in phpShop</ref>
      <ref source="MISC" url="http://www.fribble.net/advisories/phpshop_29-04-04.txt">http://www.fribble.net/advisories/phpshop_29-04-04.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10313">10313</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16107">phpshop-basedir-file-include(16107)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2011" seq="2004-2011" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">msxml3.dll in Internet Explorer 6.0.2600.0 allows remote attackers to cause a denial of service (crash) via a single &amp; (ampersand) in a &lt;Ref href> link, which triggers a parsing error, possibly due to missing portions of the URI.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108422549617947&amp;w=2">20040510 msxml3.dll Parsing Error Crashes Internet Explorer Remotely Upon Refresh</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16112">msxml3-ampersand-dos(16112)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0.2600"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2012" seq="2004-2012" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The systrace_exit function in the systrace utility for NetBSD-current and 2.0 before April 16, 2004, and certain FreeBSD ports, does not verify the owner of the /dec/systrace connection before setting euid to 0, which allows local users to gain root privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108432258920570&amp;w=2">20040510 Advisory 04/2004: Net(Free)BSD Systrace local root vulnerabilitiy</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10320">10320</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16110">systrace-gain-privileges(16110)</ref>
    </refs>
    <vuln_soft>
      <prod name="provos_systrace" vendor="niels">
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
      </prod>
      <prod name="systrace_port_for_freebsd" vendor="vladimir_kotal">
        <vers num="2004-03-09"/>
        <vers num="2004-06-02"/>
      </prod>
      <prod name="netbsd" vendor="netbsd">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2013" seq="2004-2013" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-05/0091.html" patch="1">20040511 Linux Kernel sctp_setsockopt() Integer Overflow</ref>
      <ref source="TRUSTIX" url="http://marc.info/?l=bugtraq&amp;m=108456230815842&amp;w=2">2004-0029</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10326">10326</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16117">linux-sctpsetsockopt-integer-bo(16117)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
        <vers num="2.0.8"/>
        <vers num="2.0.9"/>
        <vers num="2.0.10"/>
        <vers num="2.0.11"/>
        <vers num="2.0.12"/>
        <vers num="2.0.13"/>
        <vers num="2.0.14"/>
        <vers num="2.0.15"/>
        <vers num="2.0.16"/>
        <vers num="2.0.17"/>
        <vers num="2.0.18"/>
        <vers num="2.0.19"/>
        <vers num="2.0.20"/>
        <vers num="2.0.21"/>
        <vers num="2.0.22"/>
        <vers num="2.0.23"/>
        <vers num="2.0.24"/>
        <vers num="2.0.25"/>
        <vers num="2.0.26"/>
        <vers num="2.0.27"/>
        <vers num="2.0.28"/>
        <vers num="2.0.29"/>
        <vers num="2.0.30"/>
        <vers num="2.0.31"/>
        <vers num="2.0.32"/>
        <vers num="2.0.33"/>
        <vers num="2.0.34"/>
        <vers num="2.0.35"/>
        <vers num="2.0.36"/>
        <vers num="2.0.37"/>
        <vers num="2.0.38"/>
        <vers num="2.0.39"/>
        <vers num="2.1"/>
        <vers num="2.1.89"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
        <vers num="2.2.9"/>
        <vers num="2.2.10"/>
        <vers num="2.2.11"/>
        <vers num="2.2.12"/>
        <vers num="2.2.13"/>
        <vers num="2.2.14"/>
        <vers num="2.2.15" edition="pre16"/>
        <vers num="2.2.15_pre20"/>
        <vers num="2.2.16" edition="pre6"/>
        <vers num="2.2.17"/>
        <vers num="2.2.18"/>
        <vers num="2.2.19"/>
        <vers num="2.2.20"/>
        <vers num="2.2.21"/>
        <vers num="2.2.22"/>
        <vers num="2.2.23"/>
        <vers num="2.2.24"/>
        <vers num="2.2.25"/>
        <vers num="2.3.0"/>
        <vers num="2.3.99" edition="pre1"/>
        <vers num="2.3.99" edition="pre2"/>
        <vers num="2.3.99" edition="pre3"/>
        <vers num="2.3.99" edition="pre4"/>
        <vers num="2.3.99" edition="pre5"/>
        <vers num="2.3.99" edition="pre6"/>
        <vers num="2.3.99" edition="pre7"/>
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2014" seq="2004-2014" published="2004-12-31" modified="2018-10-03" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Wget 1.9 and 1.9.1 allows local users to overwrite arbitrary files via a symlink attack on the name of the file being downloaded.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108481268725276&amp;w=2">20040516 Wget race condition vulnerability</ref>
      <ref source="MLIST" url="http://marc.info/?l=wget&amp;m=108482747906833&amp;w=2">[wget] 20040517 Wget race condition vulnerability (fwd)</ref>
      <ref source="MLIST" url="http://marc.info/?l=wget&amp;m=108483270227139&amp;w=2">[wget] 20040517 Re: Wget race condition vulnerability (fwd)</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:204">MDKSA-2005:204</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-771.html">RHSA-2005:771</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10361">10361</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16167">wget-lock-race-condition(16167)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9830">oval:org.mitre.oval:def:9830</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/145-1/">USN-145-1</ref>
    </refs>
    <vuln_soft>
      <prod name="wget" vendor="gnu">
        <vers num="1.5.3"/>
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="1.7.1"/>
        <vers num="1.8"/>
        <vers num="1.8.1"/>
        <vers num="1.8.2"/>
        <vers num="1.9"/>
        <vers num="1.9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2015" seq="2004-2015" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WebCT Campus Edition allows remote attackers to inject arbitrary HTML or web script via (1) iframe, (2) img, or (3) object tags.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0851.html">20040516 WebCT: Cross Site Scripting Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108481256731404&amp;w=2">20040517 WebCT: Cross Site Scripting Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10357">10357</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16156">webct-iframe-img-tags-xss(16156)</ref>
    </refs>
    <vuln_soft>
      <prod name="webct" vendor="webct">
        <vers num="campus_4.0"/>
        <vers num="campus_4.0_sp3_hotfix_40833"/>
        <vers num="campus_4.1"/>
        <vers num="campus_4.1.1.5"/>
        <vers num="campus_4.1_sp2_hotfix_40832"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2016" seq="2004-2016" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the HTTP server in NetChat 7.3 and earlier allows remote attackers to execute arbitrary code via a long GET request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108481422130354&amp;w=2">20040517 NetChat HTTP Server Stack Overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10353" patch="1">10353</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16165">netchat-sprintf-bo(16165)</ref>
    </refs>
    <vuln_soft>
      <prod name="subnet_chat_application" vendor="netchat">
        <vers num="7.0"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
        <vers num="7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2017" seq="2004-2017" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Turbo Traffic Trader C (TTT-C) 1.0 allow remote attackers to inject arbitrary HTML or web script, as demonstrated via (1) the link parameter to ttt-out, (2) the X-Forwarded-For header in a GET request to ttt-in, (3) the Referer header in a GET request to ttt-in, or the (4) site name or (5) site URL fields in the main control panel.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108481571131866&amp;w=2">20040517 Multiple TTT-C XSS vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10359">10359</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16164">turbotraffictraderc-multiple-xss(16164)</ref>
    </refs>
    <vuln_soft>
      <prod name="turbotraffictrader_c" vendor="turbotraffictrader">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2018" seq="2004-2018" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in index.php in Php-Nuke 6.x through 7.3 allows remote attackers to execute arbitrary PHP code by modifying the modpath parameter to reference a URL on a remote web server that contains the code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0870.html">20040517 [waraxe-2004-SA#029 - Possible remote file inclusion in PhpNuke 6.x - 7.3]</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108482888621896&amp;w=2">20040517 [waraxe-2004-SA#029 - Possible remote file inclusion in PhpNuke 6.x - 7.3]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10365">10365</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=29">http://www.waraxe.us/index.php?modname=sa&amp;id=29</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16218">phpnuke-modpath-file-include(16218)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
        <vers num="7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2019" seq="2004-2019" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The WebLinks module in Php-Nuke 6.x through 7.3 allows remote attackers to obtain sensitive information via an invalid show parameter, which displays the full path in a PHP error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108482957715299&amp;w=2">20040517 [waraxe-2004-SA#030 - Multiple vulnerabilities in PhpNuke 6.x - 7.3]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10367">10367</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=29">http://www.waraxe.us/index.php?modname=sa&amp;id=29</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16170">phpnuke-show-weblink-path-disclosure(16170)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
        <vers num="7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2020" seq="2004-2020" published="2004-12-31" modified="2017-07-18" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Php-Nuke 6.x through 7.3 allow remote attackers to inject arbitrary HTML or web script into the (1) optionbox parameter in the News module, (2) date parameter in the Statistics module, (3) year, month, and month_1 parameters in the Stories_Archive module, (4) mode, order, and thold parameters in the Surveys module, or (5) a SQL statement to index.php, as processed by mainfile.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108482957715299&amp;w=2">20040517 [waraxe-2004-SA#030 - Multiple vulnerabilities in PhpNuke 6.x - 7.3]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10367">10367</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=29">http://www.waraxe.us/index.php?modname=sa&amp;id=29</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16172">phpnuke-multi-xss(16172)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
        <vers num="7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2021" seq="2004-2021" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in file_manager.php in osCommerce 2.2 allows remote attackers to view arbitrary files via a .. (dot dot) in the filename argument.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2005-03/0378.html">20050322 osCommerce File Manager Directory Traversal Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108482902101519&amp;w=2">20040517 oscommerce 2.2 file_manager.php file browsing</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010176">1010176</ref>
      <ref source="MISC" url="http://www.excluded.org/advisories/advisory13.txt">http://www.excluded.org/advisories/advisory13.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10364">10364</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16174">oscommerce-dotdot-directory-traversal(16174)</ref>
    </refs>
    <vuln_soft>
      <prod name="oscommerce" vendor="oscommerce">
        <vers num="2.1"/>
        <vers num="2.2_cvs"/>
        <vers num="2.2_ms1"/>
        <vers num="2.2_ms2"/>
        <vers num="2.2_ms3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2022" seq="2004-2022" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow.  NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html">20040518 Re[2]: [Full-Disclosure] Buffer Overflow in ActivePerl ?</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108489894009025&amp;w=2">20040518 RE: [Full-Disclosure] Re: Buffer Overflow in ActivePerl ?</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108482796105922&amp;w=2">20040517 Buffer Overflow in ActivePerl ?</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108483058514596&amp;w=2">20040517 RE: Buffer Overflow in ActivePerl ?</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108489112131099&amp;w=2">20040518 Re: Buffer Overflow in ActivePerl ?</ref>
      <ref source="MISC" url="http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt">http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt</ref>
      <ref source="MISC" url="http://www.perlmonks.org/index.pl?node_id=354145">http://www.perlmonks.org/index.pl?node_id=354145</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10375">10375</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16169">perl-system-bo(16169)</ref>
    </refs>
    <vuln_soft>
      <prod name="activeperl" vendor="activestate">
        <vers num="5.6.1"/>
        <vers num="5.6.1.630"/>
        <vers num="5.6.2"/>
        <vers num="5.6.3"/>
        <vers num="5.7.1"/>
        <vers num="5.7.2"/>
        <vers num="5.7.3"/>
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2023" seq="2004-2023" published="2004-12-31" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in login.php in Zen Cart 1.1.2d, 1.1.4 before patch 1, and possibly other versions allows remote attackers to execute arbitrary SQL via the (1) admin_name or (2) admin_pass parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108489697219781&amp;w=2">20040518 Zen Cart login.php SQL Injection Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010172">1010172</ref>
      <ref source="MISC" url="http://www.packetstormsecurity.org/0405-advisories/zencart112d.txt">http://www.packetstormsecurity.org/0405-advisories/zencart112d.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/434237/30/4950/threaded">20060517 Re: Zen Cart login.php SQL Injection Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10378">10378</ref>
      <ref source="CONFIRM" url="http://www.zen-cart.com/modules/ipb/index.php?showtopic=4835" adv="1">http://www.zen-cart.com/modules/ipb/index.php?showtopic=4835</ref>
      <ref source="CONFIRM" url="http://www.zen-cart.com/modules/mydownloads/viewcat.php?cid=31&amp;orderby=dateD" patch="1">http://www.zen-cart.com/modules/mydownloads/viewcat.php?cid=31&amp;orderby=dateD</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16176">zencart-login-sql-injection(16176)</ref>
    </refs>
    <vuln_soft>
      <prod name="zen_cart" vendor="zen_cart">
        <vers num="1.1.2d"/>
        <vers num="1.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2024" seq="2004-2024" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The distribution of Zen Cart 1.1.4 before patch 2 includes certain debugging code in the Admin password retrieval functionality, which allows attackers to gain administrative privileges via password_forgotten.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.zen-cart.com/modules/ipb/index.php?showtopic=4873" adv="1">http://www.zen-cart.com/modules/ipb/index.php?showtopic=4873</ref>
      <ref source="CONFIRM" url="http://www.zen-cart.com/modules/mydownloads/viewcat.php?cid=31&amp;orderby=dateD" patch="1">http://www.zen-cart.com/modules/mydownloads/viewcat.php?cid=31&amp;orderby=dateD</ref>
    </refs>
    <vuln_soft>
      <prod name="zen_cart" vendor="zen_cart">
        <vers num="1.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2025" seq="2004-2025" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in application_top.php for Zen Cart 1.1.3 before patch 2 may allow remote attackers to execute arbitrary SQL commands via the products_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.zen-cart.com/modules/ipb/index.php?showtopic=3731">http://www.zen-cart.com/modules/ipb/index.php?showtopic=3731</ref>
      <ref source="CONFIRM" url="http://www.zen-cart.com/modules/mydownloads/viewcat.php?cid=31&amp;orderby=dateD" patch="1">http://www.zen-cart.com/modules/mydownloads/viewcat.php?cid=31&amp;orderby=dateD</ref>
    </refs>
    <vuln_soft>
      <prod name="zen_cart" vendor="zen_cart">
        <vers num="1.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2026" seq="2004-2026" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the logmsg function in svc.c for Pound 1.5 and earlier allows remote attackers to execute arbitrary code via format string specifiers in syslog messages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0343.html">20040507 Pound &lt;=1.5 Remote Exploit (Format string bug)</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-08.xml" patch="1">GLSA-200405-08</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010034">1010034</ref>
      <ref source="CONFIRM" url="http://www.apsis.ch/pound/pound_list/archive/2003/2003-12/1070234315000#1070234315000">http://www.apsis.ch/pound/pound_list/archive/2003/2003-12/1070234315000#1070234315000</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10267" patch="1">10267</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16033">pound-logmsg-format-string(16033)</ref>
    </refs>
    <vuln_soft>
      <prod name="pound" vendor="apsis">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2027" seq="2004-2027" published="2004-05-10" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Icecast 2.0.0 and earlier allows remote attackers to cause a denial of service (crash) via a long Basic Authorization header that triggers an out-of-bounds read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0378.html" adv="1">20040509 Icecast 2.0.0 preauth overflow</ref>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200405-10.xml" adv="1">GLSA-200405-10</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10311" adv="1" patch="1">10311</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16103">icecast-auth-request-bo(16103)</ref>
    </refs>
    <vuln_soft>
      <prod name="icecast" vendor="icecast">
        <vers num="1.3.0"/>
        <vers num="1.3.5"/>
        <vers num="1.3.5.1"/>
        <vers num="1.3.7"/>
        <vers num="1.3.7.1"/>
        <vers num="1.3.8"/>
        <vers num="1.3.9"/>
        <vers num="1.3.9.1"/>
        <vers num="1.3.9.2"/>
        <vers num="1.3.10"/>
        <vers num="1.3.10.1"/>
        <vers num="1.3.11"/>
        <vers num="1.3.12"/>
        <vers num="2.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2028" seq="2004-2028" published="2004-05-21" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in stats.php in e107 allows remote attackers to inject arbitrary web script or HTML via the referer parameter to log.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108515632622796&amp;w=2">20040521 e107 web portal Referers HTTP Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10395" adv="1">10395</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16231">e107-log-xss(16231)</ref>
    </refs>
    <vuln_soft>
      <prod name="e107" vendor="e107">
        <vers num="0.6_10"/>
        <vers num="0.6_11"/>
        <vers num="0.6_12"/>
        <vers num="0.6_13"/>
        <vers num="0.6_14"/>
        <vers num="0.6_15"/>
        <vers num="0.6_15a"/>
        <vers num="0.545"/>
        <vers num="0.554"/>
        <vers num="0.555_beta"/>
        <vers num="0.603"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2029" seq="2004-2029" published="2004-05-22" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Util_DecodeHTTPAuth function in BNBT BitTorrent Tracker Beta 7.5 Release 2 and earlier allows remote attackers to cause a denial of service (crash) via a Basic Authorization HTTP request with a "A==" value.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://fux0r.phathookups.com/advisory/sp-x12-advisory.txt" adv="1">http://fux0r.phathookups.com/advisory/sp-x12-advisory.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108526361421535&amp;w=2">20040522 BNBT BitTorrent Tracker Denial Of Service</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010254">1010254</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10399" adv="1" patch="1">10399</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16228">bittorrent-http-get-dos(16228)</ref>
    </refs>
    <vuln_soft>
      <prod name="bnbt" vendor="trevor_hogan">
        <vers num="7.5_beta_release2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2030" seq="2004-2030" published="2004-05-22" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in index.jsp for Liferay before 2.2.0 release 10/1/2004 allow remote attackers to inject arbitrary web script or HTML, as demonstrated using the message subject.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108526683823840&amp;w=2">20040522 Liferay Cross Site Scripting Flaw</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110141194202856&amp;w=2">20041125 Re: Liferay Cross Site Scripting Flaw</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010259">1010259</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=252060">http://sourceforge.net/project/shownotes.php?release_id=252060</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10402" adv="1" patch="1">10402</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16232">liferay-message-xss(16232)</ref>
    </refs>
    <vuln_soft>
      <prod name="liferay_enterprise_portal" vendor="liferay">
        <vers num="2.1.0"/>
        <vers num="2.1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2031" seq="2004-2031" published="2004-05-21" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in user.php in e107 allows remote attackers to inject arbitrary web script or HTML via the (1) URL, (2) MSN, or (3) AIM fields.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108541119526279&amp;w=2">20040522 e107 web portal user.php XSS (Cross Site Scripting)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10405" adv="1">10405</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16241">e107-user-xss(16241)</ref>
    </refs>
    <vuln_soft>
      <prod name="e107" vendor="e107">
        <vers num="0.545"/>
        <vers num="0.554"/>
        <vers num="0.555_beta"/>
        <vers num="0.603"/>
        <vers num="0.610"/>
        <vers num="0.611"/>
        <vers num="0.612"/>
        <vers num="0.613"/>
        <vers num="0.614"/>
        <vers num="0.615"/>
        <vers num="0.615a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2032" seq="2004-2032" published="2004-05-24" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Netgear RP114 allows remote attackers to bypass the keyword based URL filtering by requesting a long URL, as demonstrated using a large number of %20 (hex-encoded space) sequences.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108541203427391&amp;w=2">20040524 Netgear RP114 URL filter fails if URL is too long</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10404" adv="1">10404</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16238">netgearrp114-long-url-filter-bypass(16238)</ref>
    </refs>
    <vuln_soft>
      <prod name="rp114" vendor="netgear">
        <vers num="3.26"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2033" seq="2004-2033" published="2004-05-26" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Orenosv 0.5.9f allows remote attackers to cause a denial of service (crash) via a long HTTP GET request.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://hp.vector.co.jp/authors/VA027031/orenosv/index_en.html" adv="1">http://hp.vector.co.jp/authors/VA027031/orenosv/index_en.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108559623703422&amp;w=2">20040526 Orenosv HTTP/FTP Server Denial Of Service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10420" adv="1" patch="1">10420</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16250">orenosv-http-get-dos(16250)</ref>
    </refs>
    <vuln_soft>
      <prod name="orenosv_http_ftp_server" vendor="orenosv">
        <vers num="0.5.9c"/>
        <vers num="0.5.9e"/>
        <vers num="0.5.9f"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2034" seq="2004-2034" published="2004-01-29" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the (1) WTHoster and (2) WebDriver modules in WildTangent Web Driver 4.0 allows remote attackers to execute arbitrary code via a long filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108569235217149&amp;w=2">20040527 WildTangent Web Driver Long FileName Stack Overflow</ref>
      <ref source="MISC" url="http://www.ngssoftware.com/advisories/wildtangent.txt" adv="1" patch="1">http://www.ngssoftware.com/advisories/wildtangent.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10421" adv="1" patch="1">10421</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16266">wildtangent-wthoster-webdriver-bo(16266)</ref>
    </refs>
    <vuln_soft>
      <prod name="webdriver" vendor="wildtangent">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2035" seq="2004-2035" published="2004-05-26" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">MiniShare 1.3.2 allows remote attackers to cause a denial of service (crash) via a malformed HTTP GET or HEAD request without the proper number of trailing CRLF sequences.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108563992129877&amp;w=2">20040527 DoS in MiniShare 1.3.2</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=241158" adv="1" patch="1">http://sourceforge.net/project/shownotes.php?release_id=241158</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/MiniShare1.3.2-adv.txt" adv="1">http://www.autistici.org/fdonato/advisory/MiniShare1.3.2-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10417" adv="1" patch="1">10417</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16260">minishare-get-head-dos(16260)</ref>
    </refs>
    <vuln_soft>
      <prod name="minimal_http_server" vendor="minishare">
        <vers num="1.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2036" seq="2004-2036" published="2004-05-28" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the art_print function in print.inc.php in unknown versions of jPortal before 2.3.1 allows remote attackers to inject arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108577011129476&amp;w=2">20040528 JPortal SQL Injects</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010327">1010327</ref>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/5HP020KD5K.html" adv="1">http://www.securiteam.com/unixfocus/5HP020KD5K.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10430" adv="1">10430</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16272">jportal-printincphp-sql-injection(16272)</ref>
    </refs>
    <vuln_soft>
      <prod name="jportal_web_portal" vendor="jportal">
        <vers num="2.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2037" seq="2004-2037" published="2004-03-24" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Mollensoft Lightweight FTP Server 3.6 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long CWD command, as demonstrated in one example by using the "cd" command in an interactive FTP client.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108577846011604&amp;w=2">20040528 Mollensoft ftp Server ver 3.6 Buffer overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108611230015042&amp;w=2">20040601 Mollensoft Lightweight FTP Server CWD Buffer Overflow</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010328">1010328</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10409" adv="1">10409</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10429" adv="1">10429</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16237">mollensoft-cwd-command-bo(16237)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16303">mollensoft-cd-bo(16303)</ref>
    </refs>
    <vuln_soft>
      <prod name="lightweight_ftp_server" vendor="mollensoft_software">
        <vers num="3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2038" seq="2004-2038" published="2004-05-29" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Land Down Under (LDU) before LDU 700 allows remote attackers to inject arbitrary web script or HTML via a BBcode img tag in (1) functions.php, (2) header.php or (3) auth.inc.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108585789220174&amp;w=2">20040529 LDU (land down under) xss vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/May/1010335.html">1010335</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10435">10435</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16284">ldu-bbcode-xss(16284)</ref>
    </refs>
    <vuln_soft>
      <prod name="land_down_under" vendor="neocrome">
        <vers num="601"/>
        <vers num="602"/>
        <vers num="700.01"/>
        <vers num="700.02"/>
        <vers num="700.03" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2039" seq="2004-2039" published="2004-05-29" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">e107 0.615 allows remote attackers to obtain sensitive information via a direct request to (1) alt_news.php, (2) backend_menu.php, (3) clock_menu.php, (4) counter_menu.php, (5) login_menu.php, and other files, which reveal the full path in a PHP error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108588043007224&amp;w=2">20040529 [waraxe-2004-SA#031 - Multiple vulnerabilities in e107 version 0.615]</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108586723116427&amp;w=2">20040529 [waraxe-2004-SA#031 - Multiple vulnerabilities in e107 version 0.615]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10436">10436</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=31" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=31</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16277">e107-multiplescripts-path-disclosure(16277)</ref>
    </refs>
    <vuln_soft>
      <prod name="e107" vendor="e107">
        <vers num="0.6_15"/>
        <vers num="0.6_15a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2040" seq="2004-2040" published="2004-05-29" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in e107 0.615 allow remote attackers to inject arbitrary web script or HTML via the (1) LAN_407 parameter to clock_menu.php, (2) "email article to a friend" field, (3) "submit news" field, or (4) avmsg parameter to usersettings.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108588043007224&amp;w=2">20040529 [waraxe-2004-SA#031 - Multiple vulnerabilities in e107 version 0.615]</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108586723116427&amp;w=2">20040529 [waraxe-2004-SA#031 - Multiple vulnerabilities in e107 version 0.615]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10436" adv="1">10436</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=31" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=31</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16279">e107-clock-menu-xss(16279)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16280">e107-email-friend-xss(16280)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16281">e107-user-setting-xss(16281)</ref>
    </refs>
    <vuln_soft>
      <prod name="e107" vendor="e107">
        <vers num="0.6_15"/>
        <vers num="0.6_15a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2041" seq="2004-2041" published="2004-05-29" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in secure_img_render.php in e107 0.615 allows remote attackers to execute arbitrary PHP code by modifying the p parameter to reference a URL on a remote web server that contains the code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108588043007224&amp;w=2">20040529 [waraxe-2004-SA#031 - Multiple vulnerabilities in e107 version 0.615]</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108586723116427&amp;w=2">20040529 [waraxe-2004-SA#031 - Multiple vulnerabilities in e107 version 0.615]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10436" adv="1">10436</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=31" adv="1">http://www.waraxe.us/index.php?modname=sa&amp;id=31</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16282">e107-secure-img-render-file-include(16282)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2042" seq="2004-2042" published="2004-05-29" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in e107 0.615 allow remote attackers to inject arbitrary SQL code and gain sensitive information via (1) content parameter to content.php, (2) content_id parameter to content.php, or (3) list parameter to news.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108588043007224&amp;w=2">20040529 [waraxe-2004-SA#031 - Multiple vulnerabilities in e107 version 0.615]</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108586723116427&amp;w=2">20040529 [waraxe-2004-SA#031 - Multiple vulnerabilities in e107 version 0.615]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10436" adv="1" patch="1">10436</ref>
      <ref source="MISC" url="http://www.waraxe.us/index.php?modname=sa&amp;id=31" adv="1" patch="1">http://www.waraxe.us/index.php?modname=sa&amp;id=31</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16283">e107-content-news-sql-injection(16283)</ref>
    </refs>
    <vuln_soft>
      <prod name="e107" vendor="e107">
        <vers num="0.615"/>
        <vers num="0.615a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2043" seq="2004-2043" published="2004-05-01" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in ibserver for Firebird Database 1.0 and other versions before 1.5, and possibly other products that use the InterBase codebase, allows remote attackers to cause a denial of service (crash) via a long database name, as demonstrated using the gsec command.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0027.html">20040602 Firebird [ AND Interbase 7 ] Database Remote Database Name Overflow</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108611386202493&amp;w=2">20040601 Firebird Database Remote Database Name Overflow</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010381">1010381</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1014">DSA-1014</ref>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/5AP0P0UCUO.html" adv="1">http://www.securiteam.com/unixfocus/5AP0P0UCUO.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10446" adv="1">10446</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16229">firebird-database-name-bo(16229)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16316">interbase-database-name-bo(16316)</ref>
    </refs>
    <vuln_soft>
      <prod name="interbase" vendor="borland_software">
        <vers num="4.0"/>
        <vers num="5.0"/>
        <vers num="6.0"/>
        <vers num="6.4"/>
        <vers num="6.5"/>
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
      <prod name="interbase_superserver" vendor="borland_software">
        <vers num="6.0"/>
      </prod>
      <prod name="firebird" vendor="firebirdsql">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2044" seq="2004-2044" published="2004-06-01" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the "admin.php" string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html">20040601 [Squid 2004-betaNC-001] Inadequate Security Checking in NukeCops betaNC Bundle</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html">20040601 [Squid 2004-OSC2Nuke-001] Inadequate Security Checking in OSC2Nuke</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108611606320559&amp;w=2">20040601 [Squid 2004-betaNC-001] Inadequate Security Checking in NukeCops</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108611643614881&amp;w=2">20040601 [Squid 2004-Nuke-001] Inadequate Security Checking in PHPNuke</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108662955105757&amp;w=2">20040606 Re: [Squid 2004-Nuke-001] Inadequate Security Checking in PHPNuke</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10447" adv="1">10447</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16294">phpnuke-eregi-path-disclosure(16294)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16296">osc2nuke-eregi-path-disclosure(16296)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16297">oscnukelite-eregi-path-disclosure(16297)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16298">nukecops-ergei-path-disclosure(16298)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="5.0"/>
        <vers num="5.0.1"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
        <vers num="5.2a"/>
        <vers num="5.3.1"/>
        <vers num="5.4"/>
        <vers num="5.5"/>
        <vers num="5.6"/>
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
        <vers num="7.3"/>
      </prod>
      <prod name="osc2nuke" vendor="oscommerce">
        <vers num="7x_1.0"/>
      </prod>
      <prod name="betanc_php-nuke" vendor="paul_laudanski">
        <vers num="bundle"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2045" seq="2004-2045" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The HTTP administration interface on Conceptronic CADSLR1 ADSL router running firmware 3.04n allows remote attackers to cause a denial of service (device reboot) via an HTTP request with a long username.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109045084522857&amp;w=2">20040721 Denial of Service in Conceptronic CADSLR1 Router</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10769">10769</ref>
      <ref source="MISC" url="http://www.shellsec.net/leer_advisory.php?id=5">http://www.shellsec.net/leer_advisory.php?id=5</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16746">conceptronic-long-username-dos(16746)</ref>
    </refs>
    <vuln_soft>
      <prod name="cadslr1_adsl_router" vendor="conceptronic">
        <vers num="3.04n"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2046" seq="2004-2046" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in APC PowerChute Business Edition 6.0 through 7.0.1 allows remote attackers to cause a denial of service via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109061480026378&amp;w=2">20040721 APC Security Advisory  Denial of Service Vulnerability with PowerChute Business Edition</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010745">1010745</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10777" patch="1">10777</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16767">powerchute-console-dos(16767)</ref>
    </refs>
    <vuln_soft>
      <prod name="powerchute" vendor="apc">
        <vers num="6.0" edition=":business"/>
        <vers num="7.1" edition=":business"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2047" seq="2004-2047" published="2004-07-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in EasyWeb FileManager 1.0 RC-1 for PostNuke allows remote attackers to retrieve arbitrary files via a .. (dot dot) in the pathext parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109068482605241&amp;w=2">20040724 EasyWeb FileManager Directory Traversal</ref>
      <ref source="MISC" url="http://www.cirt.net/advisories/ew_file_manager.shtml" adv="1">http://www.cirt.net/advisories/ew_file_manager.shtml</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10792" adv="1">10792</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16806">filemanager-pathext-view-directory-traversal(16806)</ref>
    </refs>
    <vuln_soft>
      <prod name="easyweb_filemanager" vendor="easyweb">
        <vers num="1.0_rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2048" seq="2004-2048" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">radmin in eSeSIX Thintune thin clients running firmware 2.4.38 and earlier starts a process port 25072 that can be accessed with a default "jstwo" password, which allows remote attackers to gain access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109068491801021&amp;w=2">20040724 eSeSIX Thintune thin client multiple vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010770">1010770</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10794">10794</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16790">thintune-password-gain-access(16790)</ref>
    </refs>
    <vuln_soft>
      <prod name="thintune_extreme" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_l" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_m" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_mobile" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_s" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_xm" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_xs" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2049" seq="2004-2049" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">eSeSIX Thintune thin clients running firmware 2.4.38 and earlier store sensitive usernames and passwords in cleartext in configuration files for the keeper library, which allows attackers to gain access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109068491801021&amp;w=2">20040724 eSeSIX Thintune thin client multiple vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010770">1010770</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10794">10794</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16795">thintune-plaintext-passwords(16795)</ref>
    </refs>
    <vuln_soft>
      <prod name="thintune_extreme" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_l" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_m" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_mobile" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_s" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_xm" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_xs" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2050" seq="2004-2050" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">eSeSIX Thintune thin clients running firmware 2.4.38 and earlier allow local users to gain privileges by pressing CTRL-SHIFT-ALT-DEL and entering the "maertsJ" password, which is hard-coded into lshell.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109068491801021&amp;w=2">20040724 eSeSIX Thintune thin client multiple vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010770">1010770</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10794">10794</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16808">thintune-password-gain-privileges(16808)</ref>
    </refs>
    <vuln_soft>
      <prod name="thintune_extreme" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_l" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_m" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_mobile" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_s" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_xm" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
      <prod name="thintune_xs" vendor="esesix">
        <vers num="2.4.38"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2051" seq="2004-2051" published="2004-07-24" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The Phoenix browser in eSeSIX Thintune thin clients running firmware 2.4.38 and earlier allows local users to read arbitrary files via a file:/// URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109068491801021&amp;w=2">20040724 eSeSIX Thintune thin client multiple vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010770">1010770</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10794" adv="1">10794</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16798">thintune-url-obtain-information(16798)</ref>
    </refs>
    <vuln_soft>
      <prod name="thintune_extreme" vendor="esesix">
        <vers num="2.4.38_firmware"/>
      </prod>
      <prod name="thintune_l" vendor="esesix">
        <vers num="2.4.38_firmware"/>
      </prod>
      <prod name="thintune_m" vendor="esesix">
        <vers num="2.4.38_firmware"/>
      </prod>
      <prod name="thintune_mobile" vendor="esesix">
        <vers num="2.4.38_firmware"/>
      </prod>
      <prod name="thintune_s" vendor="esesix">
        <vers num="2.4.38_firmware"/>
      </prod>
      <prod name="thintune_xm" vendor="esesix">
        <vers num="2.4.38_firmware"/>
      </prod>
      <prod name="thintune_xs" vendor="esesix">
        <vers num="2.4.38_firmware"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2052" seq="2004-2052" published="2004-12-31" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">eSeSIX Thintune thin clients running firmware 2.4.38 and earlier accept any password that begins with the actual password, which makes it easier for users to conduct brute force password guessing.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109068491801021&amp;w=2">20040724 eSeSIX Thintune thin client multiple vulnerabilities</ref>
    </refs>
    <vuln_soft>
      <prod name="thintune" vendor="esesix">
        <vers num="2.4.38" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2053" seq="2004-2053" published="2004-07-24" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in index.php in EasyIns Stadtportal 4 allows remote attackers to execute arbitrary PHP code via the site parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109069241512694&amp;w=2">20040724 Easyins Stadtportal</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010769">1010769</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10795">10795</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16797">easyins-php-file-include(16797)</ref>
    </refs>
    <vuln_soft>
      <prod name="easyins" vendor="easyins">
        <vers num="stadtportal_4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2054" seq="2004-2054" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in PhpBB 2.0.4 and 2.0.9 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via (1) the mode parameter to privmsg.php or (2) the redirect parameter to login.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109034476122723&amp;w=2">20040720 PhpBB HTTP Response Splitting &amp; Cross Site Scripting vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10753">10753</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16759">phpbb-search-response-splitting(16759)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb_group">
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.6c"/>
        <vers num="2.0.6d"/>
        <vers num="2.0.7"/>
        <vers num="2.0.7a"/>
        <vers num="2.0.8"/>
        <vers num="2.0.8a"/>
        <vers num="2.0.9"/>
        <vers num="2.0_beta1"/>
        <vers num="2.0_rc1"/>
        <vers num="2.0_rc2"/>
        <vers num="2.0_rc3"/>
        <vers num="2.0_rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2055" seq="2004-2055" published="2004-07-19" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php for PhpBB 2.0.4 and 2.0.9 allows remote attackers to inject arbitrary HTMl or web script via the search_author parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109034476122723&amp;w=2">20040720 PhpBB HTTP Response Splitting &amp; Cross Site Scripting vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10753" adv="1">10753</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16758">phpbb-search-searchauthor-xss(16758)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb_group">
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.6c"/>
        <vers num="2.0.6d"/>
        <vers num="2.0.7"/>
        <vers num="2.0.7a"/>
        <vers num="2.0.8"/>
        <vers num="2.0.8a"/>
        <vers num="2.0.9"/>
        <vers num="2.0_beta1"/>
        <vers num="2.0_rc1"/>
        <vers num="2.0_rc2"/>
        <vers num="2.0_rc3"/>
        <vers num="2.0_rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2056" seq="2004-2056" published="2004-12-31" modified="2017-07-18" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in action.php in Nucleus CMS 3.01 allows remote attackers to execute arbitrary SQL statements via the itemid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109087144509299&amp;w=2">20040725 NucleusCMS 3.01 SQL Injection Vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18002">nucleus-sql-injection(18002)</ref>
    </refs>
    <vuln_soft>
      <prod name="nucleus_cms" vendor="nucleus_group">
        <vers num="3.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2057" seq="2004-2057" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in ASPRunner 2.4 allows remote attackers to execute arbitrary SQL statements.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0011.html">20040726 ASPRunner Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://ferruh.mavituna.com/article/?574">http://ferruh.mavituna.com/article/?574</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109086977330418&amp;w=2">20040726 ASPRunner Multiple Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010777">1010777</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10799">10799</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16799">asprunner-sql-injection(16799)</ref>
    </refs>
    <vuln_soft>
      <prod name="asprunner" vendor="xlinesoft">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2058" seq="2004-2058" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ASPRunner 2.4 allows remote attackers to gain sensitive information via (1) hidden form fields or (2) error messages.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0011.html">20040726 ASPRunner Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://ferruh.mavituna.com/article/?574">http://ferruh.mavituna.com/article/?574</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109086977330418&amp;w=2">20040726 ASPRunner Multiple Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010777">1010777</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10799">10799</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16800">asprunner-information-disclosure(16800)</ref>
    </refs>
    <vuln_soft>
      <prod name="asprunner" vendor="xlinesoft">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2059" seq="2004-2059" published="2004-12-31" modified="2017-07-18" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting vulnerabilities in ASPRunner 2.4 allow remote attackers to inject arbitrary web script or HTML via the (1) SearchFor parameter in [TABLE-NAME]_search.asp, (2) SQL parameter in [TABLE-NAME]_edit.asp, (3) SearchFor parameter in [TABLE]_list.asp, or (4) SQL parameter in export.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0011.html">20040726 ASPRunner Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://ferruh.mavituna.com/article/?574">http://ferruh.mavituna.com/article/?574</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109086977330418&amp;w=2">20040726 ASPRunner Multiple Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010777">1010777</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10799">10799</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16801">asprunner-xss(16801)</ref>
    </refs>
    <vuln_soft>
      <prod name="asprunner" vendor="xlinesoft">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2060" seq="2004-2060" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ASPRunner 2.4 stores the database under the web root in the db directory, which may allow remote attackers to obtain the database via a direct request to the database filename, which is predictable based on table and field names.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0011.html">20040726 ASPRunner Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://ferruh.mavituna.com/article/?574">http://ferruh.mavituna.com/article/?574</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109086977330418&amp;w=2">20040726 ASPRunner Multiple Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010777">1010777</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10799">10799</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16802">asprunner-database-file-access(16802)</ref>
    </refs>
    <vuln_soft>
      <prod name="asprunner" vendor="xlinesoft">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2061" seq="2004-2061" published="2004-07-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">RiSearch 1.0.01 and RiSearch Pro 3.2.06 allows remote attackers to use the show.pl script as an open proxy, or read arbitrary local files, by setting the url parameter to a (1) http://, (2) ftp://, or (3) file:// URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109095196526490&amp;w=2">20040727 IRM 009: RiSearch and RiSearch ProPro are vulnerable to open FTP/HTTP proxy, directory listings and file disclosure vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010788">1010788</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10812" adv="1">10812</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16817">risearch-show-open-proxy(16817)</ref>
    </refs>
    <vuln_soft>
      <prod name="risearch" vendor="risearch_software">
        <vers num="0.99.1"/>
        <vers num="0.99.2"/>
        <vers num="0.99.3"/>
        <vers num="0.99.4"/>
        <vers num="0.99.5"/>
        <vers num="0.99.6"/>
        <vers num="0.99.7"/>
        <vers num="0.99.8"/>
      </prod>
      <prod name="risearch_pro" vendor="risearch_software">
        <vers num="3.2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2062" seq="2004-2062" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in antiboard.php in AntiBoard 0.7.2 and earlier allows remote attackers to execute arbitrary SQL via the (1) thread_id, (2) parent_id, or (3) mode parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109105610220965&amp;w=2">20040728 AntiBoard &lt;= 0.7.2 XSS/SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10821">10821</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16828">antiboard-get-sql-injection(16828)</ref>
    </refs>
    <vuln_soft>
      <prod name="antiboard" vendor="antiboard">
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.61"/>
        <vers num="0.62"/>
        <vers num="0.63"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2063" seq="2004-2063" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in antiboard.php in AntiBoard 0.7.2 and earlier allows remote attackers to inject arbitrary HTML or web script via the feedback parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109105610220965&amp;w=2">20040728 AntiBoard &lt;= 0.7.2 XSS/SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10821">10821</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16830">antiboard-feedback-xss(16830)</ref>
    </refs>
    <vuln_soft>
      <prod name="antiboard" vendor="antiboard">
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.61"/>
        <vers num="0.62"/>
        <vers num="0.63"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2064" seq="2004-2064" published="2004-07-29" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in lostBook 1.1 and earlier allows remote attackers to inject arbitrary web script via the (1) Email or (2) Website fields.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109112282611808&amp;w=2">20040729 lostBook v1.1 Javascript Execution</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010812">1010812</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10825" adv="1">10825</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16835">lostbook-email-website-xss(16835)</ref>
    </refs>
    <vuln_soft>
      <prod name="lostbook" vendor="verylost">
        <vers num="1.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2065" seq="2004-2065" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">DansGuardian 2.8 and earlier allows remote attackers to bypass the extension filtering rule via a hex encoded extension or . in the filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dansguardian.org/?page=history">http://dansguardian.org/?page=history</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109113126217408&amp;w=2">20040729 DansGuardian Hex Encoding URL Banned Extension Filter Bypass</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010817">1010817</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10823" patch="1">10823</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16836">dansguardian-filename-bypass-filtering(16836)</ref>
    </refs>
    <vuln_soft>
      <prod name="dansguardian" vendor="daniel_barron">
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.7.1"/>
        <vers num="2.2.8"/>
        <vers num="2.2.9"/>
        <vers num="2.2.9.1"/>
        <vers num="2.2.10"/>
        <vers num="2.4.5.1"/>
        <vers num="2.6.1.5"/>
        <vers num="2.7.3.1"/>
        <vers num="2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2066" seq="2004-2066" published="2004-07-29" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in session.php in LinPHA 0.9.4 allows remote attackers to execute arbitrary SQL code and bypass authentication via the (1) linpha_userid or (2) linpha_password cookies.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109112246805277&amp;w=2">20040729 Linpha 0.9.4: authentication bypass</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10827" adv="1">10827</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16834">linpha-cookie-gain-access(16834)</ref>
    </refs>
    <vuln_soft>
      <prod name="linpha" vendor="linpha">
        <vers num="0.9.0"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2067" seq="2004-2067" published="2004-07-29" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in controlpanel.php in Jaws Framework and Content Management System 0.4 allows remote attackers to execute arbitrary SQL and bypass authentication via the (1) user, (2) password, or (3) crypted_password parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109116345930380&amp;w=2">20040729 Jaws 0.4: authentication bypass</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010815">1010815</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10826" adv="1">10826</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16847">jaws-controlpanel-sql-injection(16847)</ref>
    </refs>
    <vuln_soft>
      <prod name="jaws" vendor="jaws">
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2068" seq="2004-2068" published="2004-12-31" modified="2017-07-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">fetchnews in leafnode 1.9.47 and earlier allows remote attackers to cause a denial of service (process hang) via an empty NNTP news article with missing mandatory headers.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://leafnode.sourceforge.net/leafnode-SA-2004-01.txt" patch="1">http://leafnode.sourceforge.net/leafnode-SA-2004-01.txt</ref>
      <ref source="VULNWATCH" url="http://www.derkeiler.com/Mailing-Lists/VulnWatch/2004-01/0009.html">20040109 leafnode -1.9.47 security announcement SA-2004-01</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14189">leafnode-fetchnews-nntp-dos(14189)</ref>
    </refs>
    <vuln_soft>
      <prod name="leafnode" vendor="leafnode">
        <vers num="1.9.25"/>
        <vers num="1.9.26"/>
        <vers num="1.9.27"/>
        <vers num="1.9.28"/>
        <vers num="1.9.29"/>
        <vers num="1.9.30"/>
        <vers num="1.9.31"/>
        <vers num="1.9.32"/>
        <vers num="1.9.33"/>
        <vers num="1.9.34"/>
        <vers num="1.9.35"/>
        <vers num="1.9.36"/>
        <vers num="1.9.37"/>
        <vers num="1.9.38"/>
        <vers num="1.9.39"/>
        <vers num="1.9.40"/>
        <vers num="1.9.41"/>
        <vers num="1.9.42"/>
        <vers num="1.9.43"/>
        <vers num="1.9.44"/>
        <vers num="1.9.45"/>
        <vers num="1.9.46"/>
        <vers num="1.9.47"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2069" seq="2004-2069" published="2004-12-31" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://marc.info/?l=openssh-unix-dev&amp;m=107520317020444&amp;w=2">[openssh-unix-dev] 20040127 OpenSSH - Connection problem when LoginGraceTime exceeds time</ref>
      <ref source="MLIST" url="http://marc.info/?l=openssh-unix-dev&amp;m=107529205602320&amp;w=2">[openssh-unix-dev] 20040128 Re: OpenSSH - Connection problem when LoginGraceTime exceeds time</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2005-550.html">RHSA-2005:550</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf">http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf">http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf</ref>
      <ref source="FEDORA" url="http://www.securityfocus.com/archive/1/425397/100/0/threaded">FLSA-2006:168935</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/451404/100/0/threaded">20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/451417/100/200/threaded">20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/451426/100/200/threaded">20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/14963">14963</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/download/esx/esx-202-200610-patch.html">http://www.vmware.com/download/esx/esx-202-200610-patch.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/download/esx/esx-213-200610-patch.html">http://www.vmware.com/download/esx/esx-213-200610-patch.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html">http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html</ref>
      <ref source="CONFIRM" url="http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html">http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/4502">ADV-2006-4502</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/20930">openssh-sshdc-logingracetime-dos(20930)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541">oval:org.mitre.oval:def:11541</ref>
    </refs>
    <vuln_soft>
      <prod name="openssh" vendor="openbsd">
        <vers num="3.6.1p2"/>
        <vers num="3.7.1p2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2070" seq="2004-2070" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Altiris Client Service for Windows 5.6 SP1 Hotfix E (5.6.181) allows local users to execute arbitrary commands by opening the AClient tray icon and using the View Log File option, a different vulnerability than CVE-2005-1590.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/381649">20041119 Privilege escalation flaw in AClient Service for Windows (Version 5.6.181).</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2071" seq="2004-2071" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Macallan Mail Solution 2.8.4.6 (Build 260), and possibly earlier versions, allows remote attackers to bypass authentication in the web interface via an HTTP GET request with two slashes ("//") after the server name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009030">1009030</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9646">9646</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15194">macallan-gain-unauthorized-access(15194)</ref>
    </refs>
    <vuln_soft>
      <prod name="mail_solution" vendor="macallan">
        <vers num="2.8.4.6_build_260"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2072" seq="2004-2072" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php for Mambo Open Source 4.6, and possibly earlier versions, allows remote attackers to execute script on other clients via the Itemid parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9588">9588</ref>
      <ref source="MISC" url="http://www.systemsecure.org/advisories/ssadvisory06022004.php">http://www.systemsecure.org/advisories/ssadvisory06022004.php</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15062">mambo-itemid-xss(15062)</ref>
    </refs>
    <vuln_soft>
      <prod name="mambo_open_source" vendor="mambo">
        <vers num="4.6" edition=":cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2073" seq="2004-2073" published="2004-02-06" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Linux-VServer 1.24 allows local users with root privileges on a virtual server to gain access to the filesystem outside the virtual server via a modified chroot-again exploit using the chmod command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.linux-vserver.org/index.php?page=ChangeLog" adv="1" patch="1">http://www.linux-vserver.org/index.php?page=ChangeLog</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/353003" adv="1">20040206 Linux 2.4.24 with vserver 1.24 exploit</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9596" adv="1">9596</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15073">linux-vserver-gain-privileges(15073)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2074" seq="2004-2074" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in Dream FTP 1.02 allows local users to cause a denial of service (crash) via format string specifiers in the (1) PASS or (2) RETR commands.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009295">1009295</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9800">9800</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15380">dreamftp-command-format-string(15380)</ref>
    </refs>
    <vuln_soft>
      <prod name="dream_ftp_server" vendor="bolintech">
        <vers num="1.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2075" seq="2004-2075" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Sophos Anti-Virus 3.78 allows remote attackers to cause a denial of service (infinite loop) via a MIME header that is not properly terminated.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009042">1009042</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9648" patch="1">9648</ref>
      <ref source="CONFIRM" url="http://www.sophos.com/support/news/#mime-378">http://www.sophos.com/support/news/#mime-378</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15191">sophos-mime-header-dos(15191)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2076" seq="2004-2076" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php for Jelsoft vBulletin 3.0.0 RC4 allows remote attackers to inject arbitrary web script or HTML via the query parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/353869">20040213 vBulletin PHP Forum Version</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9656">9656</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15208">vbulletin-search-xss(15208)</ref>
    </refs>
    <vuln_soft>
      <prod name="vbulletin" vendor="jelsoft">
        <vers num="3.0.0_rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2077" seq="2004-2077" published="2004-02-08" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Nadeo Game Engine for Nadeo TrackMania and Nadeo Virtual Skipper 3 allows remote attackers to cause a denial of service (server crash) via malformed data to TCP port 2350, possibly due to long values or incorrect size fields.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteinfo.com/attaques/hacking/trackmaniados.shtml" adv="1">http://www.securiteinfo.com/attaques/hacking/trackmaniados.shtml</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/353182" adv="1">20040208 TrackMania Demo Denial of Service</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/353226" adv="1">20040209 Re: TrackMania Demo Denial of Service</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9604" adv="1">9604</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15081">trackmania-dos(15081)</ref>
    </refs>
    <vuln_soft>
      <prod name="game_engine" vendor="nadeo">
        <vers num=""/>
      </prod>
      <prod name="trackmania" vendor="nadeo">
        <vers num=""/>
      </prod>
      <prod name="virtual_skipper" vendor="nadeo">
        <vers num="3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2078" seq="2004-2078" published="2004-02-09" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Red-M Red-Alert 2.7.5 with software 3.1 build 24 allows remote attackers to cause a denial of service (reboot and loss of logged events) via a long request to TCP port 80, possibly triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://genhex.org/releases/031003.txt" adv="1">http://genhex.org/releases/031003.txt</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=107635119005407&amp;w=2">20040209 Red-M Red-Alert Multiple Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009001" adv="1" patch="1">1009001</ref>
      <ref source="MISC" url="http://www.securiteam.com/securitynews/5SP0C0KC0A.html" adv="1">http://www.securiteam.com/securitynews/5SP0C0KC0A.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/353211" adv="1">20040209 Red-M Red-Alert Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9618" adv="1">9618</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15086">redalert-long-request-dos(15086)</ref>
    </refs>
    <vuln_soft>
      <prod name="red-alert" vendor="red-m">
        <vers num="2.7.5_v3.1_build_24"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2079" seq="2004-2079" published="2004-02-09" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Red-M Red-Alert 2.7.5 with software 3.1 build 24 binds authentication to IP addresses, which allows remote attackers to bypass authentication by connecting from the same IP address as an active authenticated user.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://genhex.org/releases/031003.txt" adv="1">http://genhex.org/releases/031003.txt</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=107635119005407&amp;w=2">20040209 Red-M Red-Alert Multiple Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009001" adv="1" patch="1">1009001</ref>
      <ref source="MISC" url="http://www.securiteam.com/securitynews/5SP0C0KC0A.html" adv="1">http://www.securiteam.com/securitynews/5SP0C0KC0A.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/353211" adv="1">20040209 Red-M Red-Alert Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9618" adv="1">9618</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15088">redalert-gain-access(15088)</ref>
    </refs>
    <vuln_soft>
      <prod name="red-alert" vendor="red-m">
        <vers num="2.7.5_v3.1_build_24"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2080" seq="2004-2080" published="2004-02-09" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Red-M Red-Alert 2.7.5 with software 3.1 build 24 converts multiple spaces in a Service Set Identifier (SSID) to a single space, which prevents Red-Alert from correctly identifying the SSID.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://genhex.org/releases/031003.txt" adv="1">http://genhex.org/releases/031003.txt</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=107635119005407&amp;w=2">20040209 Red-M Red-Alert Multiple Vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009001" adv="1" patch="1">1009001</ref>
      <ref source="MISC" url="http://www.securiteam.com/securitynews/5SP0C0KC0A.html" adv="1">http://www.securiteam.com/securitynews/5SP0C0KC0A.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/353211" adv="1">20040209 Red-M Red-Alert Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9618" adv="1">9618</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15089">redalert-bypass-security(15089)</ref>
    </refs>
    <vuln_soft>
      <prod name="red-alert" vendor="red-m">
        <vers num="2.7.5_v3.1_build_24"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2081" seq="2004-2081" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The samiftp.dll library in Sami FTP Server 1.1.3 allows local users to cause a denial of service (pmsystem.exe crash) by issuing (1) a CD command with a tilde (~) character or dot dot (/../) or (2) a GET command for an unavailable file.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.karja.com/samiftp/news.html" adv="1" patch="1">http://www.karja.com/samiftp/news.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/353753">20040213 Sami FTP Server 1.1.3 multiple vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9657" adv="1">9657</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15204">sami-cd-get-dos(15204)</ref>
    </refs>
    <vuln_soft>
      <prod name="sami_ftp_server" vendor="karjasoft">
        <vers num="1.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2082" seq="2004-2082" published="2004-02-13" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The samiftp.dll library in Sami FTP Server 1.1.3 allows remote authenticated users to cause a denial of service (pmsystem.exe crash) via a GET request wit a large number of leading "/" (slash) characters.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.karja.com/samiftp/news.html" adv="1" patch="1">http://www.karja.com/samiftp/news.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/353753">20040213 Sami FTP Server 1.1.3 multiple vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9657" adv="1">9657</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15204">sami-cd-get-dos(15204)</ref>
    </refs>
    <vuln_soft>
      <prod name="sami_ftp_server" vendor="karjasoft">
        <vers num="1.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2083" seq="2004-2083" published="2004-02-11" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/windows/750b1/">http://www.opera.com/docs/changelogs/windows/750b1/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9640">9640</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/21698">opera-cslid-extension-spoof(21698)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0.1" edition=":win32"/>
        <vers num="7.0.2" edition=":win32"/>
        <vers num="7.0.3" edition=":win32"/>
        <vers num="7.0_beta1" edition=":win32"/>
        <vers num="7.0_beta2" edition=":win32"/>
        <vers num="7.10"/>
        <vers num="7.11"/>
        <vers num="7.11b"/>
        <vers num="7.11j"/>
        <vers num="7.20"/>
        <vers num="7.20_beta1_build2981"/>
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2084" seq="2004-2084" published="2004-02-07" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php in JShop E-Commerce Server allows remote attackers to inject arbitrary web script or HTML via the xSearch parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008988" adv="1">1008988</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9609" adv="1">9609</ref>
      <ref source="MISC" url="http://www.systemsecure.org/advisories/ssadvisory09022004.php" adv="1">http://www.systemsecure.org/advisories/ssadvisory09022004.php</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15100">jshop-searchphp-xss(15100)</ref>
    </refs>
    <vuln_soft>
      <prod name="jshop_professional" vendor="jshop_e-commerce">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.2"/>
        <vers num="3.3"/>
        <vers num="3.4"/>
      </prod>
      <prod name="jshop_server" vendor="jshop_e-commerce">
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.1.0"/>
        <vers num="1.2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2085" seq="2004-2085" published="2004-02-04" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Brad Fears phpCodeCabinet 0.4 and earlier allow remote attackers to inject arbitrary web script or HTML via multiple parameters, including (1) the sid parameter to comments.php, (2) the cid, cf, or rfd parameters to category.php, or the cid parameter to (3) input.php, (4) browse.php, (5) themes/facade/header.php, or (6) themes/phpcc/header.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/browse.php?r1=1.5&amp;r2=1.6" adv="1">http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/browse.php?r1=1.5&amp;r2=1.6</ref>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/category.php?r1=1.4&amp;r2=1.5" adv="1">http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/category.php?r1=1.4&amp;r2=1.5</ref>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/comments.php?r1=1.1&amp;r2=1.2" adv="1">http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/comments.php?r1=1.1&amp;r2=1.2</ref>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/input.php?r1=1.7&amp;r2=1.8" adv="1">http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/input.php?r1=1.7&amp;r2=1.8</ref>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/facade/header.php?r1=1.4&amp;r2=1.5" adv="1">http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/facade/header.php?r1=1.4&amp;r2=1.5</ref>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/phpcc/header.php?r1=1.4&amp;r2=1.5" adv="1">http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/phpcc/header.php?r1=1.4&amp;r2=1.5</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009012">1009012</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=214860" adv="1">http://sourceforge.net/project/shownotes.php?release_id=214860</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9601" adv="1" patch="1">9601</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9645" adv="1" patch="1">9645</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15190">phpcodecabinet-multiple-xss(15190)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpcodecabinet" vendor="brad_fears">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2086" seq="2004-2086" published="2004-02-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in results.stm for Sambar Server before the 6.0 production release allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a long query parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008979" adv="1">1008979</ref>
      <ref source="CONFIRM" url="http://www.sambar.com/security.htm" adv="1" patch="1">http://www.sambar.com/security.htm</ref>
      <ref source="VULN-DEV" url="http://www.securityfocus.com/archive/82/353087" adv="1">20040207 Sambar 6.0 stack overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9607" adv="1">9607</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15071">sambar-http-post-bo(15071)</ref>
    </refs>
    <vuln_soft>
      <prod name="sambar_server" vendor="sambar">
        <vers num="6.0" edition="beta3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2087" seq="2004-2087" published="2004-02-08" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in SandSurfer before 1.7.0 allows remote attackers to gain access as a logged-in user.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009110" adv="1" patch="1">1009110</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=351705" adv="1" patch="1">http://sourceforge.net/forum/forum.php?forum_id=351705</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9647" adv="1" patch="1">9647</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15193">sandsurfer-gain-access(15193)</ref>
    </refs>
    <vuln_soft>
      <prod name="sandsurfer" vendor="sandsurfer">
        <vers num="1.6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2088" seq="2004-2088" published="2004-02-12" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Sophos Anti-Virus 3.78 allows remote attackers to bypass virus scanning by using a qmail generated Delivery Status Notification (DSN) where the original email is not included in the bounce message.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009042">1009042</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9650" adv="1" patch="1">9650</ref>
      <ref source="CONFIRM" url="http://www.sophos.com/support/news/#mime-378" patch="1">http://www.sophos.com/support/news/#mime-378</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15192">sophos-email-virus-undetected(15192)</ref>
    </refs>
    <vuln_soft>
      <prod name="sophos_anti-virus" vendor="sophos">
        <vers num="3.4.6"/>
        <vers num="3.78"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2089" seq="2004-2089" published="2004-02-06" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Matrix FTP Server allows remote attackers to cause a denial of service (crash) by logging in using four spaces as the username and password and then issuing a LIST command.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008970" adv="1">1008970</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15075">matrixftp-login-list-dos(15075)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2090" seq="2004-2090" published="2004-02-07" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 5.0.1 through 6.0 allows remote attackers to determine the existence of arbitrary files via the VBScript LoadPicture method, which returns an error code if the file does not exist.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016881.html" adv="1">20040207 (no subject)</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9611" adv="1">9611</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15078">ie-error-obtain-information(15078)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.0.1" edition="sp1"/>
        <vers num="5.0.1" edition="sp2"/>
        <vers num="5.0.1" edition="sp3"/>
        <vers num="5.0.1" edition="sp4"/>
        <vers num="5.5" edition="sp1"/>
        <vers num="5.5" edition="sp2"/>
        <vers num="6.0" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2091" seq="2004-2091" published="2004-02-10" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Microsoft Baseline Security Analyzer (MBSA) 1.2 does not correctly identify systems that have been patched but remain vulnerable to exploit until the system is rebooted, possibly giving the administrator a false sense of security.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/353324" adv="1">20040210 Another Low Blow From Microsoft: MBSA Failure!</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9634" adv="1">9634</ref>
    </refs>
    <vuln_soft>
      <prod name="baseline_security_analyzer" vendor="microsoft">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2092" seq="2004-2092" published="2004-02-09" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">eTrust InoculateIT for Linux 6.0 uses insecure permissions for multiple files and directories, including the application's registry and tmp directories, which allows local users to delete, modify, or examine sensitive information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107635584431518&amp;w=2">20040209 [local problems] eTrust Virus Protection 6.0 InoculateIT for linux</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9616">9616</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15103">etrust-inoculateit-insecure-permissions(15103)</ref>
    </refs>
    <vuln_soft>
      <prod name="inoculateit" vendor="ca">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2093" seq="2004-2093" published="2004-02-09" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the open_socket_out function in socket.c for rsync 2.5.7 and earlier allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long RSYNC_PROXY environment variable.  NOTE: since rsync is not setuid, this issue does not provide any additional privileges beyond those that are already available to the user.  Therefore this issue may be REJECTED in the future.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="VULN-DEV" url="http://archives.neohapsis.com/archives/vuln-dev/2004-q1/0091.html" adv="1">20040209 rsync &lt;= 2.5.7 local buffer overflow (no root today:)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15108">linux-rsync-opensocketout-bo(15108)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2094" seq="2004-2094" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in WebcamXP 1.06.945 allows remote attackers to inject arbitrary HTML or web script as other users via a URL that contains the script.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107471195326270&amp;w=2">20040121 WebcamXP v1.06.945 Cross Site Scripting Vulnerabillity</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9465">9465</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14904">webcamxp-xss(14904)</ref>
    </refs>
    <vuln_soft>
      <prod name="webcam_xp" vendor="darkwet">
        <vers num="1.6.945"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2095" seq="2004-2095" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107471181426047&amp;w=2">20040121 Honeyd Security Advisory 2004-001: Remote Detection Via Simple Probe Packet</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107473095118505&amp;w=2">20040121 [ GLSA 200401-02 ] Honeyd remote detection vulnerability via a probe packet</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9464">9464</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008818">1008818</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14905">honeyd-nmap-information-disclosure(14905)</ref>
    </refs>
    <vuln_soft>
      <prod name="honeyd" vendor="niels_provos">
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.6a"/>
        <vers num="0.7"/>
        <vers num="0.7a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2096" seq="2004-2096" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Mephistoles httpd 0.6.0 final allows remote attackers to execute arbitrary script as other users by injecting arbitrary HTML or script into the URL.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107470433714179&amp;w=2">20040121 Mephistoles Httpd 0.6.0final XSS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9470" patch="1">9470</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14899">mephistoles-httpd-xss(14899)</ref>
    </refs>
    <vuln_soft>
      <prod name="mephistoles_httpd" vendor="mephistoles_internet_suite">
        <vers num="0.6_final"/>
        <vers num="0.6_p1"/>
        <vers num="0.6_p2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2097" seq="2004-2097" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple scripts on SuSE Linux 9.0 allow local users to overwrite arbitrary files via a symlink attack on (1) /tmp/fvwm-bug created by fvwm-bug, (2) /tmp/wmmenu created by wm-oldmenu2new, (3) /tmp/rates created by x11perfcomp, (4) /tmp/xf86debug.1.log created by xf86debug, (5) /tmp/.winpopup-new created by winpopup-send.sh, or (6) /tmp/initrd created by lvmcreate_initrd.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107461582413923&amp;w=2">20040121 [SuSE 9.0] possible symlink attacks in some scripts</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107478920006258&amp;w=2">20040122 Re: [SuSE 9.0] possible symlink attacks in some scripts</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008781">1008781</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9457">9457</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14963">suse-multiple-symlink-attack(14963)</ref>
    </refs>
    <vuln_soft>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2098" seq="2004-2098" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the banner engine (TBE) 5.0 allows remote attackers to execute arbitrary script as other users via the HTML banner view/preview capability.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107479071808330&amp;w=2">20040122 TBE - the banner engine server-side script execution vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9472">9472</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14911">tbe-xss(14911)</ref>
    </refs>
    <vuln_soft>
      <prod name="tbe_banner_engine" vendor="native_solutions">
        <vers num="4.0"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2099" seq="2004-2099" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Need for Speed Hot Pursuit 2.0 client (NFSHP2), version 242 and earlier, allows remote attackers (servers) to execute arbitrary code via long (1) gamename, (2) gamever, (3) hostname, (4) gametype, (5) mapname or (6) gamemode commands.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/nfshp2cbof-adv.txt">http://aluigi.altervista.org/adv/nfshp2cbof-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107479094508691&amp;w=2">20040122 Need for Speed Hot pursuit 2 &lt;= 242 client's buffer overflow</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9473">9473</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14909">hotpursuit2-bo(14909)</ref>
    </refs>
    <vuln_soft>
      <prod name="need_for_speed_hot_pursuit_2" vendor="electronic_arts">
        <vers num="242.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2100" seq="2004-2100" published="2004-12-31" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">GeoHttpServer, when configured to authenticate users, allows remote attackers to bypass authentication and access unauthorized files via a URL that contains %0a%0a (encoded newlines).</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107480261825214&amp;w=2">20040122 GeoHttpServer Authentification Bypass Vulnerability &amp; D.O.S (Denial Of Service)</ref>
    </refs>
    <vuln_soft>
      <prod name="geohttpserver" vendor="geovision">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2101" seq="2004-2101" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The sysinfo script in GeoHttpServer allows remote attackers to cause a denial of service (crash) via a long pwd parameter, possibly triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107480261825214&amp;w=2">20040122 GeoHttpServer Authentification Bypass Vulnerability &amp; D.O.S (Denial Of Service)</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008807">1008807</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14913">geohttpserver-long-password-bo(14913)</ref>
    </refs>
    <vuln_soft>
      <prod name="geohttpserver" vendor="geovision">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2102" seq="2004-2102" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in FREESCO 2.05, a modified version of thttpd, allows remote attackers to inject arbitrary web script or HTML via the test parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107480309925905&amp;w=2">20040122 FREESCO public http server - Cross Site Scripting Vulnerabillity</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14916">freesco-thttpd-xss(14916)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2103" seq="2004-2103" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Novell NetWare Enterprise Web Server 5.1 and 6.0 allows remote attackers to process arbitrary script or HTML as other users via (1) a malformed request for a Perl program with script in the filename, (2) the User.id parameter to the webacc servlet, (3) the GWAP.version parameter to webacc, or (4) a URL request for a .bas file with script in the filename.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107487862304440&amp;w=2">20040123 NetWare-Enterprise-Web-Server/5.1/6.0 Multiple Vulnerabilities</ref>
      <ref source="CONFIRM" url="http://support.novell.com/cgi-bin/search/searchtid.cgi?/10091529.htm">http://support.novell.com/cgi-bin/search/searchtid.cgi?/10091529.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14919">netware-enterprise-cgi2perl-xss(14919)</ref>
    </refs>
    <vuln_soft>
      <prod name="netware" vendor="novell">
        <vers num="5.1"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2104" seq="2004-2104" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Novell NetWare Enterprise Web Server 5.1 and 6.0 allows remote attackers to obtain sensitive server information, including the internal IP address, via a direct request to (1) snoop.jsp, (2) SnoopServlet, (3) env.bas, or (4) lcgitest.nlm.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107487862304440&amp;w=2">20040123 NetWare-Enterprise-Web-Server/5.1/6.0 Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9479">9479</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14921">netware-enterprise-path-disclosure(14921)</ref>
    </refs>
    <vuln_soft>
      <prod name="netware" vendor="novell">
        <vers num="5.1"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2105" seq="2004-2105" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The webacc servlet in Novell NetWare Enterprise Web Server 5.1 and 6.0 allows remote attackers to read arbitrary .htt files via a full pathname in the error parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107487862304440&amp;w=2">20040123 NetWare-Enterprise-Web-Server/5.1/6.0 Multiple Vulnerabilities</ref>
    </refs>
    <vuln_soft>
      <prod name="netware" vendor="novell">
        <vers num="5.1"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2106" seq="2004-2106" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Novell NetWare Enterprise Web Server 5.1 and 6.0 allows remote attackers to list directories via a direct request to (1) /com/, (2) /com/novell/, (3) /com/novell/webaccess, or (4) /ns-icons/.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107487862304440&amp;w=2">20040123 NetWare-Enterprise-Web-Server/5.1/6.0 Multiple Vulnerabilities</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/21749">netware-enterprise-directory-disclosure(21749)</ref>
    </refs>
    <vuln_soft>
      <prod name="netware" vendor="novell">
        <vers num="5.1"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2107" seq="2004-2107" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Finjan SurfinGate 6.0 and 7.0, when running in proxy mode, does not authenticate FHTTP commands on TCP port 3141, which allows remote attackers to use the finjan-parameter-type header to (1) restart the service, (2) use the getlastmsg command to view log information, or (3) use the online command to force a policy update from the database server.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0929.html" patch="1">20040123 Finjan SurfinGate Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107487999406339&amp;w=2">20040123 Finjan SurfinGate Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107522480913629&amp;w=2">20040126 RE: Finjan SurfinGate Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9478" patch="1">9478</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14934">finjan-surfingate-execute-commands(14934)</ref>
    </refs>
    <vuln_soft>
      <prod name="surfingate" vendor="finjan_software">
        <vers num="6.0"/>
        <vers num="6.0_1"/>
        <vers num="6.0_5"/>
        <vers num="7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2108" seq="2004-2108" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in QuadComm Q-Shop allow remote attackers to execute arbitrary SQL commands via certain parameters to (1) search.asp, (2) browse.asp, (3) details.asp, (4) showcat.asp, (5) users.asp, (6) addtomylist.asp, (7) modline.asp, (8) cart.asp, or (9) newuser.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107488132208229&amp;w=2">20040123 QuadComm Q-Shop ASP Shopping Cart Software multiple security vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Jan/1008837.html">1008837</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9481">9481</ref>
      <ref source="MISC" url="http://www.s-quadra.com/advisories/Adv-20040123.txt">http://www.s-quadra.com/advisories/Adv-20040123.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14922">qshop-multiple-sql-injection(14922)</ref>
    </refs>
    <vuln_soft>
      <prod name="q-shop" vendor="quadcomm">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.5"/>
        <vers num="2.5_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2109" seq="2004-2109" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in (1) imagezoom.asp or (2) recommend.asp in Q-Shop allow remote attackers to execute arbitrary script and steal the user session ID via Javascript in a URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107488132208229&amp;w=2">20040123 QuadComm Q-Shop ASP Shopping Cart Software multiple security vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9480" patch="1">9480</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14923">qshop-url-xss(14923)</ref>
    </refs>
    <vuln_soft>
      <prod name="q-shop" vendor="quadcomm">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.5"/>
        <vers num="2.5_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2110" seq="2004-2110" published="2004-12-31" modified="2016-10-17" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in register.php in Phorum before 3.4.6 allows remote attackers to execute arbitrary SQL commands via the hide_email parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107487971405960&amp;w=2">20040123 Multiple Vulnerabilities in Phorum 3.4.5</ref>
      <ref source="CONFIRM" url="http://phorum.org/">http://phorum.org/</ref>
    </refs>
    <vuln_soft>
      <prod name="phorum" vendor="phorum">
        <vers num="3.4.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2111" seq="2004-2111" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="8.5" CVSS_base_score="8.5" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in the site chmod command in Serv-U FTP Server before 4.2 allows remote attackers to execute arbitrary code via a long filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-01/0249.html">20040124 [SST]ServU MDTM command remote buffero verflow adv</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107513654005840&amp;w=2">20040126 Serv-U ftp 4.2 site chmod long_file_name exploit</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008841">1008841</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9483">9483</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9675">9675</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14931">servu-chmodcommand-execute-code(14931)</ref>
    </refs>
    <vuln_soft>
      <prod name="serv-u" vendor="serv-u">
        <vers num="3.0.0.16"/>
        <vers num="3.0.0.17"/>
        <vers num="3.1.0.0"/>
        <vers num="3.1.0.1"/>
        <vers num="3.1.0.3"/>
        <vers num="4.0.0.4"/>
        <vers num="4.1.0.0"/>
        <vers num="4.1.0.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2112" seq="2004-2112" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in BremsServer 1.2.4 allows remote attackers to read arbitrary files via ".." (dot dot) sequences in the URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107513747107031&amp;w=2">20040126 Directory traversal and XSS in BremsServer 1.2.4</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9493">9493</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008853">1008853</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14954">bremsserver-dotdot-directory-traversal(14954)</ref>
    </refs>
    <vuln_soft>
      <prod name="bremsserver" vendor="herberlin">
        <vers num="1.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2113" seq="2004-2113" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in BremsServer 1.2.4 allows remote attackers to inject arbitrary web script or HTML via the URL.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107513747107031&amp;w=2">20040126 Directory traversal and XSS in BremsServer 1.2.4</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9491">9491</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008853">1008853</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14953">bremsserver-xss(14953)</ref>
    </refs>
    <vuln_soft>
      <prod name="bremsserver" vendor="herberlin">
        <vers num="1.2.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2114" seq="2004-2114" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based and heap-based buffer overflows in ProxyNow! 2.75 and earlier allow remote attackers to execute arbitrary code via a GET request with a long ftp:// URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107515550931508&amp;w=2">20040126 ProxyNow! 2.x Multiple Overflow Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9500">9500</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14955">proxynow-get-bo(14955)</ref>
    </refs>
    <vuln_soft>
      <prod name="proxynow" vendor="internetnow">
        <vers num="2.6"/>
        <vers num="2.75"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2115" seq="2004-2115" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Oracle HTTP Server 1.3.22, based on Apache, allow remote attackers to execute arbitrary script as other users via the (1) action, (2) username, or (3) password parameters in an isqlplus request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107496560106967&amp;w=2">20040124 Oracle HTTP Server Cross Site Scripting Vulnerabillity</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9484">9484</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14930">oraclehttpserver-isqlplus-xss(14930)</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="oracle">
        <vers num="8.1.7"/>
        <vers num="9.0.1"/>
        <vers num="9.2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2116" seq="2004-2116" published="2004-12-31" modified="2018-08-13" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Tiny Server 1.1 allows remote attackers to read or download arbitrary files via a .. (dot dot) in the URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107496530806730&amp;w=2">20040124 Tiny Server 1.1 (1.0.5) Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://packetstormsecurity.com/files/129320/Tiny-Server-1.1.9-Arbitrary-File-Disclosure.html">http://packetstormsecurity.com/files/129320/Tiny-Server-1.1.9-Arbitrary-File-Disclosure.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9485">9485</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14927">tinyserver-dotdot-directory-traversal(14927)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/99048">tinyserver-windows-dir-traversal(99048)</ref>
    </refs>
    <vuln_soft>
      <prod name="tinyserver" vendor="tinyserver">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2117" seq="2004-2117" published="2004-01-24" modified="2018-08-13" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Tiny Server 1.1 allows remote attackers to cause a denial of service (crash) via malformed HTTP requests such as (1) a GET request without the HTTP version (HTTP/1.1), or (2) a request without GET or the HTTP version.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107496530806730&amp;w=2">20040124 Tiny Server 1.1 (1.0.5) Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9485" adv="1">9485</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14928">tinyserver-string-dos(14928)</ref>
    </refs>
    <vuln_soft>
      <prod name="tinyserver" vendor="tinyserver">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2118" seq="2004-2118" published="2004-12-31" modified="2018-08-13" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Tiny Server 1.1 allows remote attackers to cause a denial of service (crash) via a GET request with a long filename, possibly due to a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107496530806730&amp;w=2">20040124 Tiny Server 1.1 (1.0.5) Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9485">9485</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14928">tinyserver-string-dos(14928)</ref>
    </refs>
    <vuln_soft>
      <prod name="tinyserver" vendor="tinyserver">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2119" seq="2004-2119" published="2004-12-31" modified="2018-08-13" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Tiny Server 1.1 allows remote attackers to inject arbitrary web script or HTML via the URL.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107496530806730&amp;w=2">20040124 Tiny Server 1.1 (1.0.5) Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9485">9485</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14929">tinyserver-xss(14929)</ref>
    </refs>
    <vuln_soft>
      <prod name="tinyserver" vendor="tinyserver">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2120" seq="2004-2120" published="2004-01-23" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Reptile Web Server allows remote attackers to cause a denial of service (CPU consumption) via multiple incomplete GET requests without the HTTP version.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107497355713434&amp;w=2">20040124 Resources consumption in Reptile webserver daily version</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008842" adv="1">1008842</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/reptilewsDailyVersion-adv.txt" adv="1">http://www.autistici.org/fdonato/advisory/reptilewsDailyVersion-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9482" adv="1">9482</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14932">reptilewebserver-get-dos(14932)</ref>
    </refs>
    <vuln_soft>
      <prod name="reptile_web_server" vendor="reptile_web_server">
        <vers num="2002-01-05"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2121" seq="2004-2121" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in Borland Web Server (BWS) 1.0b3 and earlier allow remote attackers to read and download arbitrary files via (1) multi-dot "......" sequences, or (2) "%5c%2e%2e" (encoded "\..") sequences, in the URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107497413413907&amp;w=2">20040124 BWS v1.0b3 Directory Transversal Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008840">1008840</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9486">9486</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14948">bws-directory-traversal(14948)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_server_for_corel_paradox" vendor="borland_software">
        <vers num="1.0_b3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2122" seq="2004-2122" published="2004-01-24" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in intraforum_db.cgi in Intra Forum allows remote attackers to inject arbitrary web script or HTML via the (1) use_last_read or (2) forum parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107497803617071&amp;w=2">20040124 Inrtra Forum Cross Site Scripting Vulnerabillity</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008839">1008839</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14933">intraforum-intraforumcgi-xss(14933)</ref>
    </refs>
    <vuln_soft>
      <prod name="intra_forum" vendor="intra_forum">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2123" seq="2004-2123" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Nextplace.com E-Commerce ASP Engine allow remote attackers to inject arbitrary web script or HTML via the (1) level parameter of productdetail.asp, (2) searchKey parameter of searchresults.asp, and possibly (3) level parameter of ListCategories.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107513601805018&amp;w=2">20040124 NextPlace.com E-Commerce ASP Engine</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14952">nextplace-multiple-xss(14952)</ref>
    </refs>
    <vuln_soft>
      <prod name="e-commerce_asp_engine" vendor="nextplace">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2124" seq="2004-2124" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The register_globals simulation capability in Gallery 1.3.1 through 1.4.1 allows remote attackers to modify the HTTP_POST_VARS variable and conduct a PHP remote file inclusion attack via the GALLERY_BASEDIR parameter, a different vulnerability than CVE-2002-1412.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=index" patch="1">http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=index</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107524414317693&amp;w=2">20040127 Remote exploit in Gallery 1.3.1, 1.3.2, 1.3.3, 1.4 and 1.4.1</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200402-04.xml">GLSA-200402-04</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9490">9490</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14950">gallery-gallerybasedir-file-include(14950)</ref>
    </refs>
    <vuln_soft>
      <prod name="gallery" vendor="gallery_project">
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.4"/>
        <vers num="1.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2125" seq="2004-2125" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in blackd.exe for BlackICE PC Protection 3.6 and other versions before 3.6.ccb, with application protection off, allows local users to gain system privileges by modifying the .INI file to contain a long packetLog.fileprefix value.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://archives.neohapsis.com/archives/iss/2004-q1/0157.html">[ISSForum] 20040128 Third party BlackICE advisory</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107530966524193&amp;w=2">20040128 SRT2004-01-17-0227 - BlackICE allows local users to become SYSTEM</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9514">9514</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14965">blackice-blackdexe-bo(14965)</ref>
    </refs>
    <vuln_soft>
      <prod name="blackice_agent_server" vendor="iss">
        <vers num="3.6eca"/>
      </prod>
      <prod name="blackice_pc_protection" vendor="iss">
        <vers num="3.6cbd"/>
      </prod>
      <prod name="blackice_server_protection" vendor="iss">
        <vers num="3.6cbz"/>
      </prod>
      <prod name="realsecure_desktop" vendor="iss">
        <vers num="3.6eca"/>
        <vers num="7.0ebg"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2126" seq="2004-2126" published="2004-12-31" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The upgrade for BlackICE PC Protection 3.6 and earlier sets insecure permissions for .INI files such as (1) blackice.ini, (2) firewall.ini, (3) protect.ini, or (4) sigs.ini, which allows local users to modify BlackICE configuration or possibly execute arbitrary code by exploiting vulnerabilities in the .INI parsers.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107530966524193&amp;w=2">20040128 SRT2004-01-17-0227 - BlackICE allows local users to become SYSTEM</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9513">9513</ref>
    </refs>
    <vuln_soft>
      <prod name="blackice_pc_protection" vendor="iss">
        <vers num="3.6cbz" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2127" seq="2004-2127" published="2004-01-20" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Web Blog 1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the file variable.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107531194527602&amp;w=2">20040128 ZH2004-01SA (security advisory): Web Blog 1.1 Remote arbitrary</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9517" adv="1" patch="1">9517</ref>
      <ref source="MISC" url="http://www.zone-h.org/en/advisories/read/id=3822/" adv="1" patch="1">http://www.zone-h.org/en/advisories/read/id=3822/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14978">webblog-dotdot-directory-traversal(14978)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_blog" vendor="leif_m._wright">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2128" seq="2004-2128" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in BRS WebWeaver 1.07 allows remote attackers to execute arbitrary script as other users via the query string to ISAPISkeleton.dll.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107531020924977&amp;w=2">20040128 BRS WebWeaver Webserver Cross Site Scripting Vulnerability</ref>
      <ref source="CONFIRM" url="http://www.brswebweaver.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=1">http://www.brswebweaver.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9516">9516</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008880">1008880</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14977">webweaver-isapiskeleton-xss(14977)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2129" seq="2004-2129" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">SurfNOW 2.2 allows remote attackers to cause a denial of service (crash) via a series of long HTTP GET requests, possibly triggering a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107530924723559&amp;w=2">20040128 Denial Of Service in SurfNOW 2.2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9519">9519</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14976">surfnow-get-dos(14976)</ref>
    </refs>
    <vuln_soft>
      <prod name="surfnow_professional" vendor="loom_software">
        <vers num="1.2"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
      <prod name="surfnow_standard" vendor="loom_software">
        <vers num="1.2"/>
        <vers num="1.4"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2130" seq="2004-2130" published="2004-12-23" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in privmsg.php in phpBB 2.0.6 allow remote attackers to execute arbitrary script or HTML via the (1) folder or (2) mode variables.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107530946123822&amp;w=2">20040128 phpBB privmsg.php XSS vulnerability patch.</ref>
      <ref source="CONFIRM" url="http://www.phpbb.com/phpBB/viewtopic.php?f=14&amp;t=161943" adv="1" patch="1">http://www.phpbb.com/phpBB/viewtopic.php?f=14&amp;t=161943</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9290" adv="1" patch="1">9290</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb_group">
        <vers num="2.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2131" seq="2004-2131" published="2004-01-27" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in ontape for IBM Informix Dynamic Server (IDS) 9.40.xC3 and earlier allows local users, with DSA privileges, to execute arbitrary code via a long ONCONFIG environment variable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107539878804074&amp;w=2">20040129 ----------========== OPEN3S-2003-08-08-eng-informix-ontape</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9512" adv="1" patch="1">9512</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21153336" adv="1" patch="1">http://www-1.ibm.com/support/docview.wss?uid=swg21153336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14970">informix-ontape-binary-bo(14970)</ref>
    </refs>
    <vuln_soft>
      <prod name="informix_dynamic_server" vendor="ibm">
        <vers num="9.40.uc1"/>
        <vers num="9.40.uc2"/>
      </prod>
      <prod name="informix_extended_parallel_server" vendor="ibm">
        <vers num="8.40_uc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2132" seq="2004-2132" published="2004-01-29" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in PJreview_Neo.cgi in PJ CGI Neo review allows remote attackers to read arbitrary files via a ..  (dot dot) in the p parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107539804702913&amp;w=2">20040129 ZH2004-02SA (security advisory): PJ CGI Neo review (NeoBoard review) Remote arbitrary file retrieving</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9524" adv="1">9524</ref>
      <ref source="MISC" url="http://www.zone-h.org/advisories/read/id=3824" adv="1">http://www.zone-h.org/advisories/read/id=3824</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14980">pjcgineoreview-dotdot-directory-traversal(14980)</ref>
    </refs>
    <vuln_soft>
      <prod name="pj_cgi_neo_review" vendor="pj_cgi_neo_review">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2133" seq="2004-2133" published="2004-01-29" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Certain third-party packages for CVSup 16.1h, such as SuSE Linux, contain untrusted paths in the ELF RPATH fields of certain executables, which could allow local users to execute arbitrary code by causing cvsup to link against malicious libraries that are created in world-writable directories such as /usr/src/packages.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0025.html" adv="1">20040129 Security Announcement: untrusted ELF library path in some cvsup binary RPMs</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107539776002450&amp;w=2">20040129 Security Announcement: untrusted ELF library path in some cvsup binary RPMs</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9523" adv="1" patch="1">9523</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14994">cvsup-rpath-gain-privileges(14994)</ref>
    </refs>
    <vuln_soft>
      <prod name="cvsup" vendor="cvsup">
        <vers num="cvsup-16.1h-2.i386.rpm"/>
        <vers num="cvsup-16.1h-36.i586.rpm"/>
        <vers num="cvsup-16.1h-43.i586.rpm"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2134" seq="2004-2134" published="2004-01-28" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Oracle toplink mapping workBench uses a weak encryption algorithm for passwords, which allows local users to decrypt the passwords.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107531028325112&amp;w=2">20040128 Oracle toplink mapping workbench password algorithm</ref>
      <ref source="MISC" url="http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=803&amp;lngWId=5">http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=803&amp;lngWId=5</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/352315/30/21430/threaded">20040128 Re: Oracle toplink mapping workbench password algorithm</ref>
      <ref source="VULN-DEV" url="http://www.securityfocus.com/archive/82/351719" adv="1">20040128 Re: Oracle toplink mapping workbench password algorithm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9515" adv="1">9515</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="9.0.2"/>
        <vers num="9.0.2.0.0"/>
        <vers num="9.0.2.0.1"/>
        <vers num="9.0.2.1"/>
        <vers num="9.0.2.2"/>
        <vers num="9.0.2.3"/>
        <vers num="9.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2135" seq="2004-2135" published="2004-05-26" modified="2016-10-17" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">cryptoloop on Linux kernel 2.6.x, when used on certain file systems with a block size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked files to be detected without decryption.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=107719798631935&amp;w=2">[linux-kernel] 20040219 Re: Oopsing cryptoapi (or loop device?) on 2.6.*</ref>
      <ref source="MISC" url="http://mareichelt.de/pub/notmine/diskenc.pdf">http://mareichelt.de/pub/notmine/diskenc.pdf</ref>
      <ref source="MISC" url="http://www.securiteam.com/exploits/5UP0P1PFPM.html" adv="1">http://www.securiteam.com/exploits/5UP0P1PFPM.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/13775" adv="1">13775</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.4.28"/>
        <vers num="2.4.29" edition="rc1"/>
        <vers num="2.4.29" edition="rc2"/>
        <vers num="2.4.30" edition="rc2"/>
        <vers num="2.4.30" edition="rc3"/>
        <vers num="2.4.31" edition="pre1"/>
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.6"/>
        <vers num="2.5.7"/>
        <vers num="2.5.8"/>
        <vers num="2.5.9"/>
        <vers num="2.5.10"/>
        <vers num="2.5.11"/>
        <vers num="2.5.12"/>
        <vers num="2.5.13"/>
        <vers num="2.5.14"/>
        <vers num="2.5.15"/>
        <vers num="2.5.16"/>
        <vers num="2.5.17"/>
        <vers num="2.5.18"/>
        <vers num="2.5.19"/>
        <vers num="2.5.20"/>
        <vers num="2.5.21"/>
        <vers num="2.5.22"/>
        <vers num="2.5.23"/>
        <vers num="2.5.24"/>
        <vers num="2.5.25"/>
        <vers num="2.5.26"/>
        <vers num="2.5.27"/>
        <vers num="2.5.28"/>
        <vers num="2.5.29"/>
        <vers num="2.5.30"/>
        <vers num="2.5.31"/>
        <vers num="2.5.32"/>
        <vers num="2.5.33"/>
        <vers num="2.5.34"/>
        <vers num="2.5.35"/>
        <vers num="2.5.36"/>
        <vers num="2.5.37"/>
        <vers num="2.5.38"/>
        <vers num="2.5.39"/>
        <vers num="2.5.40"/>
        <vers num="2.5.41"/>
        <vers num="2.5.42"/>
        <vers num="2.5.43"/>
        <vers num="2.5.44"/>
        <vers num="2.5.45"/>
        <vers num="2.5.46"/>
        <vers num="2.5.47"/>
        <vers num="2.5.48"/>
        <vers num="2.5.49"/>
        <vers num="2.5.50"/>
        <vers num="2.5.51"/>
        <vers num="2.5.52"/>
        <vers num="2.5.53"/>
        <vers num="2.5.54"/>
        <vers num="2.5.55"/>
        <vers num="2.5.56"/>
        <vers num="2.5.57"/>
        <vers num="2.5.58"/>
        <vers num="2.5.59"/>
        <vers num="2.5.60"/>
        <vers num="2.5.61"/>
        <vers num="2.5.62"/>
        <vers num="2.5.63"/>
        <vers num="2.5.64"/>
        <vers num="2.5.65"/>
        <vers num="2.5.66"/>
        <vers num="2.5.67"/>
        <vers num="2.5.68"/>
        <vers num="2.5.69"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6.10" edition="rc2"/>
        <vers num="2.6.11" edition="rc2"/>
        <vers num="2.6.11" edition="rc3"/>
        <vers num="2.6.11" edition="rc4"/>
        <vers num="2.6.11.5"/>
        <vers num="2.6.11.6"/>
        <vers num="2.6.11.7"/>
        <vers num="2.6.11.8"/>
        <vers num="2.6.12" edition="rc4"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2136" seq="2004-2136" published="2004-02-19" modified="2016-10-17" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">dm-crypt on Linux kernel 2.6.x, when used on certain file systems with a block size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked files to be detected without decryption.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://marc.info/?l=linux-kernel&amp;m=107719798631935&amp;w=2">[linux-kernel] 20040219 Re: Oopsing cryptoapi (or loop device?) on 2.6.*</ref>
      <ref source="MISC" url="http://mareichelt.de/pub/notmine/diskenc.pdf">http://mareichelt.de/pub/notmine/diskenc.pdf</ref>
      <ref source="MISC" url="http://www.securiteam.com/exploits/5UP0P1PFPM.html" adv="1">http://www.securiteam.com/exploits/5UP0P1PFPM.html</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2137" seq="2004-2137" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Outlook Express 6.0, when sending multipart e-mail messages using the "Break apart messages larger than" setting, leaks the BCC recipients of the message to the addresses listed in the To and CC fields, which may allow remote attackers to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011067" patch="1">1011067</ref>
      <ref source="MSKB" url="http://support.microsoft.com/kb/843555" adv="1" patch="1">843555</ref>
      <ref source="MISC" url="http://www.networksecurity.fi/advisories/outlook-bcc.html" adv="1" patch="1">http://www.networksecurity.fi/advisories/outlook-bcc.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11040">11040</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17098">outlook-email-address-disclosure(17098)</ref>
    </refs>
    <vuln_soft>
      <prod name="outlook_express" vendor="microsoft">
        <vers num="6.0" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2138" seq="2004-2138" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in AWSguest.php in AllWebScripts MySQLGuest allows remote attackers to inject arbitrary HTML and PHP code via the (1) Name, (2) Email, (3) Homepage or (4) Comments field.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011376">1011376</ref>
      <ref source="MISC" url="http://www.computerknights.org/forum_viewtopic.php?2.122">http://www.computerknights.org/forum_viewtopic.php?2.122</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11234">11234</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17462">mysqlguest-awsguestphp-xss(17462)</ref>
    </refs>
    <vuln_soft>
      <prod name="mysqlguest" vendor="allwebscripts">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2139" seq="2004-2139" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Adminedit.pl YaBB 1 Gold before 1.3.2 allows attackers to execute arbitrary code via settings.pl.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11235">11235</ref>
      <ref source="CONFIRM" url="http://www.yabbforum.com/community/YaBB.pl?board=general;action=display;num=1093133233" patch="1">http://www.yabbforum.com/community/YaBB.pl?board=general;action=display;num=1093133233</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17459">yabb-admineditpl-xss(17459)</ref>
    </refs>
    <vuln_soft>
      <prod name="yabb" vendor="yabb">
        <vers num="1_gold_-_sp_1.3"/>
        <vers num="1_gold_-_sp_1.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2140" seq="2004-2140" published="2004-12-31" modified="2008-09-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in YaBB 1 Gold before 1.3.2 allows remote attackers to modify text file contents via the subject variable.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.yabbforum.com/community/YaBB.pl?board=general;action=display;num=1093133233" patch="1">http://www.yabbforum.com/community/YaBB.pl?board=general;action=display;num=1093133233</ref>
    </refs>
    <vuln_soft>
      <prod name="yabb" vendor="yabb">
        <vers num="1_gold_-_sp_1.3"/>
        <vers num="1_gold_-_sp_1.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2141" seq="2004-2141" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-1827.  Reason: This candidate is a duplicate of CVE-2004-1827.  Notes: All CVE users should reference CVE-2004-1827 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-2142" seq="2004-2142" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in the remote tape support (remote.c) in the RMT client for Jorg Schilling sdd 1.28 and 1.31 has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.berlios.de/pub/sdd/AN-1.52">ftp://ftp.berlios.de/pub/sdd/AN-1.52</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17442">sdd-rmt(17442)</ref>
    </refs>
    <vuln_soft>
      <prod name="sdd" vendor="jorg_schilling">
        <vers num="1.28"/>
        <vers num="1.31"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2143" seq="2004-2143" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the ReMOSitory Server add-on module to Mambo Portal 4.5.1 (1.09) and earlier allows remote attackers to execute arbitrary SQL commands via the filecatid parameter in the com_remository option.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-09/0215.html">20040917 Mambo Portal lasted version 4.5.1 (1.09) and lower vesion : SQL injection Vulnerability.</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-09/0249.html">20040919 Re: Mambo Portal lasted version 4.5.1 (1.09) and lower vesion : SQL injection Vulnerability.</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011356" patch="1">1011356</ref>
      <ref source="CONFIRM" url="http://www.mamboportal.com/content/view/1615/" adv="1" patch="1">http://www.mamboportal.com/content/view/1615/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11219">11219</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17441">remository-filecatid-sql-injection(17441)</ref>
    </refs>
    <vuln_soft>
      <prod name="mambo_portal" vendor="mambo">
        <vers num="4.5.1_1.0.9" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2144" seq="2004-2144" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Baal Smart Forms before 3.2 allows remote attackers to bypass authentication and obtain system access via a direct request to regadmin.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011416" patch="1">1011416</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17499">baal-admin-password-modify(17499)</ref>
    </refs>
    <vuln_soft>
      <prod name="baal_smart_forms" vendor="baal_systems">
        <vers num="3.0"/>
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2145" seq="2004-2145" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in PD9 Software MegaBBS 2 and 2.1 allows remote attackers to execute arbitrary SQL commands via the (1) sortdir or (2) criteria parameter to ladder-log.asp or the (3) memberid or (4) teamid parameter to view-profile.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0962.html">20040926 HTTP Response Splitting and SQL injection in megabbs forum</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109631200701134&amp;w=2">20040926 Re: HTTP Response Splitting and SQL injection in megabbs forum</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17497">megabbs-sql-injection(17497)</ref>
    </refs>
    <vuln_soft>
      <prod name="megabbs" vendor="pd9_software">
        <vers num="2"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2146" seq="2004-2146" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in PD9 Software MegaBBS 2 and 2.1 allows attackers to conduct HTTP response splitting attacks via the fid parameter in a writenew action to thread-post.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0962.html">20040926 HTTP Response Splitting and SQL injection in megabbs forum</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109631200701134&amp;w=2">20040926 Re: HTTP Response Splitting and SQL injection in megabbs forum</ref>
      <ref source="CONFIRM" url="http://www.pd9soft.com/megabbs/forums/thread-view.asp?tid=4924">http://www.pd9soft.com/megabbs/forums/thread-view.asp?tid=4924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17495">megabbs-response-splitting(17495)</ref>
    </refs>
    <vuln_soft>
      <prod name="megabbs" vendor="pd9_software">
        <vers num="2"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2147" seq="2004-2147" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown versions of Symantec Norton AntiVirus and Microsoft Outlook allow attackers to cause a denial of service (crash) via malformed e-mail messages (1) without a body or (2) without a carriage return ("\n") separating the headers from the body.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULN-DEV" url="http://www.securityfocus.com/archive/82/376487/2004-09-24/2004-09-30/0" adv="1">20040925 No body emails and Norton antivirus</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11259">11259</ref>
    </refs>
    <vuln_soft>
      <prod name="norton_antivirus" vendor="symantec">
        <vers num="2.1" edition=":ms_exchange"/>
        <vers num="2001"/>
        <vers num="2002"/>
        <vers num="2003"/>
        <vers num="corporate_7.0"/>
        <vers num="corporate_7.2"/>
        <vers num="corporate_7.5"/>
        <vers num="corporate_7.6"/>
        <vers num="corporate_7.51"/>
        <vers num="corporate_7.60.build_926"/>
        <vers num="corporate_7.61"/>
        <vers num="corporate_8.0"/>
        <vers num="professional_2001"/>
        <vers num="professional_2002"/>
        <vers num="professional_2003"/>
        <vers num="professional_2004"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2148" seq="2004-2148" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown local vulnerability in the "change user" feature of Slava Astashonok Fprobe 1.0.5 and earlier has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011417" patch="1">1011417</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=269807" patch="1">http://sourceforge.net/project/shownotes.php?release_id=269807</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11255">11255</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17494">fprobe-change-user(17494)</ref>
    </refs>
    <vuln_soft>
      <prod name="fprobe" vendor="slava_astashonok">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2149" seq="2004-2149" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the prepared statements API in libmysqlclient for MySQL 4.1.3 beta and 4.1.4 allows remote attackers to cause a denial of service via a large number of placeholders.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.mysql.com/bug.php?id=5194" adv="1">http://bugs.mysql.com/bug.php?id=5194</ref>
      <ref source="CONFIRM" url="http://dev.mysql.com/doc/mysql/en/news-4-1-5.html">http://dev.mysql.com/doc/mysql/en/news-4-1-5.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011408" patch="1">1011408</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11261" patch="1">11261</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17493">mysql-libmysqlclient-insert-bo(17493)</ref>
    </refs>
    <vuln_soft>
      <prod name="mysql" vendor="mysql">
        <vers num="4.1.3" edition="beta"/>
        <vers num="4.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2150" seq="2004-2150" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Nettica Corporation INTELLIPEER Email Server 1.01 displays different error messages for valid and invalid account names, which allows remote attackers to determine valid account names.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011425">1011425</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11257">11257</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17510">intellipeer-username-obtain-information(17510)</ref>
    </refs>
    <vuln_soft>
      <prod name="intellipeer_email_server" vendor="nettica_corporation">
        <vers num="1.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2151" seq="2004-2151" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Chatman 1.1.1 RC1 and earlier allows remote attackers to cause a denial of service (memory consumption or application crash) via a very large data size.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011431">1011431</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/376569" adv="1">20040927 Broadcast crash in Chatman 1.5.1 RC1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11263">11263</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17513">chatman-dos(17513)</ref>
    </refs>
    <vuln_soft>
      <prod name="chatman" vendor="virtual_projects">
        <vers num="1.0.1_beta"/>
        <vers num="1.0.2_beta"/>
        <vers num="1.0.3_beta"/>
        <vers num="1.0.4_beta"/>
        <vers num="1.1.0_beta"/>
        <vers num="1.1.1_beta"/>
        <vers num="1.1.2_beta"/>
        <vers num="1.1.3_beta"/>
        <vers num="1.1.4_beta"/>
        <vers num="1.1.5_beta"/>
        <vers num="1.2.1_beta"/>
        <vers num="1.3.0_beta"/>
        <vers num="1.3.1_beta"/>
        <vers num="1.4.0_beta"/>
        <vers num="1.5.0_rc1"/>
        <vers num="1.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2152" seq="2004-2152" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in 'raw' page output mode for MediaWiki 1.3.4 and earlier allows remote attackers to inject arbitrary web script or HTML.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=34373&amp;release_id=271848" patch="1">http://sourceforge.net/project/shownotes.php?group_id=34373&amp;release_id=271848</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11302" patch="1">11302</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17578">mediawiki-raw-output-xss(17578)</ref>
    </refs>
    <vuln_soft>
      <prod name="mediawiki" vendor="mediawiki">
        <vers num="1.1.0"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2153" seq="2004-2153" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unknown vulnerabilities in Real Estate Management Software 1.0 have unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://archives.neohapsis.com/archives/apps/freshmeat/2004-09/0030.html" adv="1">[fm-news] 20041001 Newsletter for Thursday, September 30th 2004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11304" patch="1">11304</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17598">real-estate-management-software(17598)</ref>
    </refs>
    <vuln_soft>
      <prod name="real_estate_management_software" vendor="real_estate_management_software">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2154" seq="2004-2154" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">CUPS before 1.1.21rc1 treats a Location directive in cupsd.conf as case sensitive, which allows attackers to bypass intended ACLs via a printer name containing uppercase or lowercase letters that are different from what is specified in the directive.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.cups.org/str.php?L700" patch="1">http://www.cups.org/str.php?L700</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_18_sr.html">SUSE-SR:2005:018</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-571.html">RHSA-2005:571</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-185-1">USN-185-1</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162405" adv="1">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162405</ref>
      <ref source="FEDORA" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=163274">FLSA:163274</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9940">oval:org.mitre.oval:def:9940</ref>
    </refs>
    <vuln_soft>
      <prod name="cups" vendor="easy_software_products">
        <vers num="1.0.4"/>
        <vers num="1.0.4_8"/>
        <vers num="1.1.1"/>
        <vers num="1.1.4"/>
        <vers num="1.1.4_2"/>
        <vers num="1.1.4_3"/>
        <vers num="1.1.4_5"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.10"/>
        <vers num="1.1.12"/>
        <vers num="1.1.13"/>
        <vers num="1.1.14"/>
        <vers num="1.1.15"/>
        <vers num="1.1.16"/>
        <vers num="1.1.17"/>
        <vers num="1.1.18"/>
        <vers num="1.1.19"/>
        <vers num="1.1.19_rc5"/>
        <vers num="1.1.20"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2155" seq="2004-2155" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Online-bookmarks before 0.4.6 allows remote attackers to bypass its authentication mechanism via a direct request to (1) config/*, (2) bookmarks.php, (3) footer.php, (4) main.php, (5) tree.php, or (6) functions.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://freshmeat.net/projects/onlinebookmarks/?branch_id=34962&amp;release_id=174401">http://freshmeat.net/projects/onlinebookmarks/?branch_id=34962&amp;release_id=174401</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11305" patch="1">11305</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17602">online-bookmarks-resrtictions-bypass(17602)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2156" seq="2004-2156" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unknown vulnerabilities in Online Recruitment Agency 1.0 have unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://archives.neohapsis.com/archives/apps/freshmeat/2004-09/0030.html" patch="1">http://archives.neohapsis.com/archives/apps/freshmeat/2004-09/0030.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011539">1011539</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11306" patch="1">11306</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17586">online-recruitment-agency(17586)</ref>
    </refs>
    <vuln_soft>
      <prod name="online_recruitment_agency" vendor="recruitment_agency_software">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2157" seq="2004-2157" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Comment.php in Serendipity 0.7 beta1, and possibly other versions before 0.7-beta3, allows remote attackers to inject arbitrary HTML and PHP code via the (1) email or (2) username field.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026955.html" adv="1">20040928 Serendipity 0.7-beta1 SQL Injection PoC</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011448" patch="1">1011448</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11269" patch="1">11269</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17536">serendipity-commentphp-xss(17536)</ref>
    </refs>
    <vuln_soft>
      <prod name="serendipity" vendor="s9y">
        <vers num="0.7_beta1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2158" seq="2004-2158" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Serendipity 0.7-beta1 allows remote attackers to execute arbitrary SQL commands via the entry_id parameter to (1) exit.php or (2) comment.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026955.html" adv="1">20040928 Serendipity 0.7-beta1 SQL Injection PoC</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011448" patch="1">1011448</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11269" patch="1">11269</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17533">serendipity-sql-injection(17533)</ref>
    </refs>
    <vuln_soft>
      <prod name="serendipity" vendor="s9y">
        <vers num="0.7_beta1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2159" seq="2004-2159" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in XMLStarlet Command Line XML Toolkit 0.9.3 have unknown impact and attack vectors via (1) xml_elem.c and (2) xml_select.c.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011496" patch="1">1011496</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=268962" patch="1">http://sourceforge.net/project/shownotes.php?release_id=268962</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11270" patch="1">11270</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17580">xmlstarlet-bo(17580)</ref>
    </refs>
    <vuln_soft>
      <prod name="command_line_xml_toolkit" vendor="xmlstarlet">
        <vers num="0.9.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2160" seq="2004-2160" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in xml_elem.c for XMLStarlet Command Line XML Toolkit 0.9.3 may allow attackers to cause a denial of service or execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/xmlstar/xmlstarlet/src/xml_elem.c?r1=1.17&amp;r2=1.18">http://cvs.sourceforge.net/viewcvs.py/xmlstar/xmlstarlet/src/xml_elem.c?r1=1.17&amp;r2=1.18</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=268962" patch="1">http://sourceforge.net/project/shownotes.php?release_id=268962</ref>
    </refs>
    <vuln_soft>
      <prod name="command_line_xml_toolkit" vendor="xmlstarlet">
        <vers num="0.9.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2161" seq="2004-2161" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in file_overview.php in TUTOS 1.1 allows remote attackers to execute arbitrary SQL commands via the link_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/tutos/tutos/php/file/file_overview.php?r1=1.11.2.1&amp;r2=1.11.2.2">http://cvs.sourceforge.net/viewcvs.py/tutos/tutos/php/file/file_overview.php?r1=1.11.2.1&amp;r2=1.11.2.2</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011363">1011363</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-980">DSA-980</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/375757" adv="1">20040918 Vulnerabilities in TUTOS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11221">11221</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17444">tutos-sql-injection(17444)</ref>
    </refs>
    <vuln_soft>
      <prod name="tutos" vendor="tutos">
        <vers num="1.1_2004-04-14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2162" seq="2004-2162" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in TUTOS 1.1 allow remote attackers to inject arbitrary web script or HTML via (1) the search field of the Address Module or (2) the t parameter to app_new.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/tutos/tutos/php/app_new.php?r1=1.58&amp;r2=1.59">http://cvs.sourceforge.net/viewcvs.py/tutos/tutos/php/app_new.php?r1=1.58&amp;r2=1.59</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-980">DSA-980</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/375757" adv="1">20040918 Vulnerabilities in TUTOS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11221">11221</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17445">tutos-xss(17445)</ref>
    </refs>
    <vuln_soft>
      <prod name="tutos" vendor="tutos">
        <vers num="1.1_2004-04-14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2163" seq="2004-2163" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">login_radius on OpenBSD 3.2, 3.5, and possibly other versions does not verify the shared secret in a response packet from a RADIUS server, which allows remote attackers to bypass authentication by spoofing server replies.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0058.html" adv="1">20040921 OpenBSD radius authentication vulnerability</ref>
      <ref source="CONFIRM" url="http://www.openbsd.org/errata35.html#radius" patch="1">http://www.openbsd.org/errata35.html#radius</ref>
      <ref source="MISC" url="http://www.reseau.nl/advisories/0400-openbsd-radius.txt" adv="1" patch="1">http://www.reseau.nl/advisories/0400-openbsd-radius.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11227" patch="1">11227</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17456">openbsd-radius-auth-bypass(17456)</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.2"/>
        <vers num="3.4"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2164" seq="2004-2164" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">shoprestoreorder.asp in VP-ASP 5.0 does not close the database connection when a user restores a previous order, which allows remote attackers to cause a denial of service (connection consumption).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11228" patch="1">11228</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Sep/1011359.html" patch="1">1011359</ref>
      <ref source="CONFIRM" url="http://www.vpasp.com/virtprog/info/faq_securityfixes.htm" patch="1">http://www.vpasp.com/virtprog/info/faq_securityfixes.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17436">vpasp-shoprestoreopenasp-dos(17436)</ref>
    </refs>
    <vuln_soft>
      <prod name="vp-asp" vendor="virtual_programming">
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2165" seq="2004-2165" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Lords of the Realm III 1.01 and earlier, when in the lobby stage, allows remote attackers to cause a denial of service (crash from unallocated memory write) via a long user nickname.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/lotr3boom-adv.txt" adv="1">http://aluigi.altervista.org/adv/lotr3boom-adv.txt</ref>
      <ref source="FULLDISC" url="http://seclists.org/lists/fulldisclosure/2004/Sep/0660.html" adv="1">20040914 Crash in Lords of the Realm III 1.01</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011361">1011361</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11223">11223</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17438">lordsoftherealm-username-dos(17438)</ref>
    </refs>
    <vuln_soft>
      <prod name="lords_of_the_realm_iii" vendor="impressions_games">
        <vers num="1.01" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2166" seq="2004-2166" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The print-from-email feature in the Canon ImageRUNNER (iR) 5000i and C3200 digital printer, when not using IP address range filtering, allows remote attackers to print arbitrary text without authentication via a text/plain email to TCP port 25.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/376242" adv="1">20040923 Promiscuous email printing in Canon imageRunner</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11247">11247</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17512">canon-imagerunner-dos(17512)</ref>
    </refs>
    <vuln_soft>
      <prod name="imagerunner_5000i" vendor="canon">
        <vers num=""/>
      </prod>
      <prod name="imagerunner_c3200" vendor="canon">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2167" seq="2004-2167" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in LaTeX2rtf 1.9.15, and possibly other versions, allow remote attackers to execute arbitrary code via (1) the expandmacro function, and possibly (2) Environments and (3) TranslateCommand.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/latex2rtf/latex2rtf/definitions.c?rev=1.22&amp;view=log">http://cvs.sourceforge.net/viewcvs.py/latex2rtf/latex2rtf/definitions.c?rev=1.22&amp;view=log</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11233" adv="1">11233</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Sep/1011367.html">1011367</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17460">latex2rtf-expandmacro-bo(17460)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17487">latex2rtf-multiple-bo(17487)</ref>
    </refs>
    <vuln_soft>
      <prod name="latex2rtf" vendor="latex2rtf">
        <vers num="1.9.15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2168" seq="2004-2168" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">BaSoMail 1.24 allows remote attackers to cause a denial of service (CPU consumption) via multiple connections to TCP port (1) 25 (SMTP) or (2) 110 (POP3).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/Baso_mail/Baso_1.24.txt">http://members.lycos.co.uk/r34ct/main/Baso_mail/Baso_1.24.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008912">1008912</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15002">basomail-multiple-connection-dos(15002)</ref>
    </refs>
    <vuln_soft>
      <prod name="basomail_server" vendor="baardsen_software">
        <vers num="1.24"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2169" seq="2004-2169" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Application Access Server (A-A-S) 1.0.37 and earlier allows remote authenticated users to cause a denial of service (application crash) via a long file request.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/A-A-S/AAS1_0_3.TXT" adv="1">http://members.lycos.co.uk/r34ct/main/A-A-S/AAS1_0_3.TXT</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15003">aas-longhttp-request-dos(15003)</ref>
    </refs>
    <vuln_soft>
      <prod name="a-a-s_application_access_server" vendor="a-a-s_application_access_server">
        <vers num="1.0.37"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2170" seq="2004-2170" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in sample_showcode.html in Caravan 2.00/03d and earlier allows remote attackers to read arbitrary files via the fname parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/Caravan/Caravan.txt" adv="1">http://members.lycos.co.uk/r34ct/main/Caravan/Caravan.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008913">1008913</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9555">9555</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15004">caravan-dotdot-directory-traveral(15004)</ref>
    </refs>
    <vuln_soft>
      <prod name="caravan_business_server" vendor="niti_telecom">
        <vers num="2.00-03d"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2171" seq="2004-2171" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Cherokee before 0.4.8 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly quoted in the resulting error page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9496" adv="1" patch="1">9496</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14936">cherokee-error-xss(14936)</ref>
    </refs>
    <vuln_soft>
      <prod name="cherokee_httpd" vendor="cherokee">
        <vers num="0.1"/>
        <vers num="0.1.5"/>
        <vers num="0.1.6"/>
        <vers num="0.2"/>
        <vers num="0.2.5"/>
        <vers num="0.2.6"/>
        <vers num="0.2.7"/>
        <vers num="0.4.6"/>
        <vers num="0.4.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2172" seq="2004-2172" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">EarlyImpact ProductCart uses a weak encryption scheme to encrypt passwords, which allows remote attackers to obtain the password via a chosen plaintext attack.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-02/0503.html" adv="1" patch="1">20040218 Re: EarlyImpact ProductCart shopping cart software multiple security vulnerabilities</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-02/0871.html" adv="1">20040216 EarlyImpact ProductCart shopping cart software multiple security vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Feb/1009085.html">1009085</ref>
      <ref source="CONFIRM" url="http://www.earlyimpact.com/productcart/support/updates/ReadMe_ProductCart_Security_Patch_013004.txt">http://www.earlyimpact.com/productcart/support/updates/ReadMe_ProductCart_Security_Patch_013004.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/354288" adv="1">20040216 EarlyImpact ProductCart shopping cart software multiple security vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9669" patch="1">9669</ref>
      <ref source="MISC" url="http://www.s-quadra.com/advisories/Adv-20040216.txt" adv="1" patch="1">http://www.s-quadra.com/advisories/Adv-20040216.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15231">productcart-keystream-obtain-information(15231)</ref>
    </refs>
    <vuln_soft>
      <prod name="productcart" vendor="early_impact">
        <vers num="1.5"/>
        <vers num="1.6_b"/>
        <vers num="1.6_b001"/>
        <vers num="1.6_b002"/>
        <vers num="1.6_b003"/>
        <vers num="1.6_br"/>
        <vers num="1.6_br001"/>
        <vers num="1.6_br003"/>
        <vers num="1.5002"/>
        <vers num="1.5003"/>
        <vers num="1.5003r"/>
        <vers num="1.5004"/>
        <vers num="1.6002"/>
        <vers num="1.6003"/>
        <vers num="2.0"/>
        <vers num="2.0_br000"/>
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2173" seq="2004-2173" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in advSearch_h.asp in EarlyImpact ProductCart allows remote attackers to execute arbitrary SQL commands via the priceUntil parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-02/0503.html">20040218 Re: EarlyImpact ProductCart shopping cart software multiple security vulnerabilities</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-02/0871.html">20040216 EarlyImpact ProductCart shopping cart software multiple security vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Feb/1009085.html">1009085</ref>
      <ref source="CONFIRM" url="http://www.earlyimpact.com/productcart/support/updates/ReadMe_ProductCart_Security_Patch_013004.txt">http://www.earlyimpact.com/productcart/support/updates/ReadMe_ProductCart_Security_Patch_013004.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/354288">20040216 EarlyImpact ProductCart shopping cart software multiple security vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9669" patch="1">9669</ref>
      <ref source="MISC" url="http://www.s-quadra.com/advisories/Adv-20040216.txt">http://www.s-quadra.com/advisories/Adv-20040216.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15233">productcart-advsearchhasp-sql-injection(15233)</ref>
    </refs>
    <vuln_soft>
      <prod name="productcart" vendor="early_impact">
        <vers num="1.5"/>
        <vers num="1.6b"/>
        <vers num="1.6b001"/>
        <vers num="1.6b002"/>
        <vers num="1.6b003"/>
        <vers num="1.6br"/>
        <vers num="1.6br001"/>
        <vers num="1.6br003"/>
        <vers num="1.5002"/>
        <vers num="1.5003"/>
        <vers num="1.5003r"/>
        <vers num="1.5004"/>
        <vers num="1.6002"/>
        <vers num="1.6003"/>
        <vers num="2.0"/>
        <vers num="2.0br000"/>
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2174" seq="2004-2174" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Custva.asp in EarlyImpact ProductCart allows remote attackers to inject arbitrary Javascript via the redirectUrl parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-02/0503.html">20040218 Re: EarlyImpact ProductCart shopping cart software multiple security vulnerabilities</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-02/0871.html">20040216 EarlyImpact ProductCart shopping cart software multiple security vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Feb/1009085.html">1009085</ref>
      <ref source="CONFIRM" url="http://www.earlyimpact.com/productcart/support/updates/ReadMe_ProductCart_Security_Patch_013004.txt">http://www.earlyimpact.com/productcart/support/updates/ReadMe_ProductCart_Security_Patch_013004.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9669" patch="1">9669</ref>
      <ref source="MISC" url="http://www.s-quadra.com/advisories/Adv-20040216.txt">http://www.s-quadra.com/advisories/Adv-20040216.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15234">productcart-custva-xss(15234)</ref>
    </refs>
    <vuln_soft>
      <prod name="productcart" vendor="early_impact">
        <vers num="1.5"/>
        <vers num="1.6b"/>
        <vers num="1.6b001"/>
        <vers num="1.6b002"/>
        <vers num="1.6b003"/>
        <vers num="1.6br"/>
        <vers num="1.6br001"/>
        <vers num="1.6br003"/>
        <vers num="1.5002"/>
        <vers num="1.5003"/>
        <vers num="1.5003r"/>
        <vers num="1.5004"/>
        <vers num="1.6002"/>
        <vers num="1.6003"/>
        <vers num="2.0"/>
        <vers num="2.0br000"/>
        <vers num="2.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2175" seq="2004-2175" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in ReviewPost PHP Pro allow remote attackers to execute arbitrary SQL commands via the (1) product parameter to showproduct.php or (2) cat parameter to showcat.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/352598" patch="1">20040204 ZH2004-04SA (security advisory): Multiple Sql Injection Vulnerabilities in ReviewPost PHP Pro</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9574">9574</ref>
      <ref source="MISC" url="http://www.zone-h.org/en/advisories/read/id=3864/" patch="1">http://www.zone-h.org/en/advisories/read/id=3864/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15035">reviewpostpro-showproduct-sql-injection(15035)</ref>
    </refs>
    <vuln_soft>
      <prod name="reviewpost_php_pro" vendor="all_enthusiast_inc">
        <vers num="2.5"/>
        <vers num="2.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2176" seq="2004-2176" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Internet Connection Firewall (ICF) in Microsoft Windows XP SP2 is configured by default to trust sessmgr.exe, which allows local users to use sessmgr.exe to create a local listening port that bypasses the ICF access controls.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/378508">20041012 Writing Trojans that bypass Windows XP Service Pack 2 Firewall</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11410">11410</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp2:home"/>
        <vers num="" edition="sp2:media_center"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2177" seq="2004-2177" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in DevoyBB Web Forum 1.0.0 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://sourceforge.net/project/shownotes.php?release_id=273104">http://sourceforge.net/project/shownotes.php?release_id=273104</ref>
      <ref source="MISC" url="http://www.maxpatrol.com/advdetails.asp?id=11">http://www.maxpatrol.com/advdetails.asp?id=11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11428">11428</ref>
    </refs>
    <vuln_soft>
      <prod name="devoybb_web_forum" vendor="devoybb">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2178" seq="2004-2178" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in DevoyBB Web Forum 1.0.0 allows remote attackers to execute arbitrary SQL commands via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://sourceforge.net/project/shownotes.php?release_id=273104">http://sourceforge.net/project/shownotes.php?release_id=273104</ref>
      <ref source="MISC" url="http://www.maxpatrol.com/advdetails.asp?id=11">http://www.maxpatrol.com/advdetails.asp?id=11</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11428">11428</ref>
    </refs>
    <vuln_soft>
      <prod name="devoybb_web_forum" vendor="devoybb">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2179" seq="2004-2179" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">asycpict.dll, as used in Microsoft products such as Front Page 97 and 98, allows remote attackers to cause a denial of service (hang) via a JPEG image with maximum height and width values.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/378431">20041014 New Remote Microsoft JPEG DoS Vulnerability + Other Potential Security Vulnerabilitys in asycpict.dll 1.0 Advisory</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/378619">20041015 Re: New Remote Microsoft JPEG DoS Vulnerability + Other Potential Security Vulnerabilitys in asycpict.dll 1.0 Advisory</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11412">11412</ref>
    </refs>
    <vuln_soft>
      <prod name="frontpage" vendor="microsoft">
        <vers num="97"/>
        <vers num="98"/>
      </prod>
      <prod name="ie" vendor="microsoft">
        <vers num="3.0.1" edition=":windows_95"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2180" seq="2004-2180" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in WowBB Forum 1.61 allow remote attackers to inject arbitrary web script or HTML via the (1) country parameter to view_user.php, (2) show parameter to view_forum.php, (3) letter parameter to view_user.php, (4) highlight parameter to view_topic.php, (5) show parameter to index.php, (6) q parameter to search.php, (7) Referer header to admin.php, or the (8) user_email parameter to login.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.maxpatrol.com/advdetails.asp?id=7">http://www.maxpatrol.com/advdetails.asp?id=7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11429">11429</ref>
    </refs>
    <vuln_soft>
      <prod name="wowbb_web_forum" vendor="wowbb">
        <vers num="1.61"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2181" seq="2004-2181" published="2004-12-31" modified="2009-06-25" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in WowBB Forum 1.61 allow remote attackers to execute arbitrary SQL commands via the (1) sort_by or (2) page parameters to view_user.php, or the (3) forum_id parameter to view_topic.php.  NOTE: the sort_by vector was later reported to be present in WowBB 1.65.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://pridels0.blogspot.com/2005/11/wowbb-165-sql-vuln.html">http://pridels0.blogspot.com/2005/11/wowbb-165-sql-vuln.html</ref>
      <ref source="MISC" url="http://www.maxpatrol.com/advdetails.asp?id=7">http://www.maxpatrol.com/advdetails.asp?id=7</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11429">11429</ref>
    </refs>
    <vuln_soft>
      <prod name="wowbb_web_forum" vendor="wowbb">
        <vers num="1.61"/>
        <vers num="1.65"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2182" seq="2004-2182" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Session fixation vulnerability in Macromedia JRun 4.0 allows remote attackers to hijack user sessions by pre-setting the user session ID information used by the session server.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="ALLAIRE" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html">MPSB04-08</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11414">11414</ref>
    </refs>
    <vuln_soft>
      <prod name="jrun" vendor="macromedia">
        <vers num="4.0" edition="sp1"/>
        <vers num="4.0" edition="sp1a"/>
        <vers num="4.0_build_61650"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2183" seq="2004-2183" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in WeHelpBUS 0.1 allows remote attackers to execute arbitrary shell commands via the query string.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=275295">http://sourceforge.net/project/shownotes.php?release_id=275295</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11431" patch="1">11431</ref>
    </refs>
    <vuln_soft>
      <prod name="wehelpbus" vendor="wehelpbus">
        <vers num="0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2184" seq="2004-2184" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Digicraft Yak! server 2.0 through 2.1.2 allows remote attackers to read or write arbitrary files via "../" or "..\" sequences in commands such as (1) dir or (2) put.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/yak-adv.txt">http://aluigi.altervista.org/adv/yak-adv.txt</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=109788315103778&amp;w=2">20041015 Directory traversal in Yak! 2.1.2</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011708">1011708</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/378533">20041015 Directory traversal in Yak! 2.1.2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11433">11433</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17740">yak-directory-traversal(17740)</ref>
    </refs>
    <vuln_soft>
      <prod name="yak" vendor="digicraft_software">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.1.0"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2185" seq="2004-2185" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki 1.3.5 allow remote attackers to execute arbitrary scripts and/or SQL queries via (1) the UnicodeConverter extension, (2) raw page views, (3) SpecialIpblocklist, (4) SpecialEmailuser, (5) SpecialMaintenance, and (6) ImagePage.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=275099">http://sourceforge.net/project/shownotes.php?release_id=275099</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11416" patch="1">11416</ref>
    </refs>
    <vuln_soft>
      <prod name="mediawiki" vendor="mediawiki">
        <vers num="1.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2186" seq="2004-2186" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in MediaWiki 1.3.5 allows remote attackers to execute arbitrary SQL commands via SpecialMaintenance.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=275099">http://sourceforge.net/project/shownotes.php?release_id=275099</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11416" patch="1">11416</ref>
    </refs>
    <vuln_soft>
      <prod name="mediawiki" vendor="mediawiki">
        <vers num="1.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2187" seq="2004-2187" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in ImagePage for MediaWiki 1.3.5, related to "filename validation," has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=275099">http://sourceforge.net/project/shownotes.php?release_id=275099</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11416" patch="1">11416</ref>
    </refs>
    <vuln_soft>
      <prod name="mediawiki" vendor="mediawiki">
        <vers num="1.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2188" seq="2004-2188" published="2004-12-31" modified="2008-09-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in DMXReady Site Chassis Manager allows remote attackers to inject arbitrary web script or HTML via unknown vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11434">11434</ref>
    </refs>
    <vuln_soft>
      <prod name="dmxready_site_chassis_manager" vendor="dmxready">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2189" seq="2004-2189" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in DMXReady Site Chassis Manager allows remote attackers to execute arbitrary SQL commands via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.maxpatrol.com/mp_advisory.asp">http://www.maxpatrol.com/mp_advisory.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11434">11434</ref>
    </refs>
    <vuln_soft>
      <prod name="dmxready_site_chassis_manager" vendor="dmxready">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2190" seq="2004-2190" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Unzoo 4.4-2 has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011673">1011673</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11417">11417</ref>
    </refs>
    <vuln_soft>
      <prod name="unzoo" vendor="unzoo">
        <vers num="4.4-2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2191" seq="2004-2191" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in ttt-webmaster.php in Turbo Traffic Trader PHP 1.0 allows remote attackers to inject arbitrary web script or HTML via the (1) msg[0] or (2) siteurl parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-10/0296.html">20041011 Turbo Traffic Trader Nitro v1.0 SQL Injection &amp; XSS Proofs of Concept</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011609">1011609</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11358">11358</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17673">turbo-traffic-xss(17673)</ref>
    </refs>
    <vuln_soft>
      <prod name="turbotraffictrader_php" vendor="turbotraffictrader">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2192" seq="2004-2192" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in tttadmin/settings.php in Turbo Traffic Trader PHP 1.0 allows remote attackers to execute arbitrary SQL commands via the ttt_admin parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-10/0296.html" adv="1">20041011 Turbo Traffic Trader Nitro v1.0 SQL Injection &amp; XSS Proofs of Concept</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011609">1011609</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11358">11358</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17676">turbo-traffic-trader-sql-injection(17676)</ref>
    </refs>
    <vuln_soft>
      <prod name="turbotraffictrader_php" vendor="turbotraffictrader">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2193" seq="2004-2193" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in trade.php for CJOverkill 4.0.3 allows remote attackers to inject arbitrary web script or HTML via the (1) tms[0] or (2) url parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bbs.icefire.org/viewtopic.php?t=573" patch="1">http://bbs.icefire.org/viewtopic.php?t=573</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011604">1011604</ref>
      <ref source="FULLDISC" url="http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2004-10/0306.html">20041011 CJOverkill 4.0.3 XSS Proof of Concept</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11359">11359</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17675">cjoverkill-trade-xss(17675)</ref>
    </refs>
    <vuln_soft>
      <prod name="cjoverkill" vendor="cjoverkill">
        <vers num="4.0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2194" seq="2004-2194" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">MailEnable Professional Edition before 1.53 and Enterprise Edition before 1.02 allows remote attackers to cause a denial of service (crash) via malformed (1) SMTP or (2) IMAP commands.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.mailenable.com/enterprisehistory.asp" patch="1">http://www.mailenable.com/enterprisehistory.asp</ref>
      <ref source="CONFIRM" url="http://www.mailenable.com/professionalhistory.asp" patch="1">http://www.mailenable.com/professionalhistory.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11418">11418</ref>
    </refs>
    <vuln_soft>
      <prod name="mailenable_enterprise" vendor="mailenable">
        <vers num="1.0"/>
        <vers num="1.01"/>
        <vers num="1.26" prev="1"/>
      </prod>
      <prod name="mailenable_professional" vendor="mailenable">
        <vers num="1.2"/>
        <vers num="1.2a"/>
        <vers num="1.5"/>
        <vers num="1.17"/>
        <vers num="1.18"/>
        <vers num="1.19"/>
        <vers num="1.51"/>
        <vers num="1.52"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2195" seq="2004-2195" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in index.php in Zanfi CMS lite 1.1 allows remote attackers to execute arbitrary PHP code via the inc parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011612">1011612</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/378053" adv="1">20041011 Multiple vulnerabilities in ZanfiCmsLite</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11362" patch="1">11362</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17691">zanficmslite-inc-file-include(17691)</ref>
    </refs>
    <vuln_soft>
      <prod name="zanfi_cms_lite" vendor="zanfi_solutions">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2196" seq="2004-2196" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Zanfi CMS lite 1.1 allows remote attackers to obtain the full path of the web server via direct requests without required arguments to (1) adm_pages.php, (2) corr_pages.php, (3) del_block.php, (4) del_page.php, (5) footer.php, (6) home.php, and others.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011612">1011612</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/378053" adv="1">20041011 Multiple vulnerabilities in ZanfiCmsLite</ref>
      <ref source="MISC" url="http://www.zanfi.nl/index1.php?flag=cmslite">http://www.zanfi.nl/index1.php?flag=cmslite</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17687">zanficmslite-error-path-disclosure(17687)</ref>
    </refs>
    <vuln_soft>
      <prod name="zanfi_cms_lite" vendor="zanfi_solutions">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2197" seq="2004-2197" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">kdocker.cpp in kdocker 0.1 through 0.8 does not properly check the ownership of files, which could allow local users to execute arbitrary programs.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/kdocker/kdocker/src/kdocker.cpp?r1=1.10&amp;r2=1.11&amp;sortby=log">http://cvs.sourceforge.net/viewcvs.py/kdocker/kdocker/src/kdocker.cpp?r1=1.10&amp;r2=1.11&amp;sortby=log</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011688" patch="1">1011688</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=414631" patch="1">http://sourceforge.net/forum/forum.php?forum_id=414631</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11419" patch="1">11419</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17718">kdocker-kdockerccp-gain-privileges(17718)</ref>
    </refs>
    <vuln_soft>
      <prod name="kdocker" vendor="kdocker">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2198" seq="2004-2198" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">account.asp in DUware DUclassmate 1.0 through 1.1 allows remote attackers to change the passwords for arbitrary users by modifying the MM_recordId parameter on the "My Account" page.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11363">11363</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Oct/1011597.html" adv="1">1011597</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17682">duclassmate-password-modification(17682)</ref>
    </refs>
    <vuln_soft>
      <prod name="duclassmate" vendor="duware">
        <vers num="1.0"/>
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2199" seq="2004-2199" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in DUware DUclassified 4.0 allows remote attackers to inject arbitrary web script or HTML via the message text.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11363">11363</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Oct/1011596.html">1011596</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17686">duclassified-message-xss(17686)</ref>
    </refs>
    <vuln_soft>
      <prod name="duclassified" vendor="duware">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2200" seq="2004-2200" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in DUware DUforum 3.0 through 3.1 allows remote attackers to inject arbitrary web script or HTML via via the message text.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11363">11363</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Oct/1011595.html">1011595</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17681">duforum-xss(17681)</ref>
    </refs>
    <vuln_soft>
      <prod name="duforum" vendor="duware">
        <vers num="3.0"/>
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2201" seq="2004-2201" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in DUware DUforum 3.0 through 3.1 allows remote attackers to execute arbitrary SQL commands via the FOR_ID parameter in messages.asp, (2) MSG_ID parameter in messageDetail.asp, or (3) password parameter in the login form.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11363">11363</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Oct/1011595.html">1011595</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17680">duforum-sql-injection(17680)</ref>
    </refs>
    <vuln_soft>
      <prod name="duforum" vendor="duware">
        <vers num="3.0"/>
        <vers num="3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2202" seq="2004-2202" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in DUware DUclassified 4.0 through 4.2 allows remote attackers to bypass authentication and execute other commands on the server's underlying database via the (1) cat_id or (2) sub_id parameters in adDetail.asp, or (2) the password parameter in the login form.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11363">11363</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Oct/1011596.html">1011596</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17685">duclassified-multiple-sql-injection(17685)</ref>
    </refs>
    <vuln_soft>
      <prod name="duclassified" vendor="duware">
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2203" seq="2004-2203" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Ansel 1.2 through 2.0 uses insecure default permissions, which allows remote attackers to gain access to web readable directories.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011775" patch="1">1011775</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11420" patch="1">11420</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17767">ansell-gain-access(17767)</ref>
    </refs>
    <vuln_soft>
      <prod name="ansel" vendor="ansel">
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2204" seq="2004-2204" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Macromedia ColdFusion MX 6.0 and 6.1 application server, when running with the CreateObject function or CFOBJECT tag enabled, allows local users to conduct unauthorized activities and obtain administrative passwords by creating CFML scripts that use CreateObject or CFOBJECT.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-10.html" adv="1">http://www.macromedia.com/devnet/security/security_zone/mpsb04-10.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/377213">20040930 CFMX vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11364">11364</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17567">coldfusion-gain-access(17567)</ref>
    </refs>
    <vuln_soft>
      <prod name="coldfusion" vendor="macromedia">
        <vers num="6.0"/>
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2205" seq="2004-2205" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Veritas Cluster Server 1.0.1 through 4.0 allows local users to gain root access via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011693">1011693</ref>
      <ref source="CONFIRM" url="http://seer.support.veritas.com/docs/271040.htm" adv="1" patch="1">http://seer.support.veritas.com/docs/271040.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11421" patch="1">11421</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17719">vcs-gain-unauth-access(17719)</ref>
    </refs>
    <vuln_soft>
      <prod name="cluster_server" vendor="symantec_veritas">
        <vers num="1.0.1_solaris"/>
        <vers num="1.0.2_solaris"/>
        <vers num="1.1.1_solaris"/>
        <vers num="1.1.2_solaris"/>
        <vers num="1.1_solaris"/>
        <vers num="1.2_nt"/>
        <vers num="1.3"/>
        <vers num="1.3.1_hp-ux"/>
        <vers num="1.3.1_p3"/>
        <vers num="1.3_hp-ux"/>
        <vers num="1.3_nt"/>
        <vers num="1.3_p1"/>
        <vers num="1.3_p2"/>
        <vers num="1.3_p3"/>
        <vers num="1.3_p4"/>
        <vers num="1.3_solaris"/>
        <vers num="1.3_solaris_pre-ga"/>
        <vers num="2.0"/>
        <vers num="2.0_aix"/>
        <vers num="2.0_linux"/>
        <vers num="2.0_p1"/>
        <vers num="2.0_p2"/>
        <vers num="2.0_p3"/>
        <vers num="2.0_p4"/>
        <vers num="2.0_solaris"/>
        <vers num="2.0_solaris_beta"/>
        <vers num="2.0_solaris_ga"/>
        <vers num="2.1"/>
        <vers num="2.1_linux"/>
        <vers num="2.1_linux_p1"/>
        <vers num="2.2"/>
        <vers num="2.2_linux"/>
        <vers num="2.2_linux_mp1p1"/>
        <vers num="2.2_mp1"/>
        <vers num="2.2_mp2"/>
        <vers num="3.5"/>
        <vers num="3.5.1_aix"/>
        <vers num="3.5_aix"/>
        <vers num="3.5_hp-ux"/>
        <vers num="3.5_hp-ux_update_1"/>
        <vers num="3.5_hp-ux_update_2"/>
        <vers num="3.5_mp1"/>
        <vers num="3.5_mp1j"/>
        <vers num="3.5_mp2"/>
        <vers num="3.5_p1"/>
        <vers num="3.5_solaris"/>
        <vers num="3.5_solaris_beta"/>
        <vers num="3.5_solaris_mp1"/>
        <vers num="3.5_solaris_mp2"/>
        <vers num="3.5_solaris_mp3"/>
        <vers num="4.0_aix"/>
        <vers num="4.0_aix_beta"/>
        <vers num="4.0_linux"/>
        <vers num="4.0_linux_beta"/>
        <vers num="4.0_solaris"/>
        <vers num="4.0_solaris_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2206" seq="2004-2206" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in NatterChat 1.12 allows remote attackers to execute arbitrary SQL commands via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.maxpatrol.com/advdetails.asp?id=13" adv="1">http://www.maxpatrol.com/advdetails.asp?id=13</ref>
      <ref source="MISC" url="http://www.maxpatrol.com/mp_advisory.asp">http://www.maxpatrol.com/mp_advisory.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11423">11423</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Oct/1011692.html">1011692</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17726">natterchat-sql-injection(17726)</ref>
    </refs>
    <vuln_soft>
      <prod name="natterchat" vendor="natterchat">
        <vers num="1.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2207" seq="2004-2207" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Ideal Science IdealBB 1.4.9 through 1.5.3 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.maxpatrol.com/advdetails.asp?id=14" adv="1">http://www.maxpatrol.com/advdetails.asp?id=14</ref>
      <ref source="MISC" url="http://www.maxpatrol.com/mp_advisory.asp">http://www.maxpatrol.com/mp_advisory.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11424">11424</ref>
    </refs>
    <vuln_soft>
      <prod name="idealbb" vendor="ideal_science">
        <vers num="1.4.9"/>
        <vers num="1.4.9_beta"/>
        <vers num="1.4.9a"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.2a"/>
        <vers num="1.5.2c"/>
        <vers num="1.5.3"/>
        <vers num="1.5_beta1"/>
        <vers num="1.5_beta2"/>
        <vers num="1.5_beta3"/>
        <vers num="1.5_beta4"/>
        <vers num="1.5_beta5"/>
        <vers num="1.5_rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2208" seq="2004-2208" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in Ideal Science IdealBB 1.4.9 through 1.5.3 allows remote attackers to conduct HTTP response splitting attacks via unknown vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.maxpatrol.com/advdetails.asp?id=14" adv="1">http://www.maxpatrol.com/advdetails.asp?id=14</ref>
      <ref source="MISC" url="http://www.maxpatrol.com/mp_advisory.asp">http://www.maxpatrol.com/mp_advisory.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11424">11424</ref>
    </refs>
    <vuln_soft>
      <prod name="idealbb" vendor="ideal_science">
        <vers num="1.4.9"/>
        <vers num="1.4.9_beta"/>
        <vers num="1.4.9a"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.2a"/>
        <vers num="1.5.2c"/>
        <vers num="1.5.3"/>
        <vers num="1.5_beta1"/>
        <vers num="1.5_beta2"/>
        <vers num="1.5_beta3"/>
        <vers num="1.5_beta4"/>
        <vers num="1.5_beta5"/>
        <vers num="1.5_rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2209" seq="2004-2209" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Ideal Science IdealBB 1.4.9 through 1.5.3 allows remote attackers to execute arbitrary SQL commands via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.maxpatrol.com/advdetails.asp?id=14" adv="1">http://www.maxpatrol.com/advdetails.asp?id=14</ref>
      <ref source="MISC" url="http://www.maxpatrol.com/mp_advisory.asp">http://www.maxpatrol.com/mp_advisory.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11424">11424</ref>
    </refs>
    <vuln_soft>
      <prod name="idealbb" vendor="ideal_science">
        <vers num="1.4.9"/>
        <vers num="1.4.9_beta"/>
        <vers num="1.4.9a"/>
        <vers num="1.5.1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.2a"/>
        <vers num="1.5.2c"/>
        <vers num="1.5.3"/>
        <vers num="1.5_beta1"/>
        <vers num="1.5_beta2"/>
        <vers num="1.5_beta3"/>
        <vers num="1.5_beta4"/>
        <vers num="1.5_beta5"/>
        <vers num="1.5_rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2210" seq="2004-2210" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Express-Web Content Management System (CMS) allow remote attackers to steal cookie-based authentication information and possibly perform other exploits via the (1) n, (2) b, (3) e, or (4) a parameters to default.asp, (5) the Referer header in an HTTP request to login.asp, or (6) the email parameter to subscribe/default.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.maxpatrol.com/advdetails.asp?id=12" adv="1">http://www.maxpatrol.com/advdetails.asp?id=12</ref>
      <ref source="MISC" url="http://www.maxpatrol.com/mp_advisory.asp">http://www.maxpatrol.com/mp_advisory.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11426">11426</ref>
    </refs>
    <vuln_soft>
      <prod name="express-web_content_management_system" vendor="express-web">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2211" seq="2004-2211" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in AliveSites Forums 2.0 allows remote attackers to inject arbitrary web script or HTML via the (1) forum_id, (2) method, or (3) forum_title parameters to post.asp, (4) the forum_title parameter to forum.asp, or (5) the id parameter to post.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.maxpatrol.com/advdetails.asp?id=5" adv="1">http://www.maxpatrol.com/advdetails.asp?id=5</ref>
      <ref source="MISC" url="http://www.maxpatrol.com/mp_advisory.asp">http://www.maxpatrol.com/mp_advisory.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11427">11427</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17725">alivesites-xss(17725)</ref>
    </refs>
    <vuln_soft>
      <prod name="alivesites_forum" vendor="alivesites">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2212" seq="2004-2212" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in forum.asp in AliveSites Forums 2.0 allows remote attackers to execute arbitrary SQL commands via the forum_id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.maxpatrol.com/advdetails.asp?id=5" adv="1">http://www.maxpatrol.com/advdetails.asp?id=5</ref>
      <ref source="MISC" url="http://www.maxpatrol.com/mp_advisory.asp">http://www.maxpatrol.com/mp_advisory.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11427">11427</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17730">alivesites-sql-injection(17730)</ref>
    </refs>
    <vuln_soft>
      <prod name="alivesites_forum" vendor="alivesites">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2213" seq="2004-2213" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Mbedthis AppWeb HTTP server before 1.1.3 allows remote attackers to obtain the source code for scripts via a (1) trailing dot (".") or (2) trailing space in an HTTP request.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.mbedthis.com/products/appWeb/doc/product/newFeatures.html">http://www.mbedthis.com/products/appWeb/doc/product/newFeatures.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10673" patch="1">10673</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16636">mbedthis-character-information-disclosure(16636)</ref>
    </refs>
    <vuln_soft>
      <prod name="mbedthis_appweb_http_server" vendor="mbedthis_software">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2214" seq="2004-2214" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Mbedthis AppWeb HTTP server before 1.1.3 allows remote attackers to bypass access restrictions via a URI with mixed case characters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.mbedthis.com/products/appWeb/doc/product/newFeatures.html">http://www.mbedthis.com/products/appWeb/doc/product/newFeatures.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10673" patch="1">10673</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16638">mbedthis-uri-gain-access(16638)</ref>
    </refs>
    <vuln_soft>
      <prod name="mbedthis_appweb_http_server" vendor="mbedthis_software">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2215" seq="2004-2215" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">RXVT-Unicode 3.4 and 3.5 does not properly close file descriptors, which allows local users to access the terminals of other users and possibly gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.schmorp.de/browse/rxvt-unicode/Changes?view=markup">http://cvs.schmorp.de/browse/rxvt-unicode/Changes?view=markup</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10959" patch="1">10959</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17000">rxvt-unicode-open-file-handler(17000)</ref>
    </refs>
    <vuln_soft>
      <prod name="rxvt-unicode" vendor="marc_lehmann">
        <vers num="3.4"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2216" seq="2004-2216" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Sun Java System Web Server 6.0 SP7 and earlier and 6.1 SP1 and earlier, and Application Server 7 Update 4 and earlier, allows remote attackers to cause a denial of service (crash) via a malformed client certificate.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101589-1">101589</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57669-1" adv="1" patch="1">57669</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11593" patch="1">11593</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17941">sun-java-web-application-dos(17941)</ref>
    </refs>
    <vuln_soft>
      <prod name="java_system_application_server" vendor="sun">
        <vers num="7.0" edition=":platform"/>
        <vers num="7.0" edition=":standard"/>
      </prod>
      <prod name="java_system_web_server" vendor="sun">
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0" edition="sp2"/>
        <vers num="6.0" edition="sp3"/>
        <vers num="6.0" edition="sp4"/>
        <vers num="6.0" edition="sp5"/>
        <vers num="6.0" edition="sp6"/>
        <vers num="6.0" edition="sp7"/>
        <vers num="6.1" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2217" seq="2004-2217" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple unknown vulnerabilities in yhttpd in yChat before 0.7 allow remote attackers to cause a denial of service (segmentation fault) via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://archives.neohapsis.com/archives/apps/freshmeat/2004-11/0001.html">[fm-news] 20041102 Newsletter for Monday, November 01st 2004</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012043" patch="1">1012043</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11597" patch="1">11597</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17942">ychat-http-connection-dos(17942)</ref>
    </refs>
    <vuln_soft>
      <prod name="ychat" vendor="ychat">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.5.1"/>
        <vers num="0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2218" seq="2004-2218" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in pmwh.php in PHPMyWebHosting 0.3.4 and earlier allows remote attackers to modify SQL statements via the password parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0207.html">20040814 Posible security bug in phpMyWebhosting</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-09/0247.html" patch="1">20040920 Re: Posible security bug in phpMyWebhosting</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10942" patch="1">10942</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17005">phpmywebhosting-pmwh-sql-injection(17005)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmywebhosting" vendor="phpmywebhosting">
        <vers num="0.3.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2219" seq="2004-2219" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 6 allows remote attackers to spoof the address bar to facilitate phishing attacks via Javascript that uses an invalid URI, modifies the Location field, then uses history.back to navigate to the previous domain, aka NullyFake.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0215.html">20040815 NullyFake - Site Spoofing in MSIE</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010957">1010957</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17007">ie-address-bar-spoofing(17007)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.01"/>
        <vers num="5.5"/>
        <vers num="6.0" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2220" seq="2004-2220" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">F-Secure Anti-Virus for Microsoft Exchange 6.30 and 6.31 does not properly detect certain password-protected files in a ZIP file, which allows remote attackers to bypass anti-virus protection.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.f-secure.com/support/hotfix/fsav-mse/fsavmse63x-02_readme.txt" patch="1">ftp://ftp.f-secure.com/support/hotfix/fsav-mse/fsavmse63x-02_readme.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012057" patch="1">1012057</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11600" patch="1">11600</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17944">fsecure-password-antivirus-bypass(17944)</ref>
    </refs>
    <vuln_soft>
      <prod name="f-secure_anti-virus" vendor="f-secure">
        <vers num="6.30" edition=":ms_exchange"/>
        <vers num="6.30_sr1" edition=":ms_exchange"/>
        <vers num="6.31" edition=":ms_exchange"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2221" seq="2004-2221" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in SoftCart.exe in Mercantec SoftCart 4.00b allows remote attackers to execute arbitrary code via a long parameter in an HTTP GET request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://metasploit.com/projects/Framework/modules/exploits/mercantec_softcart.pm">http://metasploit.com/projects/Framework/modules/exploits/mercantec_softcart.pm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10926" patch="1">10926</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17008">softcart-softcartexecgi-bo(17008)</ref>
    </refs>
    <vuln_soft>
      <prod name="softcart" vendor="mercantec">
        <vers num="4.00b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2222" seq="2004-2222" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in FsPHPGallery before 1.2 allows remote attackers to list arbitrary directories via the dir parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gallery.devrandom.org.uk/cgi-bin/viewcvs.cgi/fsphpgallery/ChangeLog?rev=HEAD&amp;amp;content-type=text/vnd.viewcvs-markup">http://gallery.devrandom.org.uk/cgi-bin/viewcvs.cgi/fsphpgallery/ChangeLog?rev=HEAD&amp;amp;content-type=text/vnd.viewcvs-markup</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012063" patch="1">1012063</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11594" patch="1">11594</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17950">fsphpgallery-information-disclosure(17950)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2223" seq="2004-2223" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">FsPHPGallery before 1.2 allows remote attackers to cause a denial of service via an image with a large size attribute, which causes a crash when the server attempts to resize the image.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012063" patch="1">1012063</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11594" patch="1">11594</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17947">fsphpgallery-size-dos(17947)</ref>
    </refs>
    <vuln_soft>
      <prod name="fsphpgallery" vendor="fsphpgallery">
        <vers num="0.2"/>
        <vers num="0.3.1"/>
        <vers num="1.0.1"/>
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2224" seq="2004-2224" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Appfoundry Message Foundry 2.75 .0003 allows remote attackers to cause a denial of service (crash) via an HTTP GET request that contains MS-DOS device names such as com1.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010047">1010047</ref>
      <ref source="MISC" url="http://www.oliverkarow.de/research/AppFoundryCOM1_Dos.txt" adv="1">http://www.oliverkarow.de/research/AppFoundryCOM1_Dos.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16063">messagefoundry-get-dos(16063)</ref>
    </refs>
    <vuln_soft>
      <prod name="message_foundry" vendor="appfoundry">
        <vers num="2.75.0003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2225" seq="2004-2225" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox before 0.10.1 allows remote attackers to delete arbitrary files in the download directory via a crafted data: URI that is not properly handled when the user clicks the Save button.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011501" patch="1">1011501</ref>
      <ref source="CONFIRM" url="http://www.mozilla.org/projects/security/older-vulnerabilities.html#firefox0.10.1">http://www.mozilla.org/projects/security/older-vulnerabilities.html#firefox0.10.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11311" patch="1">11311</ref>
      <ref source="CONFIRM" url="https://bugzilla.mozilla.org/show_bug.cgi?id=259708" adv="1" patch="1">https://bugzilla.mozilla.org/show_bug.cgi?id=259708</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9" edition="rc"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.10"/>
        <vers num="preview_release"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2226" seq="2004-2226" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Mozilla Mail 1.7.1 and 1.7.3, and Thunderbird before 0.9, when HTML-Mails is enabled, allows remote attackers to determine valid e-mail addresses via an HTML e-mail that references a Cascading Style Sheets (CSS) document on the attacker's server.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-11/0070.html">20041102 CSS in E-Mails possible E-Mail-Validity Check for Spammers?</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17949">mozilla-css-obtain-emails(17949)</ref>
    </refs>
    <vuln_soft>
      <prod name="thunderbird" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="1.7.1"/>
        <vers num="1.7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2227" seq="2004-2227" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Mozilla Firefox before 1.0 truncates long filenames in the file download dialog box, which makes it easier for remote attackers to trick users into downloading files with dangerous extensions.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200501-03.xml" adv="1" patch="1">GLSA-200501-03</ref>
      <ref source="MISC" url="https://bugzilla.mozilla.org/show_bug.cgi?id=234416" patch="1">https://bugzilla.mozilla.org/show_bug.cgi?id=234416</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18016">mozilla-firefox-ext-spoof(18016)</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="0.8"/>
        <vers num="0.9" edition="rc"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2228" seq="2004-2228" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Mozilla Firefox before 1.0 is installed with world-writable permissions on Mac OS X, which allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="GENTOO" url="http://security.gentoo.org/glsa/glsa-200501-03.xml" adv="1" patch="1">GLSA-200501-03</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11644" patch="1">11644</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18017">mozilla-firefox-gain-privileges(18017)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2229" seq="2004-2229" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple unknown vulnerabilities in Oracle 9i Lite Mobile Server 5.0.0.0.0 through 5.0.2.9.0 allow remote authenticated users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://otn.oracle.com/deploy/security/pdf/2004alert63.pdf" adv="1" patch="1">http://otn.oracle.com/deploy/security/pdf/2004alert63.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9704" patch="1">9704</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15269">oracle-mobile-gain-access(15269)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_server_lite" vendor="oracle">
        <vers num="5.0"/>
        <vers num="5.0.1.0.0"/>
        <vers num="5.0.2.0.0"/>
        <vers num="5.0.2.9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2230" seq="2004-2230" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Heap-based buffer overflow in isakmpd on OpenBSD 3.4 through 3.6 allows local users to cause a denial of service (panic) and corrupt memory via IPSEC credentials on a socket.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012511" patch="1">1012511</ref>
      <ref source="OPENBSD" url="http://www.openbsd.org/errata36.html" patch="1">20041214 007: SECURITY FIX: December 14, 2004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11928" patch="1">11928</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18486">openbsd-isakmpd-dos(18486)</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.4"/>
        <vers num="3.5"/>
        <vers num="3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2231" seq="2004-2231" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="1.2" CVSS_base_score="1.2" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Zero G Software InstallAnywhere 5.0.6, 5.0.7, and earlier allows local users to overwrite arbitrary files via a symlink attack on the (1) persistent_state or (2) env.properties.X temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://vapid.dhs.org/zerogadv.txt" adv="1">http://vapid.dhs.org/zerogadv.txt</ref>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=82&amp;type=vulnerabilities" adv="1">20030620 ZeroG InstallAnywhere5 Symlink Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10808">10808</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16791">installanywhere-symlink(16791)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2232" seq="2004-2232" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in sql.php in the Glossary module in Moodle 1.4.1 and earlier allows remote attackers to modify SQL statements.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/moodle/moodle/mod/glossary/sql.php?r1=1.15.2.2&amp;amp;r2=1.15.2.3">http://cvs.sourceforge.net/viewcvs.py/moodle/moodle/mod/glossary/sql.php?r1=1.15.2.2&amp;amp;r2=1.15.2.3</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012113" patch="1">1012113</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11608">11608</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17965">moodle-glossary-sql-injection(17965)</ref>
    </refs>
    <vuln_soft>
      <prod name="moodle" vendor="moodle">
        <vers num="1.1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2233" seq="2004-2233" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown "front page vulnerability with Moodle servers" for Moodle before 1.3.2 has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://moodle.org/doc/?file=releaseold.html">http://moodle.org/doc/?file=releaseold.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10697" patch="1">10697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16662">moodle-php-front-page(16662)</ref>
    </refs>
    <vuln_soft>
      <prod name="moodle" vendor="moodle">
        <vers num="1.1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2234" seq="2004-2234" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Moodle before 1.2 allows teachers to log in as administrators.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://moodle.org/doc/?file=releaseold.html">http://moodle.org/doc/?file=releaseold.html</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2235" seq="2004-2235" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Moodle before 1.2 has unknown impact and attack vectors, related to improper filtering of text.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://moodle.org/doc/?file=releaseold.html">http://moodle.org/doc/?file=releaseold.html</ref>
    </refs>
    <vuln_soft>
      <prod name="moodle" vendor="moodle">
        <vers num="1.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2236" seq="2004-2236" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Moodle before 1.3.3 has unknown impact and attack vectors, related to language setting.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://moodle.org/doc/?file=releaseold.html">http://moodle.org/doc/?file=releaseold.html</ref>
    </refs>
    <vuln_soft>
      <prod name="moodle" vendor="moodle">
        <vers num="1.1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2237" seq="2004-2237" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Moodle before 1.3.4 has unknown impact and attack vectors, related to "strings in Moodle texts."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://moodle.org/doc/?file=releaseold.html">http://moodle.org/doc/?file=releaseold.html</ref>
    </refs>
    <vuln_soft>
      <prod name="moodle" vendor="moodle">
        <vers num="1.1.1"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2238" seq="2004-2238" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">** DISPUTED ** Format string vulnerability in vsybase.c in vpopmail 5.4.2 and earlier has unknown impact and attack vectors.  NOTE: in a followup post, it was observed that the source code used constants that, when compiled, became static format strings.  Thus this is not a vulnerability.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0226.html">20040817 vpopmail &lt;= 5.4.2 (sybase vulnerability)</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0264.html">20040818 [2Cents on] vpopmail &lt;= 5.4.2 (sybase vulnerability)</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0286.html">20040819 [Fwd: Re: [vchkpw] vpopmail &lt;= 5.4.2 (sybase vulnerability) (fwd)]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10962" patch="1">10962</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17017">vpopmail-vsybase-format-string(17017)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2239" seq="2004-2239" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in vsybase.c in vpopmail 5.4.2 and earlier might allow attackers to cause a denial of service or execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0226.html">20040817 vpopmail &lt;= 5.4.2 (sybase vulnerability)</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0264.html">20040818 [2Cents on] vpopmail &lt;= 5.4.2 (sybase vulnerability)</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0286.html">20040819 [Fwd: Re: [vchkpw] vpopmail &lt;= 5.4.2 (sybase vulnerability) (fwd)]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10962" patch="1">10962</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17016">vpopmail-vsybase-bo(17016)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2240" seq="2004-2240" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Phorum 5.0.11 and earlier allow remote attackers to modify SQL statements via (1) the query string in read.php or (2) unknown vectors in file.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://phorum.org/cvs-changelog-5.txt">http://phorum.org/cvs-changelog-5.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011921">1011921</ref>
      <ref source="MISC" url="http://www.maxpatrol.com/advdetails.asp?id=15" adv="1">http://www.maxpatrol.com/advdetails.asp?id=15</ref>
      <ref source="MISC" url="http://www.maxpatrol.com/mp_advisory.asp">http://www.maxpatrol.com/mp_advisory.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11538">11538</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17847">phorum-sql-injection(17847)</ref>
    </refs>
    <vuln_soft>
      <prod name="phorum" vendor="phorum">
        <vers num="5.0.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2241" seq="2004-2241" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Phorum 5.0.11 and earlier allows remote attackers to inject arbitrary HTML or web script via search.php. NOTE: some sources have reported that the affected file is read.php, but this is inconsistent with the vendor's patch.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://phorum.org/cvs-changelog-5.txt">http://phorum.org/cvs-changelog-5.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011921">1011921</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11538">11538</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17846">phorum-xss(17846)</ref>
    </refs>
    <vuln_soft>
      <prod name="phorum" vendor="phorum">
        <vers num="5.0.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2242" seq="2004-2242" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in search.php in Phorum, possibly 5.0.7 beta and earlier, allows remote attackers to inject arbitrary HTML or web script via the subject parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://phorum.org/cvs-changelog-5.txt">http://phorum.org/cvs-changelog-5.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010787">1010787</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10822">10822</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16831">phorum-searchphp-xss(16831)</ref>
    </refs>
    <vuln_soft>
      <prod name="phorum" vendor="phorum">
        <vers num="5.0.7_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2243" seq="2004-2243" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Phorum allows remote attackers to hijack sessions of other users by stealing and replaying the session hash in the phorum_uriauth parameter, as demonstrated using profile.php.  NOTE: the affected version was reported to be 4.3.7, but this may be erroneous.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0999.html">20040519 Ph0rum phorum_uriauth replay attack</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010219">1010219</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16215">phorum-session-hijack(16215)</ref>
    </refs>
    <vuln_soft>
      <prod name="phorum" vendor="phorum">
        <vers num="4.3.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2244" seq="2004-2244" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The XML parser in Oracle 9i Application Server Release 2 9.0.3.0 and 9.0.3.1, 9.0.2.3 and earlier, and Release 1 1.0.2.2 and 1.0.2.2.2, and Database Server Release 2 9.2.0.1 and later, allows remote attackers to cause a denial of service (CPU and memory consumption) via a SOAP message containing a crafted DTD.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://otn.oracle.com/deploy/security/pdf/2004alert65.pdf" adv="1" patch="1">http://otn.oracle.com/deploy/security/pdf/2004alert65.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9703" patch="1">9703</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15270">oracle-soap-dos(15270)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_server" vendor="oracle">
        <vers num="1.0.2.2"/>
        <vers num="1.0.2.2.2"/>
        <vers num="9.0.3"/>
        <vers num="9.0.3.1"/>
      </prod>
      <prod name="oracle9i" vendor="oracle">
        <vers num="enterprise_9.0.1.4"/>
        <vers num="enterprise_9.2.0.1"/>
        <vers num="enterprise_9.2.0.2"/>
        <vers num="personal_9.0.1.4"/>
        <vers num="personal_9.2.0.1"/>
        <vers num="personal_9.2.0.2"/>
        <vers num="standard_9.0.1.4"/>
        <vers num="standard_9.2.0.1"/>
        <vers num="standard_9.2.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2245" seq="2004-2245" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Goollery 0.03 allows remote attackers to inject arbitrary HTML or web script via the (1) page parameter to viewalbum.php or (2) btopage parameter to viewpic.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012062">1012062</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11587">11587</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17957">goollery-viewalbum-viewpic-xss(17957)</ref>
    </refs>
    <vuln_soft>
      <prod name="goollery" vendor="goollery">
        <vers num="0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2246" seq="2004-2246" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Goollery before 0.04b allows remote attackers to inject arbitrary HTML or web script via the conversation_id parameter to viewpic.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs/>
    <vuln_soft>
      <prod name="goollery" vendor="goollery">
        <vers num="0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2247" seq="2004-2247" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in the "admin of paypal email addresses" in AudienceConnect before 1.0.beta.21 has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=98629&amp;release_id=279700" patch="1">http://sourceforge.net/project/shownotes.php?group_id=98629&amp;release_id=279700</ref>
    </refs>
    <vuln_soft>
      <prod name="audienceconnect" vendor="goosequill">
        <vers num="1.0.beta.20"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2248" seq="2004-2248" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in RemoteEditor before 0.1.1 has unknown impact and attack vectors, related to "oversize submissions."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012147" patch="1">1012147</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=98629&amp;release_id=279743" patch="1">http://sourceforge.net/project/shownotes.php?group_id=98629&amp;release_id=279743</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18010">remoteeditor-large-form(18010)</ref>
    </refs>
    <vuln_soft>
      <prod name="remoteeditor" vendor="goosequill">
        <vers num="0.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2249" seq="2004-2249" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the "access code" in SecureEditor before 0.1.2 has unknown impact and attack vectors, possibly involving a bypass of IP address restrictions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012066" patch="1">1012066</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=98629&amp;release_id=279733" patch="1">http://sourceforge.net/project/shownotes.php?group_id=98629&amp;release_id=279733</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17958">secureeditor-ip-address-gain-access(17958)</ref>
    </refs>
    <vuln_soft>
      <prod name="audienceconnect_secureeditor" vendor="goosequill">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2250" seq="2004-2250" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the "access code" in RemoteEditor before 0.1.6 has unknown impact and attack vectors, possibly involving a bypass of IP address restrictions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012148" patch="1">1012148</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=98629&amp;release_id=279743" patch="1">http://sourceforge.net/project/shownotes.php?group_id=98629&amp;release_id=279743</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18009">remoteeditor-ip-address-gain-access(18009)</ref>
    </refs>
    <vuln_soft>
      <prod name="audienceconnect_remoteeditor" vendor="goosequill">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2251" seq="2004-2251" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The PPTP server in Astaro Security Linux before 4.024 provides information about its version, which makes it easier for remote attackers to construct specialized attacks.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012065" patch="1">1012065</ref>
      <ref source="CONFIRM" url="http://www.astaro.org/showflat.php?Cat=&amp;Number=51459&amp;page=0&amp;view=collapsed&amp;sb=5&amp;o=&amp;fpart=1#51459" patch="1">http://www.astaro.org/showflat.php?Cat=&amp;Number=51459&amp;page=0&amp;view=collapsed&amp;sb=5&amp;o=&amp;fpart=1#51459</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17959">astaro-pptp-info-disclosure(17959)</ref>
    </refs>
    <vuln_soft>
      <prod name="security_linux" vendor="astaro">
        <vers num="4.017"/>
        <vers num="4.018"/>
        <vers num="4.019"/>
        <vers num="4.020"/>
        <vers num="4.021"/>
        <vers num="4.022"/>
        <vers num="4.023"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2252" seq="2004-2252" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The firewall in Astaro Security Linux before 4.024 sends responses to SYN-FIN packets, which makes it easier for remote attackers to obtain information about the system and construct specialized attacks.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012065">1012065</ref>
      <ref source="CONFIRM" url="http://www.astaro.org/showflat.php?Cat=&amp;Number=51459&amp;page=0&amp;view=collapsed&amp;sb=5&amp;o=&amp;fpart=1#51459" patch="1">http://www.astaro.org/showflat.php?Cat=&amp;Number=51459&amp;page=0&amp;view=collapsed&amp;sb=5&amp;o=&amp;fpart=1#51459</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17960">astaro-firewall-info-disclosure(17960)</ref>
    </refs>
    <vuln_soft>
      <prod name="security_linux" vendor="astaro">
        <vers num="4.017"/>
        <vers num="4.018"/>
        <vers num="4.019"/>
        <vers num="4.020"/>
        <vers num="4.021"/>
        <vers num="4.022"/>
        <vers num="4.023"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2253" seq="2004-2253" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in user.cgi in SurgeLDAP 1.0g and earlier allows remote attackers to read arbitrary files via a .. in the page parameter of the show command.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/SurgeLDAP%201.0g.txt" adv="1">http://members.lycos.co.uk/r34ct/main/SurgeLDAP%201.0g.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10103">10103</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15851">surgeldap-dotdot-directory-traversal(15851)</ref>
    </refs>
    <vuln_soft>
      <prod name="surgeldap" vendor="netwin">
        <vers num="1.0d"/>
        <vers num="1.0e"/>
        <vers num="1.0g"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2254" seq="2004-2254" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SurgeLDAP 1.0g (Build 12), and possibly other versions before 1.0h, allows remote attackers to bypass authentication for the administration interface via a direct request to admin.cgi with a modified utoken parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://netwinsite.com/surgeldap/updates.htm" patch="1">http://netwinsite.com/surgeldap/updates.htm</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/May/1010113.html" patch="1">1010113</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010068">1010068</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10294">10294</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16076">surgeldap-admin-auth-bypass(16076)</ref>
    </refs>
    <vuln_soft>
      <prod name="surgeldap" vendor="netwin">
        <vers num="1.0a"/>
        <vers num="1.0b"/>
        <vers num="1.0d"/>
        <vers num="1.0e"/>
        <vers num="1.0f"/>
        <vers num="1.0g"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2255" seq="2004-2255" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in phpMyFAQ 1.3.12 allows remote attackers to read arbitrary files, and possibly execute local PHP files, via the action variable, which is used as part of a template filename.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0906.html" adv="1">20040518 Advisory 05/2004: phpMyFAQ local file inclusion vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010190">1010190</ref>
      <ref source="CONFIRM" url="http://www.phpmyfaq.de/advisory_2004-05-18.php" adv="1">http://www.phpmyfaq.de/advisory_2004-05-18.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10374" patch="1">10374</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16177">phpmyfaq-file-include(16177)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmyfaq" vendor="phpmyfaq">
        <vers num="1.3.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2256" seq="2004-2256" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in phpMyFAQ 1.4.0 alpha allows remote attackers to read arbitrary files, and possibly execute local PHP files, via .. sequences in the lang (language) variable.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0906.html" adv="1">20040518 Advisory 05/2004: phpMyFAQ local file inclusion vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010190" patch="1">1010190</ref>
      <ref source="CONFIRM" url="http://www.phpmyfaq.de/advisory_2004-05-18.php" adv="1">http://www.phpmyfaq.de/advisory_2004-05-18.php</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/363636">20040518 Advisory 05/2004: phpMyFAQ local file inclusion vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10377" patch="1">10377</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16223">phpmyfaq-lang-directory-traversal(16223)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2257" seq="2004-2257" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">phpMyFAQ 1.4.0 allows remote attackers to access the Image Manager to upload or delete images without authorization via a direct request.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010795">1010795</ref>
      <ref source="CONFIRM" url="http://www.phpmyfaq.de/advisory_2004-07-27.php" adv="1">http://www.phpmyfaq.de/advisory_2004-07-27.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10813" patch="1">10813</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16814">phpmyfaq-authentication-bypass(16814)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmyfaq" vendor="phpmyfaq">
        <vers num="1.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2258" seq="2004-2258" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Xconfig in Hummingbird Exceed before 9.0.0.1, when the Screen Definition is password-protected, allows local users to access certain options by switching to another tab, then switching back to the original tab.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.hummingbird.com/customer/download.asp?r2=/exceed/900/xconfig_9002.zip" patch="1">http://support.hummingbird.com/customer/download.asp?r2=/exceed/900/xconfig_9002.zip</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10393" patch="1">10393</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16221">exceed-xconfig-bypass-security(16221)</ref>
    </refs>
    <vuln_soft>
      <prod name="exceed" vendor="hummingbird">
        <vers num="9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2259" seq="2004-2259" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">vsftpd before 1.2.2, when under heavy load, allows attackers to cause a denial of service (crash) via a SIGCHLD signal during a malloc or free call, which is not re-entrant.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://vsftpd.beasts.org/users/cevans/untar/vsftpd-1.2.2/Changelog">ftp://vsftpd.beasts.org/users/cevans/untar/vsftpd-1.2.2/Changelog</ref>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=119136">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=119136</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHBA-2004-164.html" patch="1">RHBA-2004-164</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10394">10394</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16222">vsftpd-connection-dos(16222)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11049">oval:org.mitre.oval:def:11049</ref>
    </refs>
    <vuln_soft>
      <prod name="vsftpd" vendor="beasts">
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2260" seq="2004-2260" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Opera Browser 7.23, and other versions before 7.50, updates the address bar as soon as the user clicks a link, which allows remote attackers to redirect to other sites via the onUnload attribute.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10337" patch="1">10337</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16131">opera-onunload-url-spoofing(16131)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="7.23"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2261" seq="2004-2261" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in e107 allows remote attackers to inject arbitrary script or HTML via the "login name/author" field in the (1) news submit or (2) article submit functions.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010084">1010084</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10293" patch="1">10293</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16087">e107-news-submit-xss(16087)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2262" seq="2004-2262" published="2004-12-31" modified="2017-10-18" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">ImageManager in e107 before 0.617 does not properly check the types of uploaded files, which allows remote attackers to execute arbitrary code by uploading a PHP file via the upload parameter to images.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://e107.org/comment.php?comment.news.672" patch="1">http://e107.org/comment.php?comment.news.672</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012657">1012657</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12111">12111</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18670">e107-images-file-upload(18670)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/704">704</ref>
    </refs>
    <vuln_soft>
      <prod name="e107" vendor="e107">
        <vers num="0.545"/>
        <vers num="0.554"/>
        <vers num="0.555_beta"/>
        <vers num="0.603"/>
        <vers num="0.610"/>
        <vers num="0.611"/>
        <vers num="0.612"/>
        <vers num="0.613"/>
        <vers num="0.614"/>
        <vers num="0.615"/>
        <vers num="0.615a"/>
        <vers num="0.616"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2263" seq="2004-2263" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the valid function in fr_left.php in PlaySMS 0.7 and earlier allows remote attackers to modify SQL statements via the vc2 cookie.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010984" patch="1">1010984</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=254915" patch="1">http://sourceforge.net/project/shownotes.php?release_id=254915</ref>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/5UP0F2ADPS.html" adv="1">http://www.securiteam.com/unixfocus/5UP0F2ADPS.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10970" patch="1">10970</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17031">playsms-valid-sql-injection(17031)</ref>
    </refs>
    <vuln_soft>
      <prod name="playsms" vendor="playsms">
        <vers num="0.6"/>
        <vers num="0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2264" seq="2004-2264" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">** DISPUTED ** Format string bug in the open_altfile function in filename.c for GNU less 382, 381, and 358 might allow local users to cause a denial of service or possibly execute arbitrary code via format strings in the LESSOPEN environment variable. NOTE: since less is not setuid or setgid, then this is not a vulnerability unless there are plausible scenarios under which privilege boundaries could be crossed.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0794.html">20040818 gnu-less Format String Vulnerability</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0811.html">20040818 Re: gnu-less Format String Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010988">1010988</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17032">less-filename-format-string(17032)</ref>
    </refs>
    <vuln_soft>
      <prod name="less" vendor="gnu">
        <vers num="358"/>
        <vers num="381"/>
        <vers num="382"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2265" seq="2004-2265" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">UUDeview 0.5.20 and earlier handles temporary files insecurely during decoding, with unknown attack vectors and impact.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9857" patch="1">9857</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15492">uudeview-insecure-temporary-files(15492)</ref>
    </refs>
    <vuln_soft>
      <prod name="uudeview" vendor="uudeview">
        <vers num="0.5.18"/>
        <vers num="0.5.19"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2266" seq="2004-2266" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Ansel 2.1 and earlier allows remote attackers to modify SQL statements via the image parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012434" patch="1">1012434</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11824" patch="1">11824</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18373">ansel-image-sql-injection(18373)</ref>
    </refs>
    <vuln_soft>
      <prod name="ansel" vendor="ansel">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.3"/>
        <vers num="1.4"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2267" seq="2004-2267" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Ansel 2.1 and earlier allows remote attackers to inject arbitrary HTML or web script via the album name.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012434" patch="1">1012434</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11824" patch="1">11824</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18374">ansel-albumname-xss(18374)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2268" seq="2004-2268" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">PimenGest2 before 1.1.1 allows remote attackers to obtain the database password via debug information in rowLatex.inc.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.pimentech.net/src/pimengest2/debian/changelog">ftp://ftp.pimentech.net/src/pimengest2/debian/changelog</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010257" patch="1">1010257</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10408" patch="1">10408</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16234">pimengest2-rowlatex-view-password(16234)</ref>
    </refs>
    <vuln_soft>
      <prod name="pimengest2" vendor="pimentech">
        <vers num="1.10.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2269" seq="2004-2269" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in pads.c in Passive Asset Detection System (Pads) might allow local users to execute arbitrary code via a long report file name argument. NOTE: since Pads is not normally installed setuid, this may not be a vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0834.html" adv="1">20040819 PADS Simple Stack Overflow</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17038">pads-bo(17038)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2270" seq="2004-2270" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in IBM Parallel Environment (PE) 3.2 and 4.1 allows attackers to execute arbitrary commands as root via unknown vectors in the sample code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010109" patch="1">1010109</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10310" patch="1">10310</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16093">ibm-pe-gain-privileges(16093)</ref>
      <ref source="CONFIRM" url="https://techsupport.services.ibm.com/server/pseries.subscriptionSvcs?mode=18&amp;ID=312" adv="1" patch="1">https://techsupport.services.ibm.com/server/pseries.subscriptionSvcs?mode=18&amp;ID=312</ref>
    </refs>
    <vuln_soft>
      <prod name="parallel_environment" vendor="ibm">
        <vers num="3.2"/>
        <vers num="4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2271" seq="2004-2271" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in MiniShare 1.4.1 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-11/0208.html" adv="1">20041107 [New VULNERABILTY + Exploit] MiniShare, Minimal HTTP Server for Windows, Remote Buffer Overflow Exploit</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012106">1012106</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=241158" patch="1">http://sourceforge.net/project/shownotes.php?release_id=241158</ref>
      <ref source="MISC" url="http://www.securiteam.com/exploits/6X00B1PBPC.html">http://www.securiteam.com/exploits/6X00B1PBPC.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11620">11620</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17978">minishare-address-link-bo(17978)</ref>
    </refs>
    <vuln_soft>
      <prod name="minimal_http_server" vendor="minishare">
        <vers num="1.4.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2272" seq="2004-2272" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the sockFinger_DataArrival function in efFingerD 0.2.12 allows remote attackers to cause a denial of service (daemon crash) via a long finger command.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/efFingerD.txt" adv="1" patch="1">http://members.lycos.co.uk/r34ct/main/efFingerD.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010094" patch="1">1010094</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16097">effingerd-sockfingerdataarrival-bo(16097)</ref>
    </refs>
    <vuln_soft>
      <prod name="effingerd" vendor="evan_sims">
        <vers num="0.2.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2273" seq="2004-2273" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">efFingerD 0.2.12 allows remote attackers to cause a denial of service (daemon crash) via a packet with a single byte, which triggers a "Wrong protocol or connection state" error.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs/>
    <vuln_soft>
      <prod name="effingerd" vendor="evan_sims">
        <vers num="0.2.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2274" seq="2004-2274" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in Jigsaw before 2.2.4 has unknown impact and attack vectors, possibly related to the parsing of the URI.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009169" patch="1">1009169</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9711" patch="1">9711</ref>
      <ref source="CONFIRM" url="http://www.w3.org/Jigsaw/RelNotes.html#2.2.4">http://www.w3.org/Jigsaw/RelNotes.html#2.2.4</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15298">jigsaw-url-execute-code(15298)</ref>
    </refs>
    <vuln_soft>
      <prod name="jigsaw" vendor="w3c">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2275" seq="2004-2275" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">i-mall.cgi in I-Mall Commerce allows remote attackers to execute arbitrary commands via shell metacharacters via the p parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/exploits/5UP0715FPC.html">http://www.securiteam.com/exploits/5UP0715FPC.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10626">10626</ref>
      <ref source="MISC" url="http://www.zone-h.org/advisories/read/id=4904" adv="1">http://www.zone-h.org/advisories/read/id=4904</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16540">imall-commerce-command-execution(16540)</ref>
    </refs>
    <vuln_soft>
      <prod name="i-mall.cgi" vendor="i-mall_commerce">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2276" seq="2004-2276" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">F-Secure Anti-Virus 5.41 and 5.42 on Windows, Client Security 5.50 and 5.52, 4.60 for Samba Servers, and 4.52 and earlier for Linux does not properly detect certain viruses in a PKZip archive, which allows viruses such as Sober.D and Sober.G to bypass initial detection.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-linux-hotfixes.shtml" patch="1">http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-linux-hotfixes.shtml</ref>
      <ref source="CONFIRM" url="http://support.f-secure.de/ger/home/downloads/hotfixes/av5-hotfixes.shtml" patch="1">http://support.f-secure.de/ger/home/downloads/hotfixes/av5-hotfixes.shtml</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16243">fsecure-sober-detection-bypass(16243)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2277" seq="2004-2277" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in aGSM Half-Life client allows remote Half-Life servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server response.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010989">1010989</ref>
      <ref source="MISC" url="http://www.security.nnov.ru/docs6620.html" adv="1">http://www.security.nnov.ru/docs6620.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10989">10989</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17046">agsm-response-bo(17046)</ref>
    </refs>
    <vuln_soft>
      <prod name="agsm" vendor="agsm">
        <vers num="2.35c"/>
        <vers num="2.51c"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2278" seq="2004-2278" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unknown cross-site scripting (XSS) vulnerability in the web GUI in vHost before 3.10r1 has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://chaogic.com/vhost/ChangeLog.txt">http://chaogic.com/vhost/ChangeLog.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009404" patch="1">1009404</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9860" patch="1">9860</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15446">vhost-xss(15446)</ref>
    </refs>
    <vuln_soft>
      <prod name="vhost" vendor="chaogic_systems">
        <vers num="3.00r1"/>
        <vers num="3.00r2"/>
        <vers num="3.00r3"/>
        <vers num="3.00r4"/>
        <vers num="3.00r5"/>
        <vers num="3.00r6"/>
        <vers num="3.01r1"/>
        <vers num="3.02r1"/>
        <vers num="3.02r2"/>
        <vers num="3.03r1"/>
        <vers num="3.04r1"/>
        <vers num="3.05r1"/>
        <vers num="3.05r2"/>
        <vers num="3.05r3"/>
        <vers num="3.05r4"/>
        <vers num="3.05r5"/>
        <vers num="3.05r6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2279" seq="2004-2279" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Invision Power Board 1.3 Final allows remote attackers to execute arbitrary script as other users via the pop parameter in a chat action to index.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0082.html">20040308 Invision Power Board v1.3 Final Cross Site Scripting 2 - Addon</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15448">invision-indexphp-xss(15448)</ref>
    </refs>
    <vuln_soft>
      <prod name="invision_power_board" vendor="invision_power_services">
        <vers num="1.3_final"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2280" seq="2004-2280" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in IBM Lotus Notes 6.5.x before 6.5.3 and 6.0.x before 6.0.5 allows remote attackers to cause a denial of service (crash) via unknown vectors related to Java applets, as identified by KSPR62F4KN.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10704">10704</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?rs=475&amp;context=SSKTWP&amp;q1=Java&amp;uid=swg21173910&amp;loc=en_US&amp;cs=utf-8&amp;lang=en" patch="1">http://www-1.ibm.com/support/docview.wss?rs=475&amp;context=SSKTWP&amp;q1=Java&amp;uid=swg21173910&amp;loc=en_US&amp;cs=utf-8&amp;lang=en</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_notes" vendor="ibm">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.5"/>
        <vers num="6.5.1"/>
        <vers num="6.5.2"/>
        <vers num="6.5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2281" seq="2004-2281" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple unknown vulnerabilities in IBM Lotus Notes 6.5.x before 6.5.4 and 6.0.x before 6.0.5 have unknown impact and attack vectors, related to Java applets, as identified by (1) KSPR5YS6GR and (2) KSPR62F4D3.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10704">10704</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?rs=475&amp;context=SSKTWP&amp;q1=Java&amp;uid=swg21173910&amp;loc=en_US&amp;cs=utf-8&amp;lang=en" patch="1">http://www-1.ibm.com/support/docview.wss?rs=475&amp;context=SSKTWP&amp;q1=Java&amp;uid=swg21173910&amp;loc=en_US&amp;cs=utf-8&amp;lang=en</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_notes" vendor="ibm">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.5"/>
        <vers num="6.5.1"/>
        <vers num="6.5.2"/>
        <vers num="6.5.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2282" seq="2004-2282" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">DansGuardian before 2.7.7-2 allows remote attackers to bypass URL filters via a ".." in the request.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs/>
    <vuln_soft>
      <prod name="dansguardian" vendor="daniel_barron">
        <vers num="2.7.3"/>
        <vers num="2.7.5"/>
        <vers num="2.7.6"/>
        <vers num="2.7.7"/>
        <vers num="2.7.7.1_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2283" seq="2004-2283" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in DansGuardian before 2.6.1-13 allows remote attackers to bypass URL filters via a crafted request that causes a page to be added to the clean page cache.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://dansguardian.org/?page=history">http://dansguardian.org/?page=history</ref>
    </refs>
    <vuln_soft>
      <prod name="dansguardian" vendor="daniel_barron">
        <vers num="2.6.1.8"/>
        <vers num="2.6.1.9"/>
        <vers num="2.6.1.10"/>
        <vers num="2.6.1.11"/>
        <vers num="2.6.1.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2284" seq="2004-2284" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The read_list_from_file function in vacation.pl for OpenWebmail before 2.32 20040629 allows remote attackers to execute arbitrary commands via shell metacharacters in a filename argument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://openwebmail.org/openwebmail/download/cert/advisories/SA-04:04.txt" adv="1" patch="1">http://openwebmail.org/openwebmail/download/cert/advisories/SA-04:04.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010605" patch="1">1010605</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10637" patch="1">10637</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16549">open-webmail-vacation-program-execution(16549)</ref>
    </refs>
    <vuln_soft>
      <prod name="open_webmail" vendor="open_webmail">
        <vers num="1.7"/>
        <vers num="1.8"/>
        <vers num="1.71"/>
        <vers num="1.81"/>
        <vers num="1.90"/>
        <vers num="2.20"/>
        <vers num="2.21"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2285" seq="2004-2285" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-2022.  Reason: This candidate is a duplicate of CVE-2004-2022.  Notes: All CVE users should reference CVE-2004-2022 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-2286" seq="2004-2286" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0878.html">20040517 RE: [Full-Disclosure] Buffer Overflow in ActivePerl ?</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10380">10380</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16224">perl-duplication-bo(16224)</ref>
    </refs>
    <vuln_soft>
      <prod name="activeperl" vendor="activestate">
        <vers num="5.6.1"/>
        <vers num="5.6.1.630"/>
        <vers num="5.6.2"/>
        <vers num="5.6.3"/>
        <vers num="5.7.1"/>
        <vers num="5.7.2"/>
        <vers num="5.7.3"/>
        <vers num="5.8"/>
        <vers num="5.8.1"/>
        <vers num="5.8.3"/>
      </prod>
      <prod name="perl" vendor="larry_wall">
        <vers num="5.3"/>
        <vers num="5.4"/>
        <vers num="5.4.5"/>
        <vers num="5.5"/>
        <vers num="5.5.3"/>
        <vers num="5.6"/>
        <vers num="5.6.1"/>
        <vers num="5.8.0"/>
        <vers num="5.8.1"/>
        <vers num="5.8.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2287" seq="2004-2287" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in explorer.php in DSM Light Web File Browser 2.0 allows remote attackers to read arbitrary files via .. (dot dot) in the wdir parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10381">10381</ref>
    </refs>
    <vuln_soft>
      <prod name="light_web_file_browser" vendor="dsm">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2288" seq="2004-2288" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Jelsoft vBulletin allows remote attackers to spoof parts of a website via the loc parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.infosecurity.org.cn/article/hacker/exploit/16557.html">http://www.infosecurity.org.cn/article/hacker/exploit/16557.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10362">10362</ref>
    </refs>
    <vuln_soft>
      <prod name="vbulletin" vendor="jelsoft">
        <vers num="1.0.1" edition=":lite"/>
        <vers num="2.0.3"/>
        <vers num="2.0_rc2"/>
        <vers num="2.0_rc3"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.2"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
        <vers num="2.2.7"/>
        <vers num="2.2.8"/>
        <vers num="2.2.9"/>
        <vers num="2.3.0"/>
        <vers num="2.3.2"/>
        <vers num="2.3.3"/>
        <vers num="2.3.4"/>
        <vers num="3.0_beta_2"/>
        <vers num="3.0_beta_3"/>
        <vers num="3.0_beta_4"/>
        <vers num="3.0_beta_5"/>
        <vers num="3.0_beta_6"/>
        <vers num="3.0_beta_7"/>
        <vers num="3.0_gamma"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2289" seq="2004-2289" published="2004-12-31" modified="2018-10-12" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Microsoft Windows XP Explorer allows local users to execute arbitrary code via a system folder with a Desktop.ini file containing a .ShellClassInfo specifier with a CLSID value that is associated with an executable file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-05/0168.html" adv="1">20040517 Desktop.ini flaw results in executing folders</ref>
      <ref source="MISC" url="http://www.freewebs.com/roozbeh_afrasiabi/xploit/execute.htm">http://www.freewebs.com/roozbeh_afrasiabi/xploit/execute.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10363">10363</ref>
      <ref source="MS" url="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-015">MS06-015</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16171">winxp-explorer-code-execution(16171)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":home"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:home"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2290" seq="2004-2290" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Microsoft Windows XP Explorer allows attackers to execute arbitrary code via a HTML and script in a self-executing folder that references an executable file within the folder, which is automatically executed when a user accesses the folder.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-01/0267.html" adv="1">20040125 Self-Executing FOLDERS: Windows XP Explorer Part V</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008843">1008843</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9487">9487</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14924">win-folder-execute-code(14924)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2291" seq="2004-2291" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Microsoft Windows Internet Explorer 5.5 and 6.0 allows remote attackers to execute arbitrary code via an embedded script that uses Shell Helper objects and a shortcut (link) to execute the target script.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/348688" adv="1">20040101 Self-Executing HTML: Internet Explorer 5.5 and 6.0 Part</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9335">9335</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.5" edition="preview"/>
        <vers num="5.5" edition="sp1"/>
        <vers num="5.5" edition="sp2"/>
        <vers num="6.0" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2292" seq="2004-2292" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Alt-N MDaemon 7.0.1 allows remote attackers to cause a denial of service (application crash) via a long STATUS command to the IMAP server.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0527.html">20040512 Mdaemon 7.0.1 IMAP overflow.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10366">10366</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16118">mdaemon-imap-status-bo(16118)</ref>
    </refs>
    <vuln_soft>
      <prod name="mdaemon" vendor="alt-n">
        <vers num="2.8"/>
        <vers num="2.8.5.0"/>
        <vers num="2.71_sp1"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1_beta"/>
        <vers num="3.5.0"/>
        <vers num="3.5.1"/>
        <vers num="3.5.4"/>
        <vers num="3.5.6"/>
        <vers num="5.0.7"/>
        <vers num="6.0"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="6.0.7"/>
        <vers num="6.5.0"/>
        <vers num="6.5.2"/>
        <vers num="6.7.5"/>
        <vers num="6.7.9"/>
        <vers num="6.8.0"/>
        <vers num="6.8.1"/>
        <vers num="6.8.2"/>
        <vers num="6.8.3"/>
        <vers num="6.8.4"/>
        <vers num="6.8.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2293" seq="2004-2293" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in PHP-Nuke 6.0 to 7.3 allow remote attackers to inject arbitrary web script or HTML via the (1) eid parameter or (2) query parameter to the Encyclopedia module, (3) preview_review function in the Reviews module as demonstrated by the url, cover, rlanguage, and hits parameters, or (4) savecomment function in the Reviews module, as demonstrated using the uname parameter.  NOTE: the Faq/categories and Encyclopedia/ltr issues are already covered by CVE-2005-1023.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/365865">20040611 [waraxe-2004-SA#032 - Multiple security flaws in PhpNuke 6.x - 7.3]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10524">10524</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16406">phpnuke-faq-encyclopedia-xss(16406)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
        <vers num="7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2294" seq="2004-2294" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Canonicalize-before-filter error in the send_review function in the Reviews module for PHP-Nuke 6.0 to 7.3 allows remote attackers to inject arbitrary web script or HTML via hex-encoded XSS sequences in the text parameter, which is checked for dangerous sequences before it is canonicalized, leading to a cross-site scripting (XSS) vulnerability.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/365865">20040611 [waraxe-2004-SA#032 - Multiple security flaws in PhpNuke 6.x - 7.3]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10524">10524</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
        <vers num="7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2295" seq="2004-2295" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Reviews module in PHP-Nuke 6.0 to 7.3 allows remote attackers to execute arbitrary SQL commands via the order parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0310.html">20040611 [waraxe-2004-SA#032 - Multiple security flaws in PhpNuke 6.x - 7.3]</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/365865">20040611 [waraxe-2004-SA#032 - Multiple security flaws in PhpNuke 6.x - 7.3]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10524">10524</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16407">phpnuke-reviews-sql-injection(16407)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2296" seq="2004-2296" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The preview_review function in the Reviews module in PHP-Nuke 6.0 to 7.3, when running on Windows systems, allows remote attackers to obtain sensitive information via an invalid date parameter, which generates an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/365865">20040611 [waraxe-2004-SA#032 - Multiple security flaws in PhpNuke 6.x - 7.3]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10524">10524</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16408">phpnuke-reviews-path-disclosure(16408)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
        <vers num="7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2297" seq="2004-2297" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Reviews module in PHP-Nuke 6.0 to 7.3 allows remote attackers to cause a denial of service (CPU and memory consumption) via a large, out-of-range score parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0310.html">20040611 [waraxe-2004-SA#032 - Multiple security flaws in PhpNuke 6.x - 7.3]</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/365865">20040611 [waraxe-2004-SA#032 - Multiple security flaws in PhpNuke 6.x - 7.3]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10524">10524</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16409">phpnuke-reviews-dos(16409)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.0"/>
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
        <vers num="7.0"/>
        <vers num="7.0_final"/>
        <vers num="7.1"/>
        <vers num="7.2"/>
        <vers num="7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2298" seq="2004-2298" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Novell Internet Messaging System (NIMS) 2.6 and 3.0, and NetMail 3.1 and 3.5, is installed with a default NMAP authentication credential, which allows remote attackers to read and write mail store data if the administrator does not change the credential by using the NMAP Credential Generator.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.novell.com/cgi-bin/search/searchtid.cgi?/10095545.htm" patch="1">http://support.novell.com/cgi-bin/search/searchtid.cgi?/10095545.htm</ref>
    </refs>
    <vuln_soft>
      <prod name="internet_messaging_system" vendor="novell">
        <vers num="2.6"/>
        <vers num="3.0"/>
      </prod>
      <prod name="netmail" vendor="novell">
        <vers num="3.1"/>
        <vers num="3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2299" seq="2004-2299" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Omnicron OmniHTTPd 3.0a and earlier allows remote attackers to execute arbitrary code via an HTTP GET request with a long Range header.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/363651">20040518 Overflow@OmniHTTPd</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10376">10376</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16190">omnithttpd-range-header-bo(16190)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2300" seq="2004-2300" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in snmpd in ucd-snmp 4.2.6 and earlier, when installed setuid root, allows local users to execute arbitrary code via a long -p command line argument.  NOTE: it is not clear whether there are any standard configurations in which snmpd is installed setuid or setgid. If not, then this issue should not be included in CVE.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.packetstormsecurity.org/0405-advisories/snmpdadv.txt" adv="1">http://www.packetstormsecurity.org/0405-advisories/snmpdadv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10396">10396</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16245">ucd-snmpd-command-bo(16245)</ref>
    </refs>
    <vuln_soft>
      <prod name="ucd-snmp" vendor="ucd-snmp">
        <vers num="4.2.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2301" seq="2004-2301" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long "To:" field, possibly due to a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt">http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10398" patch="1">10398</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16246">eudora-to-field-dos(16246)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2302" seq="2004-2302" published="2004-12-31" modified="2017-02-19" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:P/I:N/A:P)">
    <desc>
      <descript source="cve">Race condition in the sysfs_read_file and sysfs_write_file functions in Linux kernel before 2.6.10 allows local users to read kernel memory and cause a denial of service (crash) via large offsets in sysfs files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.10-rc1/2.6.10-rc1-mm1/broken-out/fix-race-in-sysfs_read_file-and-sysfs_write_file.patch" patch="1">http://kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.10-rc1/2.6.10-rc1-mm1/broken-out/fix-race-in-sysfs_read_file-and-sysfs_write_file.patch</ref>
      <ref source="CONFIRM" url="http://linux.bkbits.net:8080/linux-2.6/cset%404186a4deVoR88JjTwMa3ZnIp-_YJsA" patch="1">http://linux.bkbits.net:8080/linux-2.6/cset%404186a4deVoR88JjTwMa3ZnIp-_YJsA</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-922">DSA-922</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:218">MDKSA-2005:218</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2005:219">MDKSA-2005:219</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2005_44_kernel.html" adv="1" patch="1">SUSE-SA:2005:044</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/13091">13091</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2303" seq="2004-2303" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">MTools Mformat before 3.9.9, when installed setuid root, creates files with world-readable and world-writable permissions, which allows local users to read and overwrite files.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:016" adv="1" patch="1">MDKSA-2004:016</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9746" adv="1" patch="1">9746</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15317">mtools-mformat-insecure-permissions(15317)</ref>
    </refs>
    <vuln_soft>
      <prod name="mformat" vendor="mtools">
        <vers num="3.9.1"/>
        <vers num="3.9.2"/>
        <vers num="3.9.3"/>
        <vers num="3.9.4"/>
        <vers num="3.9.5"/>
        <vers num="3.9.6"/>
        <vers num="3.9.7"/>
        <vers num="3.9.8"/>
        <vers num="3.9.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2304" seq="2004-2304" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Integer overflow in Trillian 0.74 and earlier, and Trillian Pro 2.01 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.seifried.org/pipermail/security/2004-February/001869.html" adv="1" patch="1">20040224 Advisory 02/2004: Trillian remote overflows</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/022004.html" adv="1" patch="1">http://security.e-matters.de/advisories/022004.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009220">1009220</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9489" patch="1">9489</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15303">trillian-directim-bo(15303)</ref>
    </refs>
    <vuln_soft>
      <prod name="trillian" vendor="cerulean_studios">
        <vers num="0.71"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.725"/>
      </prod>
      <prod name="trillian_pro" vendor="cerulean_studios">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="2.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2305" seq="2004-2305" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Computer Associates eTrust Antivirus EE 6.0 through 7.0 allows remote attackers to bypass virus scanning by including a password-protected file in a ZIP file, which causes eTrust to scan only the password protected file and skip the other files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9665" patch="1">9665</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Feb/1009074.html" patch="1">1009074</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15230">etrust-antivirus-scan-bypass(15230)</ref>
    </refs>
    <vuln_soft>
      <prod name="etrust_antivirus_ee" vendor="ca">
        <vers num="6.0"/>
        <vers num="7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2306" seq="2004-2306" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Sun Solaris 7 through 9, when Basic Security Module (BSM) is enabled and the SUNWscpu package has been removed as a result of security hardening, disables mail alerts from the audit_warn script, which might allow attackers to escape detection.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57483-1" adv="1" patch="1">57483</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-070.shtml" adv="1" patch="1">O-070</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/13724" patch="1">13724</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15042">solaris-bsm-sunwscpu-weak-security(15042)</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="7.0" edition=":x86"/>
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":sparc"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="5.7"/>
        <vers num="5.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2307" seq="2004-2307" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 6.0.2600 on Windows XP allows remote attackers to cause a denial of service (browser crash) via a shell: URI with double backslashes (\\) in an HTML tag such as IFRAME or A.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/358043" adv="1">20040319 Internet Explorer Causing Explorer.exe - Null Pointer Crash</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9924">9924</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15544">ie-shell-dos(15544)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0.2600"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition=":home"/>
        <vers num="" edition=":media_center"/>
        <vers num="" edition="gold:professional"/>
        <vers num="" edition="sp1:home"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2308" seq="2004-2308" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in cPanel 9.1.0 and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the dir parameter in dohtaccess.html.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/357231">20040312 Cpanel Request Lets Authenticated Users Conduct Cross-Site    Scripting Attacks</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9853">9853</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15485">cpanel-dir-xss(15485)</ref>
    </refs>
    <vuln_soft>
      <prod name="cpanel" vendor="cpanel">
        <vers num="5.0"/>
        <vers num="5.3"/>
        <vers num="6.0"/>
        <vers num="6.2"/>
        <vers num="6.4"/>
        <vers num="6.4.1"/>
        <vers num="6.4.2"/>
        <vers num="6.4.2_stable_48"/>
        <vers num="7.0"/>
        <vers num="8.0"/>
        <vers num="9.0"/>
        <vers num="9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2309" seq="2004-2309" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Crob FTP Server 3.5.1 allows local users to browse outside the FTP root via multiple ../ (dot dot slash) in the DIR command.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/352329">20040201 Vulnerabilities in Crob FTP Server V3.5.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9546">9546</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Feb/1008908.html">1008908</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15028">crob-dir-directory-traversal(15028)</ref>
    </refs>
    <vuln_soft>
      <prod name="crob_ftp_server" vendor="crob">
        <vers num="3.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2310" seq="2004-2310" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in webadmin.nsf in Lotus Domino R6 6.5.1 allows remote attackers to inject arbitrary web script or HTML via a Domino command in the Quick Console.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/ibm_lotus_domino/lotus.txt">http://members.lycos.co.uk/r34ct/main/ibm_lotus_domino/lotus.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9901">9901</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15502">lotus-domino-webadmin-xss(15502)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_domino" vendor="ibm">
        <vers num="6.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2311" seq="2004-2311" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in webadmin.nsf in Lotus Domino R6 6.5.1 allows local users to create folders or determine the existence of files via a .. (dot dot) in the new folder dialog.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/ibm_lotus_domino/lotus.txt" adv="1">http://members.lycos.co.uk/r34ct/main/ibm_lotus_domino/lotus.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9900">9900</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15504">lotus-webadmin-file-disclosure(15504)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_domino" vendor="ibm">
        <vers num="6.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2312" seq="2004-2312" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in GNU make for IBM AIX 4.3.3, when installed setgid, allows local users to gain privileges via a long CC argument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-03/0997.html">20040322 AIX 4.3.3 has make sgid 0?</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-03/1124.html">20040323 Re: AIX 4.3.3 has make sgid 0?</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9903">9903</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15554">aix-make-cc-bo(15554)</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="4.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2313" seq="2004-2313" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Inter7 SqWebMail 3.4.1 through 3.6.1 generates different error messages for incorrect passwords versus correct passwords on non-mail-enabled accounts (such as root), which allows remote attackers to guess the root password via brute force attacks.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/352317">20040131 sqwebmail web login</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9541">9541</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15058">sqwebmail-login-info-disclosure(15058)</ref>
    </refs>
    <vuln_soft>
      <prod name="sqwebmail" vendor="inter7">
        <vers num="3.4.1"/>
        <vers num="3.5.0"/>
        <vers num="3.5.1"/>
        <vers num="3.5.2"/>
        <vers num="3.5.3"/>
        <vers num="3.6.0"/>
        <vers num="3.6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2314" seq="2004-2314" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Telnet listener for Novell iChain Server before 2.2 Field Patch 3b 2.2.116 does not have a password by default, which allows remote attackers to gain access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-080.shtml" patch="1">O-080</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Feb/1008961.html" patch="1">1008961</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15068">ichain-tcp-gain-access(15068)</ref>
    </refs>
    <vuln_soft>
      <prod name="ichain" vendor="novell">
        <vers num="2.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2315" seq="2004-2315" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Mbedthis AppWeb HTTP server before 1.0.2 allows remote attackers to cause a denial of service (crash) via an empty OPTIONS request.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9494" patch="1">9494</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14926">mbedthis-multiple-dos(14926)</ref>
    </refs>
    <vuln_soft>
      <prod name="mbedthis_appweb_http_server" vendor="mbedthis_software">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2316" seq="2004-2316" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Mbedthis AppWeb HTTP server before 1.0.2 allows remote attackers to cause a denial of service (crash) via a GET request containing an MS-DOS device name such as COM1.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9494" patch="1">9494</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14926">mbedthis-multiple-dos(14926)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2317" seq="2004-2317" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Information leak in Mbedthis AppWeb HTTP server 1.0 through 1.1.2 allows remote attackers to obtain sensitive information via a user message that is generated when Mbedthis denies access.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.mbedthis.com/products/appWeb/doc/product/newFeatures.html" patch="1">http://www.mbedthis.com/products/appWeb/doc/product/newFeatures.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10673" patch="1">10673</ref>
    </refs>
    <vuln_soft>
      <prod name="mbedthis_appweb_http_server" vendor="mbedthis_software">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.0.2"/>
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2318" seq="2004-2318" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The administrative interface (surgeftpmgr.cgi) for SurgeFTP Server 1.0b through 2.2k1 allows remote attackers to cause a temporary denial of service (crash) via requests with two percent (%) signs in the CMD parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/surge_FTP/surge-ftp.txt" adv="1">http://members.lycos.co.uk/r34ct/main/surge_FTP/surge-ftp.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008898">1008898</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9554">9554</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15001">surgeftp-web-interface-dos(15001)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2319" seq="2004-2319" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">IBM Informix Dynamic Server (IDS) before 9.40.xC3 allows local users to (1) create or overwrite files via the /001 log file to onedcu or (2) read arbitrary files via a symlink attack on a file in /tmp to onshowaudit.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/351770" adv="1">20040129 ----------========== OPEN3S-2003-08-08-eng-informix-onedcu ==========----------</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9511" patch="1">9511</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9512" patch="1">9512</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21153336">http://www-1.ibm.com/support/docview.wss?uid=swg21153336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14969">informix-onshowaudit-information-disclosure(14969)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14971">informix-onedcu-symlink-attack(14971)</ref>
    </refs>
    <vuln_soft>
      <prod name="informix_dynamic_server" vendor="ibm">
        <vers num="9.40.uc1"/>
        <vers num="9.40.uc2"/>
      </prod>
      <prod name="informix_extended_parallel_server" vendor="ibm">
        <vers num="8.40_uc1"/>
        <vers num="8.40_uc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2320" seq="2004-2320" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The default configuration of BEA WebLogic Server and Express 8.1 SP2 and earlier, 7.0 SP4 and earlier, 6.1 through SP6, and 5.1 through SP13 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/68" adv="1" patch="1">BEA04-48.01</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/867593" adv="1">VU#867593</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9506" patch="1">9506</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Jan/1008866.html" patch="1">1008866</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14959">weblogic-trace-xss(14959)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="5.1" edition=":express"/>
        <vers num="5.1" edition=":win32"/>
        <vers num="5.1" edition="sp1:express"/>
        <vers num="5.1" edition="sp1:win32"/>
        <vers num="5.1" edition="sp10:express"/>
        <vers num="5.1" edition="sp10:win32"/>
        <vers num="5.1" edition="sp11:express"/>
        <vers num="5.1" edition="sp11:win32"/>
        <vers num="5.1" edition="sp12:express"/>
        <vers num="5.1" edition="sp12:win32"/>
        <vers num="5.1" edition="sp13:express"/>
        <vers num="5.1" edition="sp13:win32"/>
        <vers num="5.1" edition="sp2:express"/>
        <vers num="5.1" edition="sp2:win32"/>
        <vers num="5.1" edition="sp3:express"/>
        <vers num="5.1" edition="sp3:win32"/>
        <vers num="5.1" edition="sp4:express"/>
        <vers num="5.1" edition="sp4:win32"/>
        <vers num="5.1" edition="sp5:express"/>
        <vers num="5.1" edition="sp5:win32"/>
        <vers num="5.1" edition="sp6:express"/>
        <vers num="5.1" edition="sp6:win32"/>
        <vers num="5.1" edition="sp7:express"/>
        <vers num="5.1" edition="sp7:win32"/>
        <vers num="5.1" edition="sp8:express"/>
        <vers num="5.1" edition="sp8:win32"/>
        <vers num="5.1" edition="sp9:express"/>
        <vers num="5.1" edition="sp9:win32"/>
        <vers num="6.1" edition=":express"/>
        <vers num="6.1" edition=":win32"/>
        <vers num="6.1" edition="sp1:express"/>
        <vers num="6.1" edition="sp1:win32"/>
        <vers num="6.1" edition="sp2:express"/>
        <vers num="6.1" edition="sp2:win32"/>
        <vers num="6.1" edition="sp3:express"/>
        <vers num="6.1" edition="sp3:win32"/>
        <vers num="6.1" edition="sp4:express"/>
        <vers num="6.1" edition="sp4:win32"/>
        <vers num="6.1" edition="sp5:express"/>
        <vers num="6.1" edition="sp5:win32"/>
        <vers num="6.1" edition="sp6:win32"/>
        <vers num="7.0" edition=":express"/>
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0" edition="sp1:express"/>
        <vers num="7.0" edition="sp1:win32"/>
        <vers num="7.0" edition="sp2:express"/>
        <vers num="7.0" edition="sp2:win32"/>
        <vers num="7.0" edition="sp3:express"/>
        <vers num="7.0" edition="sp3:win32"/>
        <vers num="7.0" edition="sp4:express"/>
        <vers num="7.0" edition="sp4:win32"/>
        <vers num="8.1" edition=":express"/>
        <vers num="8.1" edition=":win32"/>
        <vers num="8.1" edition="sp1:express"/>
        <vers num="8.1" edition="sp1:win32"/>
        <vers num="8.1" edition="sp2:express"/>
        <vers num="8.1" edition="sp2:win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2321" seq="2004-2321" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">BEA WebLogic Server and Express 8.1 SP1 and earlier allows local users in the Operator role to obtain administrator passwords via MBean attributes, including (1) ServerStartMBean.Password and (2) NodeManagerMBean.CertificatePassword.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/1" adv="1" patch="1">BEA04-49.00</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9505" patch="1">9505</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Jan/1008867.html" patch="1">1008867</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14962">weblogic-operator-gain-access(14962)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="8.1" edition="sp1:express"/>
        <vers num="8.1" edition="sp1:win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2322" seq="2004-2322" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the (1) announce and (2) notes modules of phpWebSite before 0.9.3-2 allows remote attackers to execute arbitrary SQL queries, as demonstrated using the ANN_id parameter to the announce module.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=892174&amp;group_id=15539&amp;atid=115539">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=892174&amp;group_id=15539&amp;atid=115539</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Feb/1009045.html">1009045</ref>
      <ref source="MISC" url="http://www.systemsecure.org/advisories/ssadvisory13022004.php" adv="1">http://www.systemsecure.org/advisories/ssadvisory13022004.php</ref>
      <ref source="MISC" url="http://www.zone-h.com/advisories/read/id=3955" adv="1">http://www.zone-h.com/advisories/read/id=3955</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15219">phpwebsite-announce-sql-injection(15219)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpwebsite" vendor="phpwebsite">
        <vers num="0.9.0"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.2.1"/>
        <vers num="0.9.3"/>
        <vers num="0.9.3.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2323" seq="2004-2323" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">DotNetNuke (formerly IBuySpy Workshop) 1.0.6 through 1.0.10d allows remote attackers to obtain sensitive information, including the SQL server username and password, via a GET request for source or configuration files such as Web.config.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-01/1161.html" adv="1" patch="1">20040128 Dotnetnuke Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9518" patch="1">9518</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14972">dotnetnuke-get-information-disclosure(14972)</ref>
    </refs>
    <vuln_soft>
      <prod name="dotnetnuke" vendor="dotnetnuke">
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.10d"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2324" seq="2004-2324" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in DotNetNuke (formerly IBuySpy Workshop) 1.0.6 through 1.0.10d allows remote attackers to modify the backend database via the (1) table and (2) field parameters in LinkClick.aspx.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-01/1161.html" adv="1" patch="1">20040128 Dotnetnuke Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9518" patch="1">9518</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14973">dotnetnuke-multiple-sql-injection(14973)</ref>
    </refs>
    <vuln_soft>
      <prod name="dotnetnuke" vendor="dotnetnuke">
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.10d"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2325" seq="2004-2325" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in EditModule.aspx for DotNetNuke (formerly IBuySpy Workshop) 1.0.6 through 1.0.10d allows remote attackers to inject arbitrary web script or HTML.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-01/1161.html" adv="1" patch="1">20040128 Dotnetnuke Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9518" patch="1">9518</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14974">dotnetnuke-editmoduleaspxxss(14974)</ref>
    </refs>
    <vuln_soft>
      <prod name="dotnetnuke" vendor="dotnetnuke">
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.10d"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2326" seq="2004-2326" published="2004-12-31" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in IP3 Networks NetAccess Appliance before firmware 3.1.18b13 allows remote attackers to bypass authentication via the (1) login or (2) password.  NOTE: this issue was later reported to also affect firmware 4.0.34.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/432007/100/0/threaded">20060424 Multiple vulnerabilities in IP3 Networks 'NetAccess' NA75 appliance</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9858" patch="1">9858</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/26106">ip3-na75-password-field-sql-injection(26106)</ref>
    </refs>
    <vuln_soft>
      <prod name="ip3_netaccess" vendor="ip3_networks">
        <vers num=""/>
      </prod>
      <prod name="ip3_netaccess_-_hospitality" vendor="ip3_networks">
        <vers num=""/>
      </prod>
      <prod name="ip3_netaccess_-_wireless_hotspots" vendor="ip3_networks">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2327" seq="2004-2327" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Vizer Web Server 1.9.1 allows remote attackers to cause a denial of service (crash) via multiple malformed requests including (1) requests without GET, (2) GET requests without HTTP, (3) or long GET requests.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/354156" adv="1">20040217 Denial Of Service in Vizer Web Server 1.9.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9678">9678</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15239">vizer-long-string-dos(15239)</ref>
    </refs>
    <vuln_soft>
      <prod name="vizer_web_server" vendor="vizer_web_server">
        <vers num="1.9.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2328" seq="2004-2328" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Clearswift MAILsweeper for SMTP before 4.3_13 allows remote attackers to cause a denial of service (infinite loop) via an e-mail with a crafted RAR archive attached.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9556" patch="1">9556</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14979">mailsweeper-smtp-rar-dos(14979)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailsweeper" vendor="clearswift">
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.2"/>
        <vers num="4.3"/>
        <vers num="4.3.3"/>
        <vers num="4.3.4"/>
        <vers num="4.3.5"/>
        <vers num="4.3.6"/>
        <vers num="4.3.6_sp1"/>
        <vers num="4.3.7"/>
        <vers num="4.3.8"/>
        <vers num="4.3.10"/>
        <vers num="4.3.11"/>
        <vers num="4.3.13"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2329" seq="2004-2329" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Kerio Personal Firewall (KPF) 2.1.5 allows local users to execute arbitrary code with SYSTEM privileges via the Load button in the Firewall Configuration Files option, which does not drop privileges before opening the file loading dialog box.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9525">9525</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Jan/1008870.html">1008870</ref>
      <ref source="MISC" url="http://www.tuneld.com/_images/other/kpf_system_privileges.png">http://www.tuneld.com/_images/other/kpf_system_privileges.png</ref>
      <ref source="MISC" url="http://www.tuneld.com/news/?id=30">http://www.tuneld.com/news/?id=30</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14981">kerio-pf-gain-privileges(14981)</ref>
    </refs>
    <vuln_soft>
      <prod name="personal_firewall" vendor="kerio">
        <vers num="2.1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2330" seq="2004-2330" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">ColdFusion MX 6.1 and 6.1 J2EE allows remote attackers to cause a denial of service via an HTTP request containing a large number of form fields.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-02.html" adv="1" patch="1">http://www.macromedia.com/devnet/security/security_zone/mpsb04-02.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9522" patch="1">9522</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14983">coldfusion-mx-request-dos(14983)</ref>
    </refs>
    <vuln_soft>
      <prod name="coldfusion" vendor="macromedia">
        <vers num="6.1" edition=":j2ee_application_server"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2331" seq="2004-2331" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">ColdFusion MX 6.1 and 6.1 J2EE allows local users to bypass sandbox security restrictions and obtain sensitive information by using Java reflection methods to access trusted Java objects without using the CreateObject function or cfobject tag.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-01.html" adv="1" patch="1">http://www.macromedia.com/devnet/security/security_zone/mpsb04-01.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9521" patch="1">9521</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14984">coldfusion-mx-sandbox-bypass(14984)</ref>
    </refs>
    <vuln_soft>
      <prod name="coldfusion" vendor="macromedia">
        <vers num="6.1" edition=":j2ee_application_server"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2332" seq="2004-2332" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in CPAN WWW::Form before 1.13 allow remote attackers to inject arbitrary web script or HTML via unknown vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/5IP0L2KBPM.html" adv="1">http://www.securiteam.com/unixfocus/5IP0L2KBPM.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9526">9526</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14985">wwwform-xss(14985)</ref>
    </refs>
    <vuln_soft>
      <prod name="www_form" vendor="cpan">
        <vers num="1.12"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2333" seq="2004-2333" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Bodington 2.1.0 RC1 and earlier does not secure the file upload area, which allows remote attackers to read uploaded files.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=789761&amp;group_id=87659&amp;atid=583930">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=789761&amp;group_id=87659&amp;atid=583930</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9528" patch="1">9528</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14986">bodington-uploadarea-obtain-information(14986)</ref>
    </refs>
    <vuln_soft>
      <prod name="bodington" vendor="bodington">
        <vers num="2.1.0_rc1"/>
        <vers num="2.1.0_rc2"/>
        <vers num="2.1.0_rc3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2334" seq="2004-2334" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in EMU Webmail 5.2.7 allow remote attackers to inject arbitrary web script or HTML via (1) a hex-encoded value to the variable parameter in emumail.fcgi, (2) the folder parameter in emumail.fcgi, or Javascript in the (3) username or (4) password field in the login page.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/emu/emu.txt" adv="1">http://members.lycos.co.uk/r34ct/main/emu/emu.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009397">1009397</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9861">9861</ref>
      <ref source="MISC" url="http://www.zone-h.com/advisories/read/id=4141" adv="1">http://www.zone-h.com/advisories/read/id=4141</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15451">emu-webmail-emumail-xss(15451)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15452">emu-webmail-login-xss(15452)</ref>
    </refs>
    <vuln_soft>
      <prod name="emu_webmail" vendor="emumail">
        <vers num="5.2.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2335" seq="2004-2335" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Macromedia installers and e-licensing client on Mac OS X, as used for Macromedia Contribute 2, Director, Dreamweaver, Fireworks, Flash, and Studio, install the AuthenticationService setuid and writable by other users, which allows local users to gain privileges by modifying the program.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.macromedia.com/devnet/security/security_zone/mpsb04-03.html" adv="1" patch="1">http://www.macromedia.com/devnet/security/security_zone/mpsb04-03.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9862" patch="1">9862</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15465">elicensing-gain-privileges(15465)</ref>
    </refs>
    <vuln_soft>
      <prod name="contribute" vendor="macromedia">
        <vers num="2.0"/>
      </prod>
      <prod name="studio" vendor="macromedia">
        <vers num="2004"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2336" seq="2004-2336" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in Novell GroupWise and GroupWise WebAccess 6.0 through 6.5, when running with Apache Web Server 1.3 for NetWare where Apache is loaded using GWAPACHE.CONF, allows remote attackers to read directories and files on the server.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.novell.com/cgi-bin/search/searchtid.cgi?/10091330.htm" patch="1">http://support.novell.com/cgi-bin/search/searchtid.cgi?/10091330.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9864" patch="1">9864</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Mar/1009417.html" patch="1">1009417</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15467">groupwise-obtain-information(15467)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2337" seq="2004-2337" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The /.inlook/.crypt file for inlook 0.7.3 and earlier is installed with world readable permissions, which allows local users to obtain user POP3 credentials.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9527" patch="1">9527</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14990">inlook-file-information-disclosure(14990)</ref>
      <ref source="CONFIRM" url="https://sourceforge.net/project/shownotes.php?release_id=213427" patch="1">https://sourceforge.net/project/shownotes.php?release_id=213427</ref>
    </refs>
    <vuln_soft>
      <prod name="inlook" vendor="inlook">
        <vers num="0.6.0"/>
        <vers num="0.6.1"/>
        <vers num="0.6.2"/>
        <vers num="0.6.3"/>
        <vers num="0.6.4"/>
        <vers num="0.6.5"/>
        <vers num="0.6.6"/>
        <vers num="0.6.7"/>
        <vers num="0.6.8"/>
        <vers num="0.6.9"/>
        <vers num="0.6.10.0"/>
        <vers num="0.6.11"/>
        <vers num="0.6.12"/>
        <vers num="0.6.13"/>
        <vers num="0.6.14"/>
        <vers num="0.7.0"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2338" seq="2004-2338" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">OpenBSD 3.3 and 3.4 does not properly parse Accept and Deny rules without netmasks on big-endian 64-bit platforms such as SPARC64, which may allow remote attackers to bypass access restrictions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.openbsd.org/errata33.html" patch="1">http://www.openbsd.org/errata33.html</ref>
      <ref source="CONFIRM" url="http://www.openbsd.org/errata34.html" patch="1">http://www.openbsd.org/errata34.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9867" patch="1">9867</ref>
    </refs>
    <vuln_soft>
      <prod name="openbsd" vendor="openbsd">
        <vers num="3.3"/>
        <vers num="3.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2339" seq="2004-2339" published="2004-12-31" modified="2019-04-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">** DISPUTED ** Microsoft Windows 2000, XP, and possibly 2003 allows local users with the SeDebugPrivilege privilege to execute arbitrary code as kernel and read or write kernel memory via the NtSystemDebugControl function, which does not verify its pointer arguments.  Note: this issue has been disputed, since Administrator privileges are typically required to exploit this issue, thus privilege boundaries are not crossed.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-02/0529.html">20040219 RE: Multiple WinXP kernel vulns can give user mode programs kernel mode privileges</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-02/0530.html">20040219 RE: Multiple WinXP kernel vulns can give user mode programs kernel mode privileges</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/354392" adv="1">20040218 Multiple WinXP kernel vulns can give user mode programs kernel mode privileges</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1009128">1009128</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15263">win-kernel-gain-privileges(15263)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2000" vendor="microsoft">
        <vers num=""/>
      </prod>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2340" seq="2004-2340" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">** UNVERIFIABLE **  SQL injection vulnerability in PunkBuster Screenshot Database (PB-DB) Alpha 6 allows remote attackers to execute arbitrary SQL commands via the username and password fields of the login form.  NOTE: the original vulnerability report contains several significant inconsistencies that make it unclear whether the report is accurate, including (1) PB-DB is really the "PunkBuster Screenshot Database" and not "PunkBuster" itself; (2) there is no apparent association between PunkBuster and "Punky Brewster"; (3) the claimed source code is not anywhere in Alpha 6.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009145">1009145</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/354453" adv="1">20040219 PunkBuster SQL Injection Attack</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9697">9697</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15267">punkbuster-login-sql-injection(15267)</ref>
    </refs>
    <vuln_soft>
      <prod name="punkbuster_database" vendor="even_balance">
        <vers num="1.0_alpha"/>
        <vers num="2.0_alpha"/>
        <vers num="3.0_alpha"/>
        <vers num="4.0_alpha"/>
        <vers num="5.0_alpha"/>
        <vers num="6.0_alpha"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2341" seq="2004-2341" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP file include injection vulnerability in isearch.inc.php for iSearch allows remote attackers to execute arbitrary code via the isearch_path parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Feb/1008900.html">1008900</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15009">isearch-isearchincphp-file-include(15009)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2342" seq="2004-2342" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">ChatterBox 2.0 allows remote attackers to cause a denial of service (server crash) via a malformed request to the server, as demonstrated using "aaaaaa".</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/ChatterBox2.0-adv.txt" adv="1">http://www.autistici.org/fdonato/advisory/ChatterBox2.0-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/352341">20040130 Denial Of Service in ChatterBox 2.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9532">9532</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15011">chatterbox-dos(15011)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2343" seq="2004-2343" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">** DISPUTED ** Apache HTTP Server 2.0.47 and earlier allows local users to bypass .htaccess file restrictions, as specified in httpd.conf with directives such as Deny From All, by using an ErrorDocument directive. NOTE: the vendor has disputed this issue, since the .htaccess mechanism is only intended to restrict external web access, and a local user already has the privileges to perform the same operations without using ErrorDocument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-02/0043.html" adv="1">20040131 BUG IN APACHE HTTPD SERVER (current version 2.0.47)</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-02/0064.html">20040202 Re: BUG IN APACHE HTTPD SERVER (current version 2.0.47)</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-02/0120.html">20040204 Re: BUG IN APACHE HTTPD SERVER (current version 2.0.47)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15015">apache-httpd-bypass-restriction(15015)</ref>
    </refs>
    <vuln_soft>
      <prod name="http_server" vendor="apache">
        <vers num="2.0.47" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2344" seq="2004-2344" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the ASN.1/H.323/H.225 stack of VocalTec VGW120 and VGW480 allows remote attackers to cause a denial of service.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10411">10411</ref>
      <ref source="MISC" url="http://www.securitylab.ru/45401.html" adv="1">http://www.securitylab.ru/45401.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16240">vocaltec-gateway-dos(16240)</ref>
    </refs>
    <vuln_soft>
      <prod name="vgw120_telephony_gateway" vendor="vocaltec">
        <vers num=""/>
      </prod>
      <prod name="vgw480_telephony_gateway" vendor="vocaltec">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2345" seq="2004-2345" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown multiple vulnerabilities in Oracle9i Database Server 9.0.1.4, 9.0.1.5, 9.2.0.3, and 9.2.0.4 allow local users with the ability to invoke SQL to cause a denial of service or obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://otn.oracle.com/deploy/security/pdf/2004alert64.pdf" adv="1" patch="1">http://otn.oracle.com/deploy/security/pdf/2004alert64.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9705" patch="1">9705</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15271">oracle9i-sql-dos(15271)</ref>
    </refs>
    <vuln_soft>
      <prod name="database_server" vendor="oracle">
        <vers num="9.0.1.4"/>
        <vers num="9.0.1.5"/>
        <vers num="9.2.0.3"/>
        <vers num="9.2.0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2346" seq="2004-2346" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Forum Web Server 1.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the Subject field in post1.htm and (2) the File Description field in postfile2.htm.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Feb/1008896.html">1008896</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15018">forumwebserver-multiple-xss(15018)</ref>
    </refs>
    <vuln_soft>
      <prod name="forum_web_server" vendor="minihttpserver.net">
        <vers num="1.6" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2347" seq="2004-2347" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">blog.cgi in Leif M. Wright Web Blog 1.1 and 1.1.5 allows remote attackers to execute arbitrary commands via shell metacharacters such as '|' in the file parameter of ViewFile requests.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://leifwright.com/scripts/Blog.html">http://leifwright.com/scripts/Blog.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/352303">20040129 Web Blog 1.1 Remote Execute Commands Bug</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9539" patch="1">9539</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15019">webblog-file-command-execution(15019)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_blog" vendor="leif_m._wright">
        <vers num="1.1"/>
        <vers num="1.1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2348" seq="2004-2348" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Sybari AntiGen for Domino 7.0 Build 722 SR2 allows remote attackers to cause a denial of service (hang) via an encrypted ZIP file with the "include full path info" option set, as used by certain variants of the Beagle/Bagle worm.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009437" patch="1">1009437</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9880" patch="1">9880</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15470">antigen-zip-file-dos(15470)</ref>
    </refs>
    <vuln_soft>
      <prod name="antigen" vendor="sybari">
        <vers num="7.0_build_722_(sr2)" edition=":lotus_domino"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2349" seq="2004-2349" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Tunez before 1.20-pre2 allow remote attackers to execute arbitrary SQL queries.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=879391&amp;group_id=2266&amp;atid=102266" patch="1">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=879391&amp;group_id=2266&amp;atid=102266</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9565" patch="1">9565</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15020">tunez-multiple-sql-injection(15020)</ref>
    </refs>
    <vuln_soft>
      <prod name="tunez" vendor="tunez">
        <vers num="0.9"/>
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.15"/>
        <vers num="1.20_pre1"/>
        <vers num="1.20_pre2"/>
        <vers num="1.20_rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2350" seq="2004-2350" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in search.php for phpBB 1.0 through 2.0.6 allows remote attackers to execute arbitrary SQL and gain privileges via the search_results parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/357442" adv="1">20040314 [SCAN Associates Sdn Bhd Security Advisory] phpBB 2.0.6 and below sql injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9883" patch="1">9883</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15475">phpbb-config-sql-injection(15475)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpbb" vendor="phpbb_group">
        <vers num="1.0.0"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.4.0"/>
        <vers num="1.4.1"/>
        <vers num="1.4.2"/>
        <vers num="1.4.4"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0_beta1"/>
        <vers num="2.0_rc1"/>
        <vers num="2.0_rc2"/>
        <vers num="2.0_rc3"/>
        <vers num="2.0_rc4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2351" seq="2004-2351" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in GBook for Php-Nuke 1.0 allows remote attackers to inject arbitrary web script or HTML via multiple parameters, including (1) name, (2) email, (3) city, and (4) message, which do not use the &lt;script> and &lt;style> tags, which are filtered by PHP-Nuke.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008930">1008930</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/352373">20040202 [waraxe-2004-SA#001] - Script injection in GBook for Php-Nuke ver. 1.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9559">9559</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15027">gbook-message-html-injection(15027)</ref>
    </refs>
    <vuln_soft>
      <prod name="gbook" vendor="martin_bauer">
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2352" seq="2004-2352" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in GBook for PHP-Nuke 1.0 allows remote attackers to inject arbitrary web script or HTML via cookies that are stored in the $_COOKIE PHP variable, which is not cleansed by PHP-Nuke.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008930">1008930</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/352373">20040202 [waraxe-2004-SA#001] - Script injection in GBook for Php-Nuke ver. 1.0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9559">9559</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15027">gbook-message-html-injection(15027)</ref>
    </refs>
    <vuln_soft>
      <prod name="gbook" vendor="martin_bauer">
        <vers num="1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2353" seq="2004-2353" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">BugPort before 1.099 stores its configuration file (conf/config.conf) under the web document root with a file extension that is not normally parsed by web servers, which allows remote attackers to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.incogen.com/downloads/bugport/CHANGELOG.txt">http://www.incogen.com/downloads/bugport/CHANGELOG.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9542" patch="1">9542</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15030">bugport-obtain-information(15030)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2354" seq="2004-2354" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0139.html" adv="1">20040315 [waraxe-2004-SA#007 - XSS and SQL injection bugs in 4nguestbook module for PhpNuke]</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15478">4nguestbook-modules-xss(15478)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-nuke" vendor="francisco_burzi">
        <vers num="6.5"/>
        <vers num="6.5_beta1"/>
        <vers num="6.5_final"/>
        <vers num="6.5_rc1"/>
        <vers num="6.5_rc2"/>
        <vers num="6.5_rc3"/>
        <vers num="6.6"/>
        <vers num="6.7"/>
        <vers num="6.9"/>
      </prod>
      <prod name="4nguestbook" vendor="warpspeed">
        <vers num="0.92"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2355" seq="2004-2355" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Crafty Syntax Live Help (CSLH) before 2.7.4 allows remote attackers to inject arbitrary web script or HTML via the name field of a livehelp or chat session.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0054.html" patch="1">20040603 Cross-site scripting vulnerability in Crafy Syntax Live Help 2.7.3 and below</ref>
      <ref source="CONFIRM" url="http://www.craftysyntax.com/CHANGELOG.txt">http://www.craftysyntax.com/CHANGELOG.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10463" patch="1">10463</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16321">cslh-chat-name-xss(16321)</ref>
    </refs>
    <vuln_soft>
      <prod name="crafty_syntax_live_help" vendor="crafty_syntax_live_help">
        <vers num="2.7.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2356" seq="2004-2356" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Early termination vulnerability in Fizmez Web Server 1.0 allows remote attackers to cause a denial of service (crash) by connecting to the server and then disconnecting without sending any data, which triggers a null pointer dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009451" adv="1" patch="1">1009451</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/fws1.0-adv.txt" adv="1" patch="1">http://www.autistici.org/fdonato/advisory/fws1.0-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9894" patch="1">9894</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15506">fizmez-webserver-null-dos(15506)</ref>
    </refs>
    <vuln_soft>
      <prod name="fizmez_web_server" vendor="fizmez">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2357" seq="2004-2357" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The embedded MySQL 4.0 server for Proofpoint Protection Server does not require a password for the root user of MySQL, which allows remote attackers to read or modify the backend database.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=107745676915297&amp;w=2">20040201 Proofpoint Protection Server remote MySQL root user vulnerability</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=107752568009182&amp;w=2">20040223 Re: [Full-Disclosure] Proofpoint Protection Server remote MySQL root user vulnerability</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15280">proofpoint-mysql-gain-access(15280)</ref>
    </refs>
    <vuln_soft>
      <prod name="proofpoint_protection_server" vendor="proofpoint">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2358" seq="2004-2358" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in admin_words.php for phpBB 2.0.6c allows remote attackers to inject arbitrary web script or HTML via the id parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0219.html" adv="1">20040322 [waraxe-2004-SA#009 - Non-critical Sql injection and XSS bug in PhpBB 2.0.6c]</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9896" patch="1">9896</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15579">phpbb-adminwords-xss(15579)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2359" seq="2004-2359" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Dell TrueMobile 1300 WLAN Mini-PCI Card Util TrayApplet 3.10.39.0 does not properly drop SYSTEM privileges when started from the systray applet, which allows local users to gain privileges by accessing the Help functionality.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0042.html" adv="1">20040222 Dell TrueMobile Wireless Help Privilege Escalation Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009174" adv="1">1009174</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9714">9714</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15285">dell-truemobile-gain-privileges(15285)</ref>
    </refs>
    <vuln_soft>
      <prod name="truemobile_1300_wlan_mini-pci_card_util_trayapplet" vendor="dell">
        <vers num="3.10.39.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2360" seq="2004-2360" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Targem Battle Mages 1.0 allows remote attackers to cause a denial of service (infinite loop) via a UDP packet with incomplete data, which causes the server to enter an infinite loop while waiting to read the rest of the data that is not sent.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/battlemages-adv.txt" adv="1">http://aluigi.altervista.org/adv/battlemages-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://cert.uni-stuttgart.de/archive/bugtraq/2004/03/msg00103.html" adv="1">20040311 Unreal engine updates and Battle Mages advisory</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9849">9849</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15487">battlemages-incomplete-data-dos(15487)</ref>
    </refs>
    <vuln_soft>
      <prod name="battle_mages" vendor="targem_games">
        <vers num="1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2361" seq="2004-2361" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Digital Reality game engine, as used in Haegemonia 1.0 through 1.0.7 and Desert Rats vs. Afrika Korps 1.0, allows remote attackers to cause a denial of service (crash) via a chat message with a large message size, which triggers an out-of-bounds read.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/hgmcrash-adv.txt" adv="1">http://aluigi.altervista.org/adv/hgmcrash-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107764783411414&amp;w=2">20040224 Remote server crash in Haegemonia &lt;= 1.07</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9736">9736</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15307">haegemonia-long-packet-dos(15307)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2362" seq="2004-2362" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">PHPX 3.2.6 and earlier allows remote attackers to obtain the physical path of PHPX via a null or invalid value in the limit parameter, which leaks the pathname in a database error message, as demonstrated using forums.php.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010061">1010061</ref>
      <ref source="MISC" url="http://www.phpx.org/project.php?action=view&amp;project_id=1" patch="1">http://www.phpx.org/project.php?action=view&amp;project_id=1</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/362230" adv="1">20040504 Vulnerabilities In PHPX 3.26 And Earlier</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16064">phpx-limit-path-disclosure(16064)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpx" vendor="phpx">
        <vers num="1.0.7"/>
        <vers num="1.0.10"/>
        <vers num="1.0.14"/>
        <vers num="2.1.0"/>
        <vers num="2.2.0"/>
        <vers num="2.2.1"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.0.7"/>
        <vers num="3.1.0"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.4"/>
        <vers num="3.2.0"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2"/>
        <vers num="3.2.3"/>
        <vers num="3.2.4"/>
        <vers num="3.2.5"/>
        <vers num="3.2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2363" seq="2004-2363" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Validate-Before-Canonicalize vulnerability in the checkURI function in functions.inc.php in PHPX 3.0 through 3.2.6 allows remote attackers to conduct cross-site scripting (XSS) attacks via hex-encoded tags, which bypass the check for literal "&lt;", ">", "(", and ")" characters, as demonstrated using the limit parameter to forums.php and a variety of other vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.phpx.org/project.php?action=view&amp;project_id=1" patch="1">http://www.phpx.org/project.php?action=view&amp;project_id=1</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/362230" adv="1">20040504 Vulnerabilities In PHPX 3.26 And Earlier</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10283" patch="1">10283</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16065">phpx-xss(16065)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpx" vendor="phpx">
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.0.7"/>
        <vers num="3.1.0"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.4"/>
        <vers num="3.2.0"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2"/>
        <vers num="3.2.3"/>
        <vers num="3.2.4"/>
        <vers num="3.2.5"/>
        <vers num="3.2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2364" seq="2004-2364" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in PHPX 3.0 through 3.2.6 allows remote attackers to execute arbitrary commands via URLs that are automatically executed on behalf of the administrator, as demonstrated using (1) admin/page.php, (2) admin/news.php, (3) admin/user.php, (4) admin/images.php, (5) admin/page.php, or (6) admin/forums.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010061">1010061</ref>
      <ref source="MISC" url="http://www.phpx.org/project.php?action=view&amp;project_id=1" patch="1">http://www.phpx.org/project.php?action=view&amp;project_id=1</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/362230" adv="1">20040504 Vulnerabilities In PHPX 3.26 And Earlier</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10284" patch="1">10284</ref>
    </refs>
    <vuln_soft>
      <prod name="phpx" vendor="phpx">
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.0.7"/>
        <vers num="3.1.0"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.4"/>
        <vers num="3.2.0"/>
        <vers num="3.2.1"/>
        <vers num="3.2.2"/>
        <vers num="3.2.3"/>
        <vers num="3.2.4"/>
        <vers num="3.2.5"/>
        <vers num="3.2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2365" seq="2004-2365" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Memory leak in Microsoft Windows XP and Windows Server 2003 allows local users to cause a denial of service (memory exhaustion) by repeatedly creating and deleting directories using a non-standard tool such as smbmount.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-02/0119.html" adv="1">20040202 smbmount disrupts Windows file sharing.</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15057">win-linux-smbmount-dos(15057)</ref>
    </refs>
    <vuln_soft>
      <prod name="windows_2003_server" vendor="microsoft">
        <vers num="r2"/>
      </prod>
      <prod name="windows_xp" vendor="microsoft">
        <vers num="" edition="gold:professional"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2366" seq="2004-2366" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in GlobalSCAPE Secure FTP Server 2.0 B03.11.2004.2 allows remote attackers to cause a denial of service (crash) via a SITE command with a long argument.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.cuteftp.com/gsftps/history.asp">http://www.cuteftp.com/gsftps/history.asp</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5KP0C20CAC.html" adv="1">http://www.securiteam.com/windowsntfocus/5KP0C20CAC.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9904" patch="1">9904</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15511">secureftp-site-command-bo(15511)</ref>
    </refs>
    <vuln_soft>
      <prod name="secure_ftp_server" vendor="globalscape">
        <vers num="2.0_build2004-03-11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2367" seq="2004-2367" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The Control Panel applet in WFTPD and WFTPD Pro 3.21 R1 and R2 allows remote authenticated users to cause a denial of service (crash) via a long FTP command.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5JP0B20CAY.html" adv="1">http://www.securiteam.com/windowsntfocus/5JP0B20CAY.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9908" patch="1">9908</ref>
      <ref source="CONFIRM" url="http://www.wftpd.com/bug_gpf.htm">http://www.wftpd.com/bug_gpf.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15510">wftpd-gui-dos(15510)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2368" seq="2004-2368" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in header.php in Opt-X 0.7.2 allows remote attackers to execute arbitrary PHP code via the systempath parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.opt-x.org/index.php" patch="1">http://www.opt-x.org/index.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9732">9732</ref>
      <ref source="MISC" url="http://www.zone-h.org/en/advisories/read/id=4036/">http://www.zone-h.org/en/advisories/read/id=4036/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15296">optx-header-file-include(15296)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2369" seq="2004-2369" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in webadmin.nsf for Lotus Domino R6 6.5.1 allows attackers to create and detect directories via a .. (dot dot) in the directory creation command.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/ibm_lotus_domino/lotus.txt" adv="1">http://members.lycos.co.uk/r34ct/main/ibm_lotus_domino/lotus.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9900">9900</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15503">lotus-dotdot-file-creation(15503)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15504">lotus-webadmin-file-disclosure(15504)</ref>
    </refs>
    <vuln_soft>
      <prod name="lotus_domino" vendor="ibm">
        <vers num="6.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2370" seq="2004-2370" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Trillian 0.71 through 0.74f and Trillian Pro 1.0 through 2.01 allows remote attackers to execute arbitrary code via a Yahoo Messenger packet with a long key name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/017766.html" adv="1" patch="1">20040224 Advisory 02/2004: Trillian remote overflows</ref>
      <ref source="MISC" url="http://security.e-matters.de/advisories/022004.html" adv="1" patch="1">http://security.e-matters.de/advisories/022004.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009220">1009220</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15304">trillian-key-name-bo(15304)</ref>
    </refs>
    <vuln_soft>
      <prod name="trillian" vendor="cerulean_studios">
        <vers num="0.71"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.74b"/>
        <vers num="0.74c"/>
        <vers num="0.74d"/>
        <vers num="0.74e"/>
        <vers num="0.74f"/>
        <vers num="0.74g"/>
        <vers num="0.725"/>
      </prod>
      <prod name="trillian_pro" vendor="cerulean_studios">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="2.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2371" seq="2004-2371" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple Red Storm web-based games, including Ghost Recon 1.4 and earlier, Desert Siege, and The Sum of all Fears 1.1.1.0 and earlier, do not properly check return values from certain functions, which allows remote attackers to cause a denial of service (hang) via packets that contain text strings with incorrect size values.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/grboom-adv.txt">http://aluigi.altervista.org/adv/grboom-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/355051">20040224 Remote crash in Ghost Recon engine</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9738">9738</ref>
      <ref source="MISC" url="http://www.zone-h.org/advisories/read/id=4038">http://www.zone-h.org/advisories/read/id=4038</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15305">redstorm-games-dos(15305)</ref>
    </refs>
    <vuln_soft>
      <prod name="desert_siege" vendor="redstorm">
        <vers num=""/>
      </prod>
      <prod name="ghost_recon" vendor="redstorm">
        <vers num="1.4"/>
      </prod>
      <prod name="the_sum_of_all_fears" vendor="redstorm">
        <vers num="1.1.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2372" seq="2004-2372" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Bochs before 2.1.1, if installed setuid, allows local users to execute arbitrary code via a long HOME environment variable, which is used if the .bochsrc, bochsrc, and bochsrc.txt cannot be found in a known path.  NOTE: some external documents recommend that Bochs be installed setuid root, so this should be treated as a vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009219" patch="1">1009219</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=215733" patch="1">http://sourceforge.net/project/shownotes.php?release_id=215733</ref>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/5XP0L1FC0M.html" adv="1" patch="1">http://www.securiteam.com/unixfocus/5XP0L1FC0M.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15309">bochs-home-bo(15309)</ref>
    </refs>
    <vuln_soft>
      <prod name="bochs" vendor="bochs">
        <vers num="2.0.2"/>
        <vers num="2.1"/>
        <vers num="2.1_pre1"/>
        <vers num="2.1_pre2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2373" seq="2004-2373" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Buddy icon file for AOL Instant Messenger (AIM) 4.3 through 5.5 is created in a predictable location, which may allow remote attackers to use a shell: URI to exploit other vulnerabilities that involve predictable locations.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/354448" adv="1">20040219 Aol Instant Messenger/Microsoft Internet Explorer remote code execution</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9698">9698</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15310">aim-buddy-predictable-location(15310)</ref>
    </refs>
    <vuln_soft>
      <prod name="instant_messenger" vendor="aol">
        <vers num="4.3"/>
        <vers num="4.3.2229"/>
        <vers num="4.4"/>
        <vers num="4.5"/>
        <vers num="4.6"/>
        <vers num="4.7"/>
        <vers num="4.7.2480"/>
        <vers num="4.8.2616"/>
        <vers num="4.8.2646"/>
        <vers num="4.8.2790"/>
        <vers num="5.0.2938"/>
        <vers num="5.1.3036"/>
        <vers num="5.2.3292"/>
        <vers num="5.5"/>
        <vers num="5.5.3415_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2374" seq="2004-2374" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">BadBlue 2.4 allows remote attackers to obtain the location of the server installation path via a request for phptest.php, which includes the pathname in the source of the resulting HTML.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/355109" adv="1">20040224 BadBlue 2.4 Local Path Disclosure By phptest.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9737">9737</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15311">badblue-phptestphp-path-disclosure(15311)</ref>
    </refs>
    <vuln_soft>
      <prod name="badblue" vendor="working_resources_inc.">
        <vers num="2.40"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2375" seq="2004-2375" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the POP3 server in 1st Class Mail Server 4.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an APOP USER command with a long second parameter (digest).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009279">1009279</ref>
      <ref source="MISC" url="http://www.digiti.be/jeffosz/advisories/1stclasspop3.txt" adv="1">http://www.digiti.be/jeffosz/advisories/1stclasspop3.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9794">9794</ref>
      <ref source="MISC" url="http://www.zone-h.org/advisories/read/id=4047" adv="1">http://www.zone-h.org/advisories/read/id=4047</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15314">1st-class-apop-dos(15314)</ref>
    </refs>
    <vuln_soft>
      <prod name="1st_class_mail_server" vendor="1st_class_internet_solutions">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2376" seq="2004-2376" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in postfile.exe for Twilight Utilities Web Server 2.0.0.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a URL request with a long attfile attribute.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/TW-webserver/TWwebserver.txt" adv="1">http://members.lycos.co.uk/r34ct/main/TW-webserver/TWwebserver.txt</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Mar/1009443.html" adv="1">1009443</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15515">twilight-postfile-attfile-bo(15515)</ref>
    </refs>
    <vuln_soft>
      <prod name="twilight_utilities_web_server" vendor="twilight_utilities">
        <vers num="2.0.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2377" seq="2004-2377" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009211">1009211</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/355134">20040219 Alcatel Omniswitch 7000 series</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9745">9745</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15318">alcatel-omniswitch-nessus-dos(15318)</ref>
    </refs>
    <vuln_soft>
      <prod name="omniswitch" vendor="alcatel">
        <vers num="7000"/>
      </prod>
      <prod name="omniswitch_7800" vendor="alcatel">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2378" seq="2004-2378" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">@Mail 3.64 for Windows allows remote attackers to cause a denial of service ("unusable" server) via a large number of POP3 connections to the server.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/@mail_3.64/@mail_3.64.txt" adv="1">http://members.lycos.co.uk/r34ct/main/@mail_3.64/@mail_3.64.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9749">9749</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Feb/1009208.html" adv="1">1009208</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15320">atmail-connection-dos(15320)</ref>
    </refs>
    <vuln_soft>
      <prod name="at_mail_webmail_system" vendor="calacode">
        <vers num="3.64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2379" seq="2004-2379" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in @Mail 3.64 for Windows allow remote attackers to inject arbitrary web script or HTML via (1) the Displayed Name attribute in util.pl and (2) the Folder attribute in showmail.pl.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/@mail_3.64/@mail_3.64.txt" adv="1">http://members.lycos.co.uk/r34ct/main/@mail_3.64/@mail_3.64.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9748">9748</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Feb/1009208.html">1009208</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15324">atmail-util-xss(15324)</ref>
    </refs>
    <vuln_soft>
      <prod name="at_mail_webmail_system" vendor="calacode">
        <vers num="3.64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2380" seq="2004-2380" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in postfile.exe for Twilight Utilities Web Server 2.0.0.0 allows remote attackers to write arbitrary files via a .. (dot dot) in the attfile parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/TW-webserver/TWwebserver.txt" adv="1">http://members.lycos.co.uk/r34ct/main/TW-webserver/TWwebserver.txt</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Mar/1009443.html" adv="1">1009443</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15523">twilight-postfile-create-file(15523)</ref>
    </refs>
    <vuln_soft>
      <prod name="twilight_utilities_web_server" vendor="twilight_utilities">
        <vers num="2.0.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2381" seq="2004-2381" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">HttpRequest.java in Jetty HTTP Server before 4.2.19 allows remote attackers to cause denial of service (memory usage and application crash) via HTTP requests with a large Content-Length.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/jetty/Jetty/src/org/mortbay/http/HttpRequest.java?r1=1.75&amp;r2=1.76">http://cvs.sourceforge.net/viewcvs.py/jetty/Jetty/src/org/mortbay/http/HttpRequest.java?r1=1.75&amp;r2=1.76</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=224743" patch="1">http://sourceforge.net/project/shownotes.php?release_id=224743</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9917">9917</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15537">jetty-dos(15537)</ref>
    </refs>
    <vuln_soft>
      <prod name="jetty_http_server" vendor="jetty">
        <vers num="4.0.0"/>
        <vers num="4.0.1"/>
        <vers num="4.0.1_rc0"/>
        <vers num="4.0.1_rc1"/>
        <vers num="4.0.1_rc2"/>
        <vers num="4.0.2"/>
        <vers num="4.0.3"/>
        <vers num="4.0.4"/>
        <vers num="4.0.5"/>
        <vers num="4.0.6"/>
        <vers num="4.0.b0"/>
        <vers num="4.0.b1"/>
        <vers num="4.0.b2"/>
        <vers num="4.0.d0"/>
        <vers num="4.0.d1"/>
        <vers num="4.0.d2"/>
        <vers num="4.0.d3"/>
        <vers num="4.0.d4"/>
        <vers num="4.0_rc1"/>
        <vers num="4.0_rc2"/>
        <vers num="4.0_rc3"/>
        <vers num="4.1.0"/>
        <vers num="4.1.0_rc0"/>
        <vers num="4.1.0_rc1"/>
        <vers num="4.1.0_rc2"/>
        <vers num="4.1.0_rc3"/>
        <vers num="4.1.0_rc4"/>
        <vers num="4.1.0_rc5"/>
        <vers num="4.1.0_rc6"/>
        <vers num="4.1.1"/>
        <vers num="4.1.2"/>
        <vers num="4.1.3"/>
        <vers num="4.1.4"/>
        <vers num="4.1.b0"/>
        <vers num="4.1.b1"/>
        <vers num="4.1.d0"/>
        <vers num="4.1.d1"/>
        <vers num="4.1.d2"/>
        <vers num="4.2.0"/>
        <vers num="4.2.0_beta0"/>
        <vers num="4.2.0_rc0"/>
        <vers num="4.2.0_rc1"/>
        <vers num="4.2.1"/>
        <vers num="4.2.2"/>
        <vers num="4.2.3"/>
        <vers num="4.2.4"/>
        <vers num="4.2.4_rc0"/>
        <vers num="4.2.5"/>
        <vers num="4.2.6"/>
        <vers num="4.2.7"/>
        <vers num="4.2.8_01"/>
        <vers num="4.2.9"/>
        <vers num="4.2.9_rc1"/>
        <vers num="4.2.9_rc2"/>
        <vers num="4.2.10"/>
        <vers num="4.2.10_pre0"/>
        <vers num="4.2.10_pre1"/>
        <vers num="4.2.11"/>
        <vers num="4.2.12"/>
        <vers num="4.2.14"/>
        <vers num="4.2.14_rc0"/>
        <vers num="4.2.14_rc1"/>
        <vers num="4.2.15"/>
        <vers num="4.2.15_rc0"/>
        <vers num="4.2.16"/>
        <vers num="4.2.17"/>
        <vers num="4.2.18"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2382" seq="2004-2382" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The PerfectNav plugin for Microsoft Internet Explorer allows remote attackers to cause a denial of service (browser crash) via a malformed URL such as "?".</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/017830.html" adv="1">20040226 PerfectNav Crashes IE</ref>
      <ref source="MISC" url="http://securetarget.net/advisory.htm" adv="1">http://securetarget.net/advisory.htm</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009218" adv="1">1009218</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9753">9753</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15326">ie-perfect-nav-dos(15326)</ref>
    </refs>
    <vuln_soft>
      <prod name="perfectnav" vendor="perfectnav">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2383" seq="2004-2383" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 5.0 through 6.0 allows remote attackers to bypass cross-frame scripting restrictions and capture keyboard events from other domains via an HTML document with Javascript that is outside a frameset that includes the target domain, then forcing the frameset to maintain focus.  NOTE: the discloser claimed that the vendor does not categorize this as a vulnerability, but it can be used in a spoofing scenario; the discloser provides alternate scenarios. Spoofing scenarios are currently included in CVE.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="IDEFENSE" url="http://www.idefense.com/application/poi/display?id=77&amp;type=vulnerabilities&amp;flashstatus=false">20040227 Microsoft Internet Explorer Cross Frame Scripting Restriction Bypass</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9761">9761</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15337">ie-frame-domain-bypass(15337)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="5.5" edition="sp1"/>
        <vers num="5.5" edition="sp2"/>
        <vers num="6.0" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2384" seq="2004-2384" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">NullSoft Winamp 5.02 allows remote attackers to cause a denial of service (crash) by creating a file with a long filename, which causes the victim's player to crash when the file is opened from the command line.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/357986">20040319 Winamp 5.02 Long Filename Buffer Overflow Vulnerability</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/358097">20040320 Re: Winamp 5.02 Long Filename Buffer Overflow Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9920" patch="1">9920</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15541">winamp-long-file-dos(15541)</ref>
    </refs>
    <vuln_soft>
      <prod name="winamp" vendor="nullsoft">
        <vers num="5.02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2385" seq="2004-2385" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">EMU Webmail 5.2.7 allows remote attackers to obtain sensitive path information (home directory) via an HTTP request for init.emu.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/emu/emu.txt" adv="1">http://members.lycos.co.uk/r34ct/main/emu/emu.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9861">9861</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15453">emu-init-path-disclosure(15453)</ref>
    </refs>
    <vuln_soft>
      <prod name="emu_webmail" vendor="emumail">
        <vers num="5.2.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2386" seq="2004-2386" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the LogMsg function in sercd before 2.3.1 and sredird 2.2.1 and earlier allows remote attackers to execute arbitrary code via format string specifiers passed from the HandleCPCCommand function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.lysator.liu.se/viewcvs/viewcvs.cgi/sercd/sercd.c?root=sercd">http://cvs.lysator.liu.se/viewcvs/viewcvs.cgi/sercd/sercd.c?root=sercd</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011038">1011038</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11002">11002</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11031" patch="1">11031</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17056">sredird-logmsg-format-string(17056)</ref>
    </refs>
    <vuln_soft>
      <prod name="sredird" vendor="denis_sbragion">
        <vers num="1.0"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
      </prod>
      <prod name="sercd" vendor="peter_astrand">
        <vers num="2.3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2387" seq="2004-2387" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the HandleCPCCommand function of sercd before 2.3.1 and sredird 2.2.1 and earlier allows remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.lysator.liu.se/viewcvs/viewcvs.cgi/sercd/sercd.c?root=sercd">http://cvs.lysator.liu.se/viewcvs/viewcvs.cgi/sercd/sercd.c?root=sercd</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011038">1011038</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11002">11002</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11033" patch="1">11033</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17059">sredird-handlecpccommand-execute-code(17059)</ref>
    </refs>
    <vuln_soft>
      <prod name="sredird" vendor="denis_sbragion">
        <vers num="1.0"/>
        <vers num="1.1.6"/>
        <vers num="1.1.7"/>
        <vers num="1.1.8"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
      </prod>
      <prod name="sercd" vendor="peter_astrand">
        <vers num="2.3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2388" seq="2004-2388" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">rexecd for AIX 4.3.3 does not properly use a local copy of the pwd structure when calling getpwnam, which may cause the structure to be overwritten by the authenticate function and assign privileges to the wrong user.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-102.shtml" adv="1">O-102</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9835" patch="1">9835</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=isg1IY53507" adv="1">IY53507</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15455">rexecd-gain-privileges(15455)</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="4.3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2389" seq="2004-2389" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in Jabber Gadu-Gadu Transport (a.k.a. jabber-gg-transport) 2.0.x before 2.0.8 allows remote attackers to cause a denial of service (infinite loop) via user re-registration.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009248">1009248</ref>
      <ref source="CONFIRM" url="http://www.jabberstudio.org/projects/jabber-gg-transport/releases/view.php?id=429" adv="1" patch="1">http://www.jabberstudio.org/projects/jabber-gg-transport/releases/view.php?id=429</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9710" patch="1">9710</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15319">jabber-gadugadu-dos(15319)</ref>
    </refs>
    <vuln_soft>
      <prod name="jabber_gadu-gadu_transport" vendor="jabberstudio">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2390" seq="2004-2390" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The roster import functionality in Jabber Gadu-Gadu Transport (a.k.a. jabber-gg-transport) 2.0.x before 2.0.8, when using libgadu 1.0 and later, allows attackers to cause a denial of service via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.jabberstudio.org/projects/jabber-gg-transport/releases/view.php?id=429" patch="1">http://www.jabberstudio.org/projects/jabber-gg-transport/releases/view.php?id=429</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9710" patch="1">9710</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15319">jabber-gadugadu-dos(15319)</ref>
    </refs>
    <vuln_soft>
      <prod name="jabber_gadu-gadu_transport" vendor="jabberstudio">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2391" seq="2004-2391" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Jabber Gadu-Gadu Transport (a.k.a. jabber-gg-transport) 2.0.x before 2.0.8 allows remote attackers to cause a denial of service a message with an empty &lt;priority/> tag.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.jabberstudio.org/projects/jabber-gg-transport/releases/view.php?id=429" patch="1">http://www.jabberstudio.org/projects/jabber-gg-transport/releases/view.php?id=429</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9710" patch="1">9710</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15319">jabber-gadugadu-dos(15319)</ref>
    </refs>
    <vuln_soft>
      <prod name="jabber_gadu-gadu_transport" vendor="jabberstudio">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.4"/>
        <vers num="2.0.5"/>
        <vers num="2.0.6"/>
        <vers num="2.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2392" seq="2004-2392" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">libuser 0.51.7 allows attackers to cause a denial of service (crash or disk consumption) via unknown attack vectors, related to read failures and other bugs.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010187">1010187</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:044" adv="1" patch="1">MDKSA-2004:044</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-770.html" adv="1">RHSA-2005:770</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10368" patch="1">10368</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120168" adv="1" patch="1">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120168</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16188">libuser-dos(16188)</ref>
    </refs>
    <vuln_soft>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="9.1"/>
        <vers num="9.2" edition=":amd64"/>
        <vers num="9.2" edition=":ppc"/>
        <vers num="10.0"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2393" seq="2004-2393" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Java Secure Socket Extension (JSSE) 1.0.3 through 1.0.3_2 does not properly validate the certificate chain of a client or server, which allows remote attackers to falsely authenticate peers for SSL/TLS.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010193" patch="1">1010193</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57560-1" adv="1" patch="1">57560</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201724-1">201724</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001273.1-1">1001273</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10387" patch="1">10387</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16194">sun-jsse-improper-validation(16194)</ref>
    </refs>
    <vuln_soft>
      <prod name="jsse" vendor="sun">
        <vers num="1.0.3"/>
        <vers num="1.0.3_01"/>
        <vers num="1.0.3_02"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2394" seq="2004-2394" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Off-by-one error in passwd 0.68 and earlier, when using the --stdin option, causes passwd to use the first 78 characters of a password instead of the first 79, which results in a small reduction of the search space required for brute force attacks.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060" patch="1">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:045" adv="1" patch="1">MDKSA-2004:045</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10370" patch="1">10370</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16178">passwd-stdin-offbyone-bo(16178)</ref>
    </refs>
    <vuln_soft>
      <prod name="mandrake_multi_network_firewall" vendor="mandrakesoft">
        <vers num="8.2"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="8.2" edition=":ppc"/>
        <vers num="9.0"/>
        <vers num="9.1" edition=":ppc"/>
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2395" seq="2004-2395" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Memory leak in passwd 0.68 allows local users to cause a denial of service (memory consumption) via a large number of failed read attempts from the password buffer.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060" adv="1" patch="1">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:045" adv="1" patch="1">MDKSA-2004:045</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10370" patch="1">10370</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16180">passwd-memory-leak(16180)</ref>
    </refs>
    <vuln_soft>
      <prod name="mandrake_multi_network_firewall" vendor="mandrakesoft">
        <vers num="8.2"/>
      </prod>
      <prod name="mandrake_linux" vendor="mandrakesoft">
        <vers num="8.2" edition=":ppc"/>
        <vers num="9.0"/>
        <vers num="9.1" edition=":ppc"/>
        <vers num="9.2" edition=":amd64"/>
        <vers num="10.0"/>
      </prod>
      <prod name="mandrake_linux_corporate_server" vendor="mandrakesoft">
        <vers num="2.1" edition=":x86_64"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2396" seq="2004-2396" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">passwd 0.68 does not check the return code for the pam_start function, which has unknown impact and attack vectors that may prevent "safe and proper operation" of PAM.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060" adv="1" patch="1">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060</ref>
      <ref source="MANDRAKE" url="http://www.mandriva.com/security/advisories?name=MDKSA-2004:045" adv="1" patch="1">MDKSA-2004:045</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10370" patch="1">10370</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16179">passwd-pamstart-improper-validation(16179)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2397" seq="2004-2397" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The web-based Management Console in Blue Coat Security Gateway OS 3.0 through 3.1.3.13 and 3.2.1, when importing a private key, stores the key and its passphrase in plaintext in a log file, which allows attackers to steal digital certificates.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.bluecoat.com/support/knowledge/advisory_private_key_compromise.html" adv="1" patch="1">http://www.bluecoat.com/support/knowledge/advisory_private_key_compromise.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10371" patch="1">10371</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16182">bluecoat-sgos-key-plaintext(16182)</ref>
    </refs>
    <vuln_soft>
      <prod name="security_gateway_os" vendor="bluecoat">
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.2.2"/>
        <vers num="3.1.3.2"/>
        <vers num="3.1.3.7"/>
        <vers num="3.1.3.13"/>
        <vers num="3.2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2398" seq="2004-2398" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Netenberg Fantastico De Luxe 2.8 uses database file names that contain the associated usernames, which allows local users to determine valid usernames and conduct brute force attacks by reading the file names from /var/lib/mysql, which is assigned world-readable permissions by cPanel 9.3.0 R5.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-05/0206.html" adv="1">20040519 Non-logged Brute Force Attack Vulnerability for Fantastico-Created Databases on cPanel Based Hosts</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10390">10390</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16197">cpanel-fantastico-obtain-information(16197)</ref>
    </refs>
    <vuln_soft>
      <prod name="fantastico_de_luxe" vendor="netenberg">
        <vers num="2.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2399" seq="2004-2399" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Secure Computing Corporation Sidewinder G2 6.1.0.01 allows remote attackers to cause a denial of service (CPU consumption) via delayed responses to DNS queries.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.securecomputing.com/pdf/SW61002Rel_Notes_0512.pdf">http://www.securecomputing.com/pdf/SW61002Rel_Notes_0512.pdf</ref>
    </refs>
    <vuln_soft>
      <prod name="sidewinder_g2" vendor="securecomputing">
        <vers num="6.1.0.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2400" seq="2004-2400" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">WinFTP Server 1.6 stores username and password credentials in plaintext in the data\user.wfd file, which allows local users to gain access to the credentials.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012321" adv="1">1012321</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11749">11749</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18247">win-ftp-password-plaintext(18247)</ref>
    </refs>
    <vuln_soft>
      <prod name="winftp_server" vendor="winftp_server">
        <vers num="1.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2401" seq="2004-2401" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Stack-based buffer overflow in Ipswitch IMail Express Web Messaging before 8.05 might allow remote attackers to execute arbitrary code via an HTML message with long "tag text."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.ipswitch.com/kb/IM-20031219-DF01.htm">http://support.ipswitch.com/kb/IM-20031219-DF01.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10106" patch="1">10106</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15841">imail-express-message-bo(15841)</ref>
    </refs>
    <vuln_soft>
      <prod name="imail_express" vendor="ipswitch">
        <vers num="8.03"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2402" seq="2004-2402" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in YaBB.pl in YaBB 1 GOLD SP 1.3.2 allows remote attackers to inject arbitrary web script or HTML via a hex-encoded to parameter.  NOTE: some sources say that the board parameter is affected, but this is incorrect.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-09/0227.html">20040916 RE: www.proboards.com / YaBB XSS Vuln</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11215">11215</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17452">yabb-board-xss(17452)</ref>
    </refs>
    <vuln_soft>
      <prod name="yabb" vendor="yabb">
        <vers num="1.40"/>
        <vers num="1.41"/>
        <vers num="1_gold_-_sp_1"/>
        <vers num="1_gold_-_sp_1.2"/>
        <vers num="1_gold_-_sp_1.3"/>
        <vers num="1_gold_-_sp_1.3.1"/>
        <vers num="1_gold_-_sp_1.3.2"/>
        <vers num="1_gold_release"/>
        <vers num="2000-09-01"/>
        <vers num="2000-09-11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2403" seq="2004-2403" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Cross-site request forgery (CSRF) vulnerability in YaBB 1 GOLD SP 1.3.2 allows remote attackers to perform unauthorized actions as the administrative user via a link or IMG tag to YaBB.pl that specifies the desired action, id, and moda parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-09/0227.html">20040916 RE: www.proboards.com / YaBB XSS Vuln</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11214">11214</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17453">yabb-administrative-bypass(17453)</ref>
    </refs>
    <vuln_soft>
      <prod name="yabb" vendor="yabb">
        <vers num="1.40"/>
        <vers num="1.41"/>
        <vers num="1_gold_-_sp_1"/>
        <vers num="1_gold_-_sp_1.2"/>
        <vers num="1_gold_-_sp_1.3"/>
        <vers num="1_gold_-_sp_1.3.1"/>
        <vers num="1_gold_-_sp_1.3.2"/>
        <vers num="1_gold_release"/>
        <vers num="2000-09-01"/>
        <vers num="2000-09-11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2404" seq="2004-2404" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2004-2347.  Reason: This candidate is a duplicate of CVE-2004-2347.  Notes: All CVE users should reference CVE-2004-2347 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-2405" seq="2004-2405" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in multiple F-Secure Anti-Virus products, including F-Secure Anti-Virus 5.42 and earlier, allows remote attackers to bypass scanning or cause a denial of service (crash or module restart), depending on the product, via a malformed LHA archive.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.f-secure.com/security/fsc-2004-1.shtml" adv="1" patch="1">http://www.f-secure.com/security/fsc-2004-1.shtml</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16258">fsecure-lha-archive-bo(16258)</ref>
    </refs>
    <vuln_soft>
      <prod name="f-secure_anti-virus" vendor="f-secure">
        <vers num="4.52" prev="1" edition=":linux"/>
        <vers num="4.60" edition=":samba_servers"/>
        <vers num="5.42" prev="1" edition=":mimesweeper"/>
        <vers num="5.42" prev="1" edition=":windows_servers"/>
        <vers num="5.42" prev="1" edition=":workstations"/>
        <vers num="5.52" prev="1" edition=":client_security"/>
        <vers num="6.21" prev="1" edition=":ms_exchange"/>
        <vers num="2004" prev="1"/>
      </prod>
      <prod name="f-secure_for_firewalls" vendor="f-secure">
        <vers num="6.20" prev="1"/>
      </prod>
      <prod name="f-secure_internet_security" vendor="f-secure">
        <vers num="2004" prev="1"/>
      </prod>
      <prod name="internet_gatekeeper" vendor="f-secure">
        <vers num="6.32" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2406" seq="2004-2406" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown "overflow" in the phpgw_config table for phpGroupWare before 0.9.14.002 has unknown attack vectors and impact.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=153116" patch="1">http://sourceforge.net/project/shownotes.php?release_id=153116</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.14" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2407" seq="2004-2407" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in phpGroupWare before 0.9.14.002 has unknown attack vectors and impact, related to a "security hole" in the Setup/Config functionality.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=153116" patch="1">http://sourceforge.net/project/shownotes.php?release_id=153116</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.14" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2408" seq="2004-2408" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-07/0040.html" adv="1">20040703 Linux Virtual Server/Secure Context procfs shared permissions flaw</ref>
      <ref source="MISC" url="http://linux-vserver.org/ChangeLog">http://linux-vserver.org/ChangeLog</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010643" adv="1">1010643</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10660" patch="1">10660</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16626">linux-vserver-modify-permissions(16626)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux-vserver" vendor="vserver">
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
        <vers num="1.3.6"/>
        <vers num="1.3.7"/>
        <vers num="1.3.8"/>
        <vers num="1.3.9"/>
        <vers num="1.9.1"/>
        <vers num="1.20"/>
        <vers num="1.21"/>
        <vers num="1.22"/>
        <vers num="1.23"/>
        <vers num="1.24"/>
        <vers num="1.25"/>
        <vers num="1.26"/>
        <vers num="1.27"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2409" seq="2004-2409" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the sh_hash_compdata function for Samhain 1.8.9 through 2.0.1, when running in update mode ("-t update"), might allow attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012142" patch="1">1012142</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11635" patch="1">11635</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18000">samhain-update-bo(18000)</ref>
    </refs>
    <vuln_soft>
      <prod name="samhain" vendor="samhain_labs">
        <vers num="1.8.9"/>
        <vers num="1.8.10"/>
        <vers num="1.8.10a"/>
        <vers num="1.8.10b"/>
        <vers num="1.8.11"/>
        <vers num="1.8.12"/>
        <vers num="1.8.12a"/>
        <vers num="1.8.12b"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2410" seq="2004-2410" published="2004-12-31" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in sh_hash_compdata for Samhain 1.8.9 through 2.0.1 might allow attackers to cause a denial of service (null pointer dereference).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012142" patch="1">1012142</ref>
    </refs>
    <vuln_soft>
      <prod name="samhain" vendor="samhain_labs">
        <vers num="1.8.9"/>
        <vers num="1.8.10"/>
        <vers num="1.8.10a"/>
        <vers num="1.8.10b"/>
        <vers num="1.8.11"/>
        <vers num="1.8.12"/>
        <vers num="1.8.12a"/>
        <vers num="1.8.12b"/>
        <vers num="2.0.0"/>
        <vers num="2.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2411" seq="2004-2411" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The CleanseMessage function in shop$db.asp for VP-ASP Shopping Cart 4.0 through 5.0 does not sufficiently cleanse inputs, which allows remote attackers to conduct cross-site scripting (XSS) attacks that do not use &lt;script> tags, as demonstrated via javascript in IMG tags to (1) the cat parameter in shopdisplayproducts.asp or (2) the msg parameter in shoperror.asp, and possibly other vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0363.html" adv="1" patch="1">20040613 VP-ASP Shopping Cart Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://www.providesecurity.com/research/advisories/06142004-01.asp" adv="1" patch="1">http://www.providesecurity.com/research/advisories/06142004-01.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10530" patch="1">10530</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10534" patch="1">10534</ref>
      <ref source="CONFIRM" url="http://www.vpasp.com/virtprog/info/faq_securityfixes.htm" patch="1">http://www.vpasp.com/virtprog/info/faq_securityfixes.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16411">vpasp-shoperror-xss(16411)</ref>
    </refs>
    <vuln_soft>
      <prod name="vp-asp" vendor="virtual_programming">
        <vers num="4.0"/>
        <vers num="4.50"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2412" seq="2004-2412" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in VP-ASP Shopping Cart 4.0 through 5.0 allow remote attackers to execute arbitrary SQL commands via the catalogid parameter in (1) shopreviewlist.asp and (2) shopreviewadd.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9967" patch="1">9967</ref>
      <ref source="CONFIRM" url="http://www.vpasp.com/virtprog/info/faq_securityfixes.htm" patch="1">http://www.vpasp.com/virtprog/info/faq_securityfixes.htm</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15588">vpasp-catalogid-sql-injection(15588)</ref>
    </refs>
    <vuln_soft>
      <prod name="vp-asp" vendor="virtual_programming">
        <vers num="4.0"/>
        <vers num="4.50"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2413" seq="2004-2413" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in VP-ASP Shopping Cart 4.0 through 5.0 allows remote attackers to execute arbitrary SQL commands via the (1) Processed0 and (2) Processed1 parameters in a POST request to shopproductselect.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0363.html" adv="1" patch="1">20040613 VP-ASP Shopping Cart Multiple Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10536" patch="1">10536</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16400">vpasp-shopproductselect-sql-injection(16400)</ref>
    </refs>
    <vuln_soft>
      <prod name="vp-asp" vendor="virtual_programming">
        <vers num="4.0"/>
        <vers num="4.50"/>
        <vers num="5.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2414" seq="2004-2414" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Novell NetWare 6.5 SP 1.1, when installing or upgrading using the Overlay CDs and performing a custom installation with OpenSSH, includes sensitive password information in the (1) NIOUTPUT.TXT and (2) NI.LOG log files, which might allow local users to obtain the passwords.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm" adv="1" patch="1">http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9934" patch="1">9934</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15600">netware-installation-file-disclosure(15600)</ref>
    </refs>
    <vuln_soft>
      <prod name="netware" vendor="novell">
        <vers num="6.5" edition="sp1.1a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2415" seq="2004-2415" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Davenport before 0.9.10 allows attackers to cause a denial of service (resource consumption) via (1) a very large XML file or (2) entity expansion attacks.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011030" patch="1">1011030</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/mailarchive/forum.php?thread_id=5385243&amp;forum_id=33977">http://sourceforge.net/mailarchive/forum.php?thread_id=5385243&amp;forum_id=33977</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=262497" patch="1">http://sourceforge.net/project/shownotes.php?release_id=262497</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11001" patch="1">11001</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17062">davenport-long-xml-dos(17062)</ref>
    </refs>
    <vuln_soft>
      <prod name="davenport" vendor="davenport">
        <vers num="0.8.0"/>
        <vers num="0.9.0"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2416" seq="2004-2416" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the logging component of CCProxy allows remote attackers to execute arbitrary code via a long HTTP GET request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012189">1012189</ref>
      <ref source="MISC" url="http://www.securiteam.com/exploits/6E0032KBPM.html">http://www.securiteam.com/exploits/6E0032KBPM.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11666">11666</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18012">proxy-server-ccproxy-bo(18012)</ref>
    </refs>
    <vuln_soft>
      <prod name="ccproxy" vendor="youngzsoft">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2417" seq="2004-2417" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in smtp.c for smtp.proxy 1.1.3 and earlier allows remote attackers to execute arbitrary code via format string specifiers in the (1) client hostname or (2) message-id, which are injected into a syslog message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0267.html" adv="1" patch="1">20040610 [0xbadc0ded #04] smtp.proxy &lt;= 1.1.3</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10509">10509</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16378">smtpproxy-format-string(16378)</ref>
    </refs>
    <vuln_soft>
      <prod name="smtp.proxy" vendor="smtp.proxy">
        <vers num="1.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2418" seq="2004-2418" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in SlimFTPd 3.15 and earlier allows local users to execute arbitrary code via a long command, such as (1) CWD, (2) STOR, (3) MKD, and (4) STAT.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-11/0293.html">20041110 [Advisory + Exploit] SlimFTPd &lt;= 3.15</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012167" patch="1">1012167</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11645" patch="1">11645</ref>
      <ref source="CONFIRM" url="http://www.whitsoftdev.com/slimftpd/" adv="1">http://www.whitsoftdev.com/slimftpd/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18014">slimftpd-multiple-command-bo(18014)</ref>
    </refs>
    <vuln_soft>
      <prod name="slimftpd" vendor="whitsoft_development">
        <vers num="3.15"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2419" seq="2004-2419" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Keene Digital Media Server 1.0.2 allows local users to obtain usernames and passwords by reading the dmscore.db file on the local system.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010928" adv="1">1010928</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10933">10933</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16964">keene-plaintext-password(16964)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2420" seq="2004-2420" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Hitachi Job Management Partner (JP1) JP1/File Transmission Server/FTP 6 and 7 allows remote attackers to cause a denial of service (daemon halt) via a port scan involving reset packets.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011024" patch="1">1011024</ref>
      <ref source="CONFIRM" url="http://www.hitachi-support.com/security_e/vuls_e/HS04-005_e/01-e.html">http://www.hitachi-support.com/security_e/vuls_e/HS04-005_e/01-e.html</ref>
      <ref source="CONFIRM" url="http://www.hitachi-support.com/security_e/vuls_e/HS04-005_e/index-e.html">http://www.hitachi-support.com/security_e/vuls_e/HS04-005_e/index-e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11012">11012</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17071">hitachi-jp1ftp-reset-dos(17071)</ref>
    </refs>
    <vuln_soft>
      <prod name="jp1_p-1b41-9461" vendor="hitachi">
        <vers num="06_00_h"/>
        <vers num="06_01_d"/>
        <vers num="06_02-b"/>
        <vers num="06_02_c"/>
      </prod>
      <prod name="jp1_p-1b41-9471" vendor="hitachi">
        <vers num="07_00_a"/>
        <vers num="07_10"/>
        <vers num="07_10_a"/>
      </prod>
      <prod name="jp1_p-1j41-9471" vendor="hitachi">
        <vers num="07_00"/>
        <vers num="07_10"/>
        <vers num="07_10_a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2421" seq="2004-2421" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Hitachi Job Management Partner (JP1) JP1/File Transmission Server/FTP 6 and 7, when running on HP-UX in trusted mode, allows attackers to bypass authentication and gain administrator rights.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011023" patch="1">1011023</ref>
      <ref source="CONFIRM" url="http://www.hitachi-support.com/security_e/vuls_e/HS04-004_e/index-e.html">http://www.hitachi-support.com/security_e/vuls_e/HS04-004_e/index-e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11012">11012</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17074">hitachi-jp1ftp-authentication(17074)</ref>
    </refs>
    <vuln_soft>
      <prod name="jp1_p-1b41-9461" vendor="hitachi">
        <vers num="06_00_h"/>
        <vers num="06_01_d"/>
        <vers num="06_02-b"/>
        <vers num="06_02_c"/>
      </prod>
      <prod name="jp1_p-1b41-9471" vendor="hitachi">
        <vers num="07_00_a"/>
        <vers num="07_10"/>
        <vers num="07_10_a"/>
      </prod>
      <prod name="jp1_p-1j41-9471" vendor="hitachi">
        <vers num="07_00"/>
        <vers num="07_10"/>
        <vers num="07_10_a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2422" seq="2004-2422" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple features in Ipswitch IMail Server before 8.13 allow remote attackers to cause a denial of service (crash) via (1) a long sender field to the Queue Manager or (2) a long To field to the Web Messaging component.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011146">1011146</ref>
      <ref source="CONFIRM" url="http://support.ipswitch.com/kb/IM-20040902-DM01.htm#FIXES">http://support.ipswitch.com/kb/IM-20040902-DM01.htm#FIXES</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11106" patch="1">11106</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17219">ipswitch-queue-manager-dos(17219)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17222">ipswitch-web-messaging-dos(17222)</ref>
    </refs>
    <vuln_soft>
      <prod name="imail" vendor="ipswitch">
        <vers num="5.0"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
        <vers num="5.0.8"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.3"/>
        <vers num="6.4"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
        <vers num="7.0.4"/>
        <vers num="7.0.5"/>
        <vers num="7.0.6"/>
        <vers num="7.0.7"/>
        <vers num="7.1"/>
        <vers num="7.12"/>
        <vers num="8.0.3"/>
        <vers num="8.0.5"/>
        <vers num="8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2423" seq="2004-2423" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in the Web calendaring component of Ipswitch IMail Server before 8.13 allows remote attackers to cause a denial of service (crash) via "specific content."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011146" patch="1">1011146</ref>
      <ref source="CONFIRM" url="http://support.ipswitch.com/kb/IM-20040902-DM01.htm#FIXES">http://support.ipswitch.com/kb/IM-20040902-DM01.htm#FIXES</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11106" patch="1">11106</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17220">ipswitch-web-calendaring-dos(17220)</ref>
    </refs>
    <vuln_soft>
      <prod name="imail" vendor="ipswitch">
        <vers num="5.0"/>
        <vers num="5.0.5"/>
        <vers num="5.0.6"/>
        <vers num="5.0.7"/>
        <vers num="5.0.8"/>
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="6.1"/>
        <vers num="6.2"/>
        <vers num="6.3"/>
        <vers num="6.4"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
        <vers num="7.0.4"/>
        <vers num="7.0.5"/>
        <vers num="7.0.6"/>
        <vers num="7.0.7"/>
        <vers num="7.1"/>
        <vers num="7.12"/>
        <vers num="8.0.3"/>
        <vers num="8.0.5"/>
        <vers num="8.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2424" seq="2004-2424" published="2004-12-31" modified="2017-07-11" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">BEA WebLogic Server and WebLogic Express 8.1 through 8.1 SP2 allow remote attackers to cause a denial of service (network port consumption) via unknown actions in HTTPS sessions, which prevents the server from releasing the network port when the session ends.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/7" adv="1" patch="1">BEA04-61.00</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010492" adv="1" patch="1">1010492</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10544" patch="1">10544</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16419">weblogic-ssl-dos(16419)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="8.1" edition=":express"/>
        <vers num="8.1" edition=":win32"/>
        <vers num="8.1" edition="sp1:express"/>
        <vers num="8.1" edition="sp1:win32"/>
        <vers num="8.1" edition="sp2:express"/>
        <vers num="8.1" edition="sp2:win32"/>
        <vers num="8.1" edition="sp3:express"/>
        <vers num="8.1" edition="sp3:win32"/>
        <vers num="8.1" edition="sp4:express"/>
        <vers num="8.1" edition="sp4:win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2425" seq="2004-2425" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Axis Network Camera 2.40 and earlier, and Video Server 3.12 and earlier, allows remote attackers to execute arbitrary commands via accent (`) and possibly other shell metacharacters in the query string to virtualinput.cgi.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0948.html">20040822 [PoC] Nasty bug(s) found in Axis Network Camera/Video Servers</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/1282.html" adv="1" patch="1">20040831 Axis Network Camera and Video Server Security Advisory</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011056" patch="1">1011056</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11011" patch="1">11011</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17076">asix-command-execution(17076)</ref>
    </refs>
    <vuln_soft>
      <prod name="2100_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2110_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2120_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2130_ptz_network_camera" vendor="axis">
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
      </prod>
      <prod name="230_mpeg2_video_server" vendor="axis">
        <vers num="3.11"/>
      </prod>
      <prod name="2400_video_server" vendor="axis">
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.10"/>
        <vers num="1.11"/>
        <vers num="1.12"/>
        <vers num="1.15"/>
        <vers num="2.0"/>
        <vers num="2.20"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="3.11"/>
        <vers num="3.12"/>
      </prod>
      <prod name="2401_video_server" vendor="axis">
        <vers num="1.0_1"/>
        <vers num="1.15"/>
        <vers num="2.20"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="3.12"/>
        <vers num="3.13"/>
      </prod>
      <prod name="2411_video_server" vendor="axis">
        <vers num="3.12"/>
        <vers num="3.13"/>
      </prod>
      <prod name="2420_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2420_video_server" vendor="axis">
        <vers num="2.32"/>
        <vers num="2.34"/>
      </prod>
      <prod name="2460_network_dvr" vendor="axis">
        <vers num="3.10"/>
        <vers num="3.11"/>
      </prod>
      <prod name="2490_serial_server" vendor="axis">
        <vers num="2.11.3"/>
      </prod>
      <prod name="250s_video_server" vendor="axis">
        <vers num="3.03"/>
        <vers num="3.10"/>
      </prod>
      <prod name="storpoint_cd" vendor="axis">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2426" seq="2004-2426" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Axis Network Camera 2.40 and earlier, and Video Server 3.12 and earlier, allows remote attackers to bypass authentication via a ..  (dot dot) in an HTTP POST request to ServerManager.srv, then use these privileges to conduct other activities, such as modifying files using editcgi.cgi.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0948.html">20040822 [PoC] Nasty bug(s) found in Axis Network Camera/Video Servers</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/1282.html" adv="1" patch="1">20040831 Axis Network Camera and Video Server Security Advisory</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011056" patch="1">1011056</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11011" patch="1">11011</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17079">axis-directory-traversal(17079)</ref>
    </refs>
    <vuln_soft>
      <prod name="2100_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2110_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2120_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2130_ptz_network_camera" vendor="axis">
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
      </prod>
      <prod name="230_mpeg2_video_server" vendor="axis">
        <vers num="3.11"/>
      </prod>
      <prod name="2400_video_server" vendor="axis">
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.10"/>
        <vers num="1.11"/>
        <vers num="1.12"/>
        <vers num="1.15"/>
        <vers num="2.0"/>
        <vers num="2.20"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="3.11"/>
        <vers num="3.12"/>
      </prod>
      <prod name="2401_video_server" vendor="axis">
        <vers num="1.0_1"/>
        <vers num="1.15"/>
        <vers num="2.20"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="3.12"/>
        <vers num="3.13"/>
      </prod>
      <prod name="2411_video_server" vendor="axis">
        <vers num="3.12"/>
        <vers num="3.13"/>
      </prod>
      <prod name="2420_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2420_video_server" vendor="axis">
        <vers num="2.32"/>
        <vers num="2.34"/>
      </prod>
      <prod name="2460_network_dvr" vendor="axis">
        <vers num="3.10"/>
        <vers num="3.11"/>
      </prod>
      <prod name="2490_serial_server" vendor="axis">
        <vers num="2.11.3"/>
      </prod>
      <prod name="250s_video_server" vendor="axis">
        <vers num="3.03"/>
        <vers num="3.10"/>
      </prod>
      <prod name="storpoint_cd" vendor="axis">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2427" seq="2004-2427" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Axis Network Camera 2.40 and earlier, and Video Server 3.12 and earlier, allows remote attackers to obtain sensitive information via direct requests to (1) admin/getparam.cgi, (2) admin/systemlog.cgi, (3) admin/serverreport.cgi, and (4) admin/paramlist.cgi, modify system information via (5) setparam.cgi and (6) factorydefault.cgi, or (7) cause a denial of service (reboot) via restart.cgi.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0948.html">20040822 [PoC] Nasty bug(s) found in Axis Network Camera/Video Servers</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011056">1011056</ref>
    </refs>
    <vuln_soft>
      <prod name="2100_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2110_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2120_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2130_ptz_network_camera" vendor="axis">
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
      </prod>
      <prod name="230_mpeg2_video_server" vendor="axis">
        <vers num="3.11"/>
      </prod>
      <prod name="2400_video_server" vendor="axis">
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.10"/>
        <vers num="1.11"/>
        <vers num="1.12"/>
        <vers num="1.15"/>
        <vers num="2.0"/>
        <vers num="2.20"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="3.11"/>
        <vers num="3.12"/>
      </prod>
      <prod name="2401_video_server" vendor="axis">
        <vers num="1.0_1"/>
        <vers num="1.15"/>
        <vers num="2.20"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="3.12"/>
        <vers num="3.13"/>
      </prod>
      <prod name="2411_video_server" vendor="axis">
        <vers num="3.12"/>
        <vers num="3.13"/>
      </prod>
      <prod name="2420_network_camera" vendor="axis">
        <vers num="2.12"/>
        <vers num="2.30"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.33"/>
        <vers num="2.34"/>
        <vers num="2.40"/>
        <vers num="2.41"/>
      </prod>
      <prod name="2420_video_server" vendor="axis">
        <vers num="2.32"/>
        <vers num="2.34"/>
      </prod>
      <prod name="2460_network_dvr" vendor="axis">
        <vers num="3.10"/>
        <vers num="3.11"/>
      </prod>
      <prod name="2490_serial_server" vendor="axis">
        <vers num="2.11.3"/>
      </prod>
      <prod name="250s_video_server" vendor="axis">
        <vers num="3.03"/>
        <vers num="3.10"/>
      </prod>
      <prod name="storpoint_cd" vendor="axis">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2428" seq="2004-2428" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Abczone.it WWWguestbook 1.1 stores db/dbase.mdb under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as the plaintext username and password.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011026">1011026</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17077">wwwguestbook-url-information-disclosure(17077)</ref>
    </refs>
    <vuln_soft>
      <prod name="wwwguestbook" vendor="abczone.it">
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2429" seq="2004-2429" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple stack-based and heap-based buffer overflows in EnderUNIX spamGuard before 1.7-BETA allow remote attackers to execute arbitrary code via the (1) qmail_parseline and (2) sendmail_parseline functions in parser.c, (3) loadconfig and (4) removespaces functions in loadconfig.c, and possibly (5) unspecified functions in functions.c.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-05/0298.html" adv="1" patch="1">20040528 EnderUNIX Security Anouncement (Isoqlog and Spamguard)</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010342" adv="1" patch="1">1010342</ref>
      <ref source="CONFIRM" url="http://www.enderunix.org/spamguard/spamguard-1.7/CHANGELOG">http://www.enderunix.org/spamguard/spamguard-1.7/CHANGELOG</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10434" patch="1">10434</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16278">spamguard-multiple-bo(16278)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2430" seq="2004-2430" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Trend OfficeScan Corporate Edition 5.58 and possibly earler does not drop privileges when opening a help window from a virus detection pop-up window, which allows local users to gain SYSTEM privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0117.html" adv="1">20040609 Trend Officescan local privilege escalation</ref>
      <ref source="CONFIRM" url="http://uk.trendmicro-europe.com/enterprise/support/knowledge_base_detail.php?solutionId=20118" patch="1">http://uk.trendmicro-europe.com/enterprise/support/knowledge_base_detail.php?solutionId=20118</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10503">10503</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16375">officescan-service-gain-privileges(16375)</ref>
    </refs>
    <vuln_soft>
      <prod name="officescan" vendor="trend_micro">
        <vers num="3.0" edition=":corporate"/>
        <vers num="corporate_3.5"/>
        <vers num="corporate_3.11"/>
        <vers num="corporate_3.13"/>
        <vers num="corporate_3.54"/>
        <vers num="corporate_5.02"/>
        <vers num="corporate_5.5"/>
        <vers num="corporate_5.58"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2431" seq="2004-2431" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in The Ignition Project ignitionServer 0.1.2 through 0.3.1, with the linking service enabled, allows remote attackers to bypass authentication.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10525" patch="1">10525</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16397">ignition-server-password-bypass(16397)</ref>
    </refs>
    <vuln_soft>
      <prod name="ignitionserver" vendor="the_ignition_project">
        <vers num="0.1.2"/>
        <vers num="0.1.2_r2"/>
        <vers num="0.2.1_brc1"/>
        <vers num="0.2.2_brc2"/>
        <vers num="0.2.3_brc3"/>
        <vers num="0.3.1_b1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2432" seq="2004-2432" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">WinAgents TFTP Server 3.0 allows remote attackers to cause a denial of service (crash) via a request for a file with a long file name, possibly due to an off-by-one buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010464" adv="1">1010464</ref>
      <ref source="MISC" url="http://www.packetstormsecurity.org/0406-exploits/WinAgentsTFTP.txt" adv="1">http://www.packetstormsecurity.org/0406-exploits/WinAgentsTFTP.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10526">10526</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16390">winagents-tftp-filename-dos(16390)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2433" seq="2004-2433" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the IsValidFile function in the ADM ActiveX control for Altnet Download Manager 4.0.0.4 and earlier, as used in Kazaa Media Desktop 1.3 through 2.6.4 and Grokkster 1.3 through 2.6, allows remote attackers to execute arbitrary code via a long bstrFilepath parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011155">1011155</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11101" patch="1">11101</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17221">adm-bstrfilepath-bo(17221)</ref>
    </refs>
    <vuln_soft>
      <prod name="altnet_download_manager" vendor="altnet">
        <vers num="4.0.0.2" prev="1"/>
        <vers num="4.0.0.4"/>
      </prod>
      <prod name="grokster" vendor="grokster">
        <vers num="1.3"/>
        <vers num="1.3.3"/>
        <vers num="2.6"/>
      </prod>
      <prod name="kazaa_media_desktop" vendor="kazaa">
        <vers num="1.3"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.6.1"/>
        <vers num="2.0"/>
        <vers num="2.0.2"/>
        <vers num="2.6.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2434" seq="2004-2434" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 6.0 SP1 allows remote attackers to cause a denial of service (browser crash) via a link with "::{" (colon colon left brace), which triggers a null dereference when the user attempts to save the link using "Save As" and Internet Explorer prepares an error message with an attacker-controlled format string.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0397.html" adv="1">20040614 Internet Explorer Remote Null Pointer Crash(mshtml.dll)</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0428.html">20040615 RE: Internet Explorer Remote Null Pointer Crash(mshtml.dll)</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1126.html">20040728 Re: Internet Explorer Remote Null Pointer Crash(mshtml.dll)</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010491" adv="1">1010491</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5IP020KDPU.html" adv="1">http://www.securiteam.com/windowsntfocus/5IP020KDPU.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16420">ie-null-pointer-dos(16420)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2435" seq="2004-2435" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in PeopleSoft Human Resources Management System (HRMS) 7.0, when "web enabled" using HTML Access, allows remote attackers to inject arbitrary web script or HTML via unspecified (1) debugging or (2) utility scripts.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="AUSCERT" url="http://www.auscert.org.au/render.html?it=4419" adv="1">AA-2004.03</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11275">11275</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Sep/1011433.html" adv="1">1011433</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17543">peoplesoft-hrms-xss(17543)</ref>
    </refs>
    <vuln_soft>
      <prod name="hrms" vendor="peoplesoft">
        <vers num="7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2436" seq="2004-2436" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Computer Associates Unicenter Common Services 3.0 and earlier stores the database "SA" password in cleartext in the TndAddNspTmp.bat file, which could allow local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011468">1011468</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11277" patch="1">11277</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17562">unicenter-tndaddnsptmp-information-disclosure(17562)</ref>
    </refs>
    <vuln_soft>
      <prod name="common_services" vendor="ca">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.2"/>
        <vers num="3.0"/>
      </prod>
      <prod name="unicenter_network_and_systems_management" vendor="ca">
        <vers num="3.0"/>
      </prod>
      <prod name="unicenter_serviceplus_service_desk" vendor="ca">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2437" seq="2004-2437" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in PHP-Fusion 4.01 allows remote attackers to execute arbitrary SQL commands via the rowstart parameter to (1) index.php or (2) members.php, or (3) the comment_id parameter to comments.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11296">11296</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17546">phpfusion-sql-injection(17546)</ref>
    </refs>
    <vuln_soft>
      <prod name="php_fusion" vendor="php_fusion">
        <vers num="4.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2438" seq="2004-2438" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in PHP-Fusion 4.01 allows remote attackers to inject arbitrary web script or HTML via the (1) Submit News, (2) Submit Link or (3) Submit Article field.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11296">11296</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17548">phpfusion-submit-xss(17548)</ref>
    </refs>
    <vuln_soft>
      <prod name="php_fusion" vendor="php_fusion">
        <vers num="4.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2439" seq="2004-2439" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The remote upgrade capability in HP LaserJet 4200 and 4300 printers does not require a password, which allows remote attackers to upgrade firmware.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=PSD_HPSBPI01085" adv="1">SSRT4840</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011671" adv="1">1011671</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11297">11297</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17634">hp-laserjet-firmware-upgrade(17634)</ref>
    </refs>
    <vuln_soft>
      <prod name="color_laserjet" vendor="hp">
        <vers num="4650"/>
        <vers num="5500"/>
        <vers num="5550"/>
      </prod>
      <prod name="color_laserjet_4600" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_2500" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_3000" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_3700" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_4100_mfp" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_4200" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_4300" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_9000" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_9000_mfp" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_9040_mpf" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_9050" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_9050_mpf" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_9055" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_9065" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_9500" vendor="hp">
        <vers num=""/>
      </prod>
      <prod name="laserjet_9500_mpf" vendor="hp">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2440" seq="2004-2440" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in cmdline.c in proxytunnel 1.1.3 and earlier allows local users to obtain proxy credentials (username or password) of other users.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011486" patch="1">1011486</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=271699" patch="1">http://sourceforge.net/project/shownotes.php?release_id=271699</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11299" patch="1">11299</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17566">proxytunnel-information-disclosure(17566)</ref>
    </refs>
    <vuln_soft>
      <prod name="proxytunnel" vendor="proxytunnel">
        <vers num="1.0.6"/>
        <vers num="1.1.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2441" seq="2004-2441" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Kerio MailServer before 6.0.3 has unknown impact and unknown remote attack vectors, related to a "potential security issue."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.kerio.com/kms_history.html">http://www.kerio.com/kms_history.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11300" patch="1">11300</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17601">kerio-mailserver(17601)</ref>
    </refs>
    <vuln_soft>
      <prod name="kerio_mailserver" vendor="kerio">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2442" seq="2004-2442" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple interpretation error in various F-Secure Anti-Virus products, including Workstation 5.43 and earlier, Windows Servers 5.50 and earlier, MIMEsweeper 5.50 and earlier, Anti-Virus for Linux Servers and Gateways 4.61 and earlier, and other products, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on the target system.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/p-041.shtml" adv="1">P-041</ref>
      <ref source="CONFIRM" url="http://www.f-secure.com/security/fsc-2004-3.shtml" adv="1" patch="1">http://www.f-secure.com/security/fsc-2004-3.shtml</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/968818" adv="1">VU#968818</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11732" patch="1">11732</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18217">fsecure-zip-scan-bypass(18217)</ref>
    </refs>
    <vuln_soft>
      <prod name="f-secure_anti-virus" vendor="f-secure">
        <vers num="4.51" edition=":linux_gateways"/>
        <vers num="4.51" edition=":linux_servers"/>
        <vers num="4.51" edition=":linux_workstations"/>
        <vers num="4.52" edition=":linux_gateways"/>
        <vers num="4.52" edition=":linux_servers"/>
        <vers num="4.52" edition=":linux_workstations"/>
        <vers num="4.60" edition=":samba_servers"/>
        <vers num="4.61" edition=":linux_gateways"/>
        <vers num="4.61" edition=":linux_servers"/>
        <vers num="5.0" edition=":linux_client_security"/>
        <vers num="5.0" edition=":linux_server_security"/>
        <vers num="5.5" edition=":client_security"/>
        <vers num="5.5" edition=":mimesweeper"/>
        <vers num="5.5" edition=":windows_servers"/>
        <vers num="5.41" edition=":mimesweeper"/>
        <vers num="5.41" edition=":windows_servers"/>
        <vers num="5.41" edition=":workstations"/>
        <vers num="5.42" edition=":mimesweeper"/>
        <vers num="5.42" edition=":windows_servers"/>
        <vers num="5.42" edition=":workstations"/>
        <vers num="5.43" edition=":workstations"/>
        <vers num="5.52" edition=":client_security"/>
        <vers num="5.55" edition=":client_security"/>
        <vers num="6.01" edition=":ms_exchange"/>
        <vers num="6.2" edition=":ms_exchange"/>
        <vers num="6.21" edition=":ms_exchange"/>
        <vers num="6.30" edition=":ms_exchange"/>
        <vers num="6.30_sr1" edition=":ms_exchange"/>
        <vers num="6.31" edition=":ms_exchange"/>
        <vers num="2004"/>
        <vers num="2005"/>
      </prod>
      <prod name="f-secure_for_firewalls" vendor="f-secure">
        <vers num="6.20"/>
      </prod>
      <prod name="f-secure_internet_security" vendor="f-secure">
        <vers num="2004"/>
        <vers num="2005"/>
      </prod>
      <prod name="f-secure_personal_express" vendor="f-secure">
        <vers num="4.5"/>
        <vers num="4.6"/>
        <vers num="4.7"/>
        <vers num="5.0"/>
      </prod>
      <prod name="internet_gatekeeper" vendor="f-secure">
        <vers num="2.6" edition=":linux"/>
        <vers num="6.3"/>
        <vers num="6.4"/>
        <vers num="6.31"/>
        <vers num="6.32"/>
        <vers num="6.41"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2443" seq="2004-2443" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Jaws 0.3 allows remote attackers to bypass authentication and via an HTTP request to admin.php with the logged cookie set to the MD5 hash of a null password, which is compared against the logged session variable by the logged_on function in application.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0226.html" adv="1">20040706 Multiples vulnerabilities in JAWS</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010651" adv="1">1010651</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10670">10670</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16622">jaws-cookie-bypass-authentication(16622)</ref>
    </refs>
    <vuln_soft>
      <prod name="jaws" vendor="jaws">
        <vers num="0.2"/>
        <vers num="0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2444" seq="2004-2444" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in Jaws 0.3 allows remote attackers to inject arbitrary web script or HTML via the action parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0226.html" adv="1" patch="1">20040705 Multiples vulnerabilities in JAWS</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010651" adv="1" patch="1">1010651</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10670" patch="1">10670</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16621">jaws-indexphp-xss(16621)</ref>
    </refs>
    <vuln_soft>
      <prod name="jaws" vendor="jaws">
        <vers num="0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2445" seq="2004-2445" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in index.php in Jaws 0.3 BETA allows remote attackers to view arbitrary files via a .. (dot dot) in the gadget parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0226.html" adv="1">20040705 Multiples vulnerabilities in JAWS</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010651" adv="1" patch="1">1010651</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10670" patch="1">10670</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16620">jaws-index-file-disclosure(16620)</ref>
    </refs>
    <vuln_soft>
      <prod name="jaws" vendor="jaws">
        <vers num="0.3_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2446" seq="2004-2446" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in 1st Class Mail Server 4.01 allows remote attackers to read arbitrary files via a ".." (dot dot) sequences in unknown vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/1st%20Class%20mail%20server%204.01.txt" adv="1">http://members.lycos.co.uk/r34ct/main/1st%20Class%20mail%20server%204.01.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Apr/1009705.html" adv="1">1009705</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10089">10089</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15812">1stclass-dotdot-directory-traversal(15812)</ref>
    </refs>
    <vuln_soft>
      <prod name="1st_class_mail_server" vendor="1st_class_internet_solutions">
        <vers num="4.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2447" seq="2004-2447" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in 1st Class Mail Server 4.01 allows remote attackers to inject arbitrary web script or HTML via the Mailbox parameter to (1) viewmail.tagz, (2) the index script under /user/, (3) members.tagz, (4) general.tagz, (5) advanced.tagz, or (6) list.tagz.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Apr/1009705.html" adv="1">1009705</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10089">10089</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15815">1stclass-multiple-xss(15815)</ref>
    </refs>
    <vuln_soft>
      <prod name="1st_class_mail_server" vendor="1st_class_internet_solutions">
        <vers num="4.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2448" seq="2004-2448" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">S-Mart Shopping Cart or RediCart 3.9.5b stores smart.cfg under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as the database name.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012306">1012306</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18219">smart-cart-information-disclosure(18219)</ref>
    </refs>
    <vuln_soft>
      <prod name="s-mart_shopping_cart" vendor="cassiopeia">
        <vers num=""/>
      </prod>
      <prod name="redicart" vendor="itransact">
        <vers num="3.9.5b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2449" seq="2004-2449" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Roger Wilco 1.4.1.6 and earlier or Roger Wilco Base Station 0.30a and earlier allows remote attackers to cause a denial of service (application crash) via a long, malformed UDP datagram.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/wilco-again-adv.txt">http://aluigi.altervista.org/adv/wilco-again-adv.txt</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0352.html">20040331 RogerWilco: new funny bugs</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10022">10022</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15716">roger-wilco-udp-dos(15716)</ref>
    </refs>
    <vuln_soft>
      <prod name="roger_wilco_dedicated_server" vendor="gamespy">
        <vers num="0.26"/>
        <vers num="0.27"/>
        <vers num="0.28"/>
        <vers num="0.29"/>
        <vers num="0.30a"/>
      </prod>
      <prod name="roger_wilco_graphical_server" vendor="gamespy">
        <vers num="1.4.1.1"/>
        <vers num="1.4.1.2"/>
        <vers num="1.4.1.3"/>
        <vers num="1.4.1.4"/>
        <vers num="1.4.1.5"/>
        <vers num="1.4.1.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2450" seq="2004-2450" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The client and server for Roger Wilco 1.4.1.6 and earlier or Roger Wilco Base Station 0.30a and earlier report sensitive information such as IDs and source IP addresses, which allows remote attackers to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0352.html" adv="1">20040331 RogerWilco: new funny bugs</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10024">10024</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15816">roger-wilco-obtain-information(15816)</ref>
    </refs>
    <vuln_soft>
      <prod name="roger_wilco" vendor="gamespy">
        <vers num="1.4.1.2"/>
        <vers num="1.4.1.6"/>
      </prod>
      <prod name="roger_wilco_dedicated_server" vendor="gamespy">
        <vers num="0.26" edition=":linux_bsd"/>
        <vers num="0.26" edition=":win32"/>
        <vers num="0.27" edition=":linux_bsd"/>
        <vers num="0.27" edition=":win32"/>
        <vers num="0.28" edition=":win32"/>
        <vers num="0.29" edition=":win32"/>
        <vers num="0.30a" edition=":win32"/>
      </prod>
      <prod name="roger_wilco_graphical_server" vendor="gamespy">
        <vers num="1.4.1.1"/>
        <vers num="1.4.1.2"/>
        <vers num="1.4.1.3"/>
        <vers num="1.4.1.4"/>
        <vers num="1.4.1.5"/>
        <vers num="1.4.1.6"/>
      </prod>
      <prod name="roger_wilco_mark" vendor="gamespy">
        <vers num="1d3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2451" seq="2004-2451" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Roger Wilco 1.4.1.6 and earlier, or Roger Wilco Base Station 0.30a or earlier, allows remote attackers to send audio to arbitrary channels, aka the "Voices from the deep" bug.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0352.html" adv="1">20040331 RogerWilco: new funny bugs</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10025">10025</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15819">roger-wilco-audio-access(15819)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2452" seq="2004-2452" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in Hitachi Cosminexus Portal Framework 01-00, 01-01, 01-02, 02-01, 02-02, 02-03, and other versions allows remote attackers to obtain sensitive information in the &lt;ut:cache> tag library.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011171">1011171</ref>
      <ref source="CONFIRM" url="http://www.hitachi-support.com/security_e/vuls_e/HS04-006_e/01-e.html">http://www.hitachi-support.com/security_e/vuls_e/HS04-006_e/01-e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11128">11128</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17278">cosminexus-info-disclosure(17278)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2453" seq="2004-2453" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Tutti Nova 0.10 through 0.12 (Beta) and 0.9.4, when register_globals is enabled, has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=265832" patch="1">http://sourceforge.net/project/shownotes.php?release_id=265832</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11127" patch="1">11127</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17279">tutti-nova-registerglobals-enabled(17279)</ref>
    </refs>
    <vuln_soft>
      <prod name="tutti_nova" vendor="tutti_nova">
        <vers num="0.9.4"/>
        <vers num="0.10_beta"/>
        <vers num="0.11_beta"/>
        <vers num="0.12_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2454" seq="2004-2454" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">aMSN 0.90 for Microsoft Windows allows local users to obtain sensitive information such as hashed passwords from (1) hotlog.htm and (2) config.xml.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010555" adv="1">1010555</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=976450&amp;group_id=54091&amp;atid=472655" adv="1">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=976450&amp;group_id=54091&amp;atid=472655</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16479">amsn-hotlog-obtain-passwords(16479)</ref>
    </refs>
    <vuln_soft>
      <prod name="amsn" vendor="amsn">
        <vers num="0.90"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2455" seq="2004-2455" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Sweex Wireless Broadband Router/Accesspoint 802.11g (LC000060) allows remote attackers to obtain sensitive information and gain privileges by using TFTP to download the nvram file, then extracting the username, password, and other data from the file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0574.html" adv="1">20040512 Sweex 802.11g router/accesspoint config disclosure / remote config</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10339">10339</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/May/1010143.html">1010143</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16140">sweex-router-obtain-information(16140)</ref>
    </refs>
    <vuln_soft>
      <prod name="wireless_broadband_router_accesspoint_802.11g" vendor="sweex">
        <vers num="lc000060"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2456" seq="2004-2456" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in index.php in miniBB 1.7f and earlier allows remote attackers to execute arbitrary SQL commands via the user parameter in a userinfo action.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012164" patch="1">1012164</ref>
      <ref source="MISC" url="http://www.minibb.net/forums/index.php?action=vthread&amp;forum=1&amp;topic=1767">http://www.minibb.net/forums/index.php?action=vthread&amp;forum=1&amp;topic=1767</ref>
      <ref source="CONFIRM" url="http://www.minibb.net/forums/index.php?action=vthread&amp;forum=9&amp;topic=1854" adv="1">http://www.minibb.net/forums/index.php?action=vthread&amp;forum=9&amp;topic=1854</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11688" patch="1">11688</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18080">minibb-user-sql-injection(18080)</ref>
    </refs>
    <vuln_soft>
      <prod name="minibb" vendor="minibb">
        <vers num="1.2"/>
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="1.7"/>
        <vers num="1.7a"/>
        <vers num="1.7c"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2457" seq="2004-2457" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in 3Com OfficeConnect ADSL 11g Router allows remote attackers to cause a denial of service (crash) via a large amount of UDP traffic.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/11685" patch="1">11685</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18081">3com-officeconnect-udp-dos(18081)</ref>
    </refs>
    <vuln_soft>
      <prod name="3crwe754g72-a" vendor="3com">
        <vers num="1.13"/>
        <vers num="1.23"/>
        <vers num="1.24"/>
        <vers num="1.27"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2458" seq="2004-2458" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Open WebMail 2.30 and earlier, when use_syshomedir is disabled or create_syshomedir is enabled, creates new directories before authenticating, which allows remote attackers to create arbitrary directories.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://openwebmail.org/openwebmail/download/cert/patches/SA-04:02/openwebmail.pl.patch" patch="1">http://openwebmail.org/openwebmail/download/cert/patches/SA-04:02/openwebmail.pl.patch</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10087" patch="1">10087</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15822">open-webmail-directory-creation(15822)</ref>
    </refs>
    <vuln_soft>
      <prod name="open_webmail" vendor="open_webmail">
        <vers num="1.7"/>
        <vers num="1.8"/>
        <vers num="1.71"/>
        <vers num="1.81"/>
        <vers num="1.90"/>
        <vers num="2.30"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2459" seq="2004-2459" published="2004-12-31" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unknown vulnerability in gnubiff 1.2.0 and earlier allows local users to obtain passwords, related to the password table.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=94176&amp;release_id=248016" patch="1">http://sourceforge.net/project/shownotes.php?group_id=94176&amp;release_id=248016</ref>
    </refs>
    <vuln_soft>
      <prod name="gnubiff" vendor="gnu">
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.10"/>
        <vers num="1.2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2460" seq="2004-2460" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unknown vulnerability in POP3 in gnubiff before 2.0.0 allows remote attackers to cause a denial of service (application crash) via an "infinite" Unique IDentification Listing (UIDL) list.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gnubiff.sourceforge.net/changelog.php">http://gnubiff.sourceforge.net/changelog.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11123" patch="1">11123</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17282">gnubiff-pop3-dos(17282)</ref>
    </refs>
    <vuln_soft>
      <prod name="gnubiff" vendor="gnu">
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.10"/>
        <vers num="1.2.0"/>
        <vers num="1.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2461" seq="2004-2461" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in pop3.c in gnubiff before 2.0.0 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gnubiff.sourceforge.net/changelog.php">http://gnubiff.sourceforge.net/changelog.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11123" patch="1">11123</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17282">gnubiff-pop3-dos(17282)</ref>
    </refs>
    <vuln_soft>
      <prod name="gnubiff" vendor="gnu">
        <vers num="1.0.3"/>
        <vers num="1.0.4"/>
        <vers num="1.0.5"/>
        <vers num="1.0.6"/>
        <vers num="1.0.7"/>
        <vers num="1.0.8"/>
        <vers num="1.0.9"/>
        <vers num="1.0.10"/>
        <vers num="1.2.0"/>
        <vers num="1.4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2462" seq="2004-2462" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">cplay 1.49 on Linux allows local users to overwrite arbitrary files via a symlink attack on the cplay_control temporary file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Jun/1010574.html">1010574</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10597">10597</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16482">cplay-tmpfile-insecure(16482)</ref>
    </refs>
    <vuln_soft>
      <prod name="cplay" vendor="cplay">
        <vers num="1.49"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2463" seq="2004-2463" published="2004-12-31" modified="2018-08-13" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in ADA Image Server (ImgSvr) 0.4 allows remote attackers to cause a denial of service (web server crash) or execute arbitrary code via a long GET request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/ADA%20Image%20Server%20(ImgSvr)%200.4.txt">http://members.lycos.co.uk/r34ct/main/ADA%20Image%20Server%20(ImgSvr)%200.4.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10046">10046</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15827">img-svr-get-bo(15827)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16679">imgsvr-get-bo(16679)</ref>
    </refs>
    <vuln_soft>
      <prod name="imgsvr" vendor="ada">
        <vers num="0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2464" seq="2004-2464" published="2004-12-31" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in ADA Image Server (ImgSvr) 0.4 allows remote attackers to read arbitrary files or list directories via hex-encoded "..//" sequences ("%2e%2e%2f%2f").  NOTE: it was later reported that 0.6.21 and earlier is also affected.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/ADA%20Image%20Server%20(ImgSvr)%200.4.txt">http://members.lycos.co.uk/r34ct/main/ADA%20Image%20Server%20(ImgSvr)%200.4.txt</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/485490/100/100/threaded">20071224 Double directory traversal in ImgSvr 0.6.21</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10048">10048</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16680">imgsvr-dotdot-directory-traversal(16680)</ref>
    </refs>
    <vuln_soft>
      <prod name="imgsvr" vendor="ada">
        <vers num="0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2465" seq="2004-2465" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in chat.ghp in Easy Chat Server 1.2 allows remote attackers to inject arbitrary web script or HTML via the username parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16634">easychat-chatghp-xss(16634)</ref>
    </refs>
    <vuln_soft>
      <prod name="easy_chat_server" vendor="efs_software">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2466" seq="2004-2466" published="2004-12-31" modified="2017-10-18" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">chat.ghp in Easy Chat Server 1.2 allows remote attackers to cause a denial of service (server crash) via a long username parameter, possibly due to a buffer overflow.  NOTE: it was later reported that 2.2 is also affected.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-07/0013.html" adv="1">20040702 Multiple Vulnerabilities in Easy Chat Server 1.2</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0077.html" adv="1">20040702 Multiple Vulnerabilities in Easy Chat Server 1.2</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/EasyChatServer1.2-adv.txt" adv="1">http://www.autistici.org/fdonato/advisory/EasyChatServer1.2-adv.txt</ref>
      <ref source="EXPLOIT-DB" url="http://www.exploit-db.com/exploits/33326">33326</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/25328">25328</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/67384">67384</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2007/2901">ADV-2007-2901</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16629">easychat-chatghp-username-dos(16629)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/36013">easychatserver-username-dos(36013)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4289">4289</ref>
    </refs>
    <vuln_soft>
      <prod name="easy_chat_server" vendor="efs_software">
        <vers num="1.2"/>
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2467" seq="2004-2467" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">chat.ghp in Easy Chat Server 1.2 allows remote attackers to add a large number of fake users, then eventually cause a denial of service (server crash).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-07/0013.html" adv="1">20040702 Multiple Vulnerabilities in Easy Chat Server 1.2</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0077.html" adv="1">20040702 Multiple Vulnerabilities in Easy Chat Server 1.2</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/EasyChatServer1.2-adv.txt" adv="1">http://www.autistici.org/fdonato/advisory/EasyChatServer1.2-adv.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16633">easychat-multiple-chatghp-dos(16633)</ref>
    </refs>
    <vuln_soft>
      <prod name="easy_chat_server" vendor="efs_software">
        <vers num="1.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2468" seq="2004-2468" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in SillySearch 2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the search parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Mar/1009598.html" adv="1" patch="1">1009598</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15683">sillysearch-search-xss(15683)</ref>
    </refs>
    <vuln_soft>
      <prod name="sillysearch" vendor="scripts_for_educators">
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2469" seq="2004-2469" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Reservation.class.php for phpScheduleIt 1.01 and earlier allows attackers to modify or delete reservations.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Nov/1012246.html" patch="1">1012246</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1051841&amp;group_id=95547&amp;atid=611778">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1051841&amp;group_id=95547&amp;atid=611778</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11690" patch="1">11690</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18089">phpscheduleit-restrictions-bypass(18089)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpscheduleit" vendor="brickhost">
        <vers num="1.0"/>
        <vers num="1.0_rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2470" seq="2004-2470" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in MadBMS before 1.1.5 has unknown impact and attack vectors, related to logins.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://test.madgenius.com/madBMS/ChangeLog">http://test.madgenius.com/madBMS/ChangeLog</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10018" patch="1">10018</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15684">madbms-login(15684)</ref>
    </refs>
    <vuln_soft>
      <prod name="madbms" vendor="madbms">
        <vers num="1.0"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
        <vers num="1.1.2"/>
        <vers num="1.1.3"/>
        <vers num="1.1.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2471" seq="2004-2471" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the sloth TCL script in QuoteEngine before 1.2.0 allow remote attackers to execute arbitrary SQL commands via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=227554" patch="1">http://sourceforge.net/project/shownotes.php?release_id=227554</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10017" patch="1">10017</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15685">quoteengine-sql-injection(15685)</ref>
    </refs>
    <vuln_soft>
      <prod name="quoteengine" vendor="jamesoff">
        <vers num="1.0"/>
        <vers num="1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2472" seq="2004-2472" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Agnitum Outpost Pro Firewall 2.1 allows remote attackers to cause a denial of service (CPU consumption) via a flood of small, invalid packets, which can not be processed quickly enough by Outpost Pro.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/May/1010151.html">1010151</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5FP0E0KCUW.html">http://www.securiteam.com/windowsntfocus/5FP0E0KCUW.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10338">10338</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16133">outpost-packet-dos(16133)</ref>
    </refs>
    <vuln_soft>
      <prod name="outpost_firewall" vendor="agnitum">
        <vers num="2.1" edition=":pro"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2473" seq="2004-2473" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="1.2" CVSS_base_score="1.2" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">wmFrog weather monitor 0.1.6 and other versions before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294352">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294352</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=516070&amp;group_id=67429">http://sourceforge.net/project/shownotes.php?release_id=516070&amp;group_id=67429</ref>
      <ref source="CONFIRM" url="http://wmfrog.svn.sourceforge.net/svnroot/wmfrog/wmfrog/CHANGES">http://wmfrog.svn.sourceforge.net/svnroot/wmfrog/wmfrog/CHANGES</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11743">11743</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/24504">24504</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2007/2238" adv="1">ADV-2007-2238</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18232">wmfrog-symlink(18232)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/34924">wmfrog-wmfrog-symlink(34924)</ref>
    </refs>
    <vuln_soft>
      <prod name="wmfrog" vendor="wmfrog">
        <vers num="0.1.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2474" seq="2004-2474" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in PHPNews 1.2.3 allows remote attackers to execute arbitrary SQL commands via the mid parameter to sendtofriend.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://newsphp.sourceforge.net/changelog/changelog_1.24.txt">http://newsphp.sourceforge.net/changelog/changelog_1.24.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11748" patch="1">11748</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18233">phpnews-sendtofriend-sql-injection(18233)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpnews" vendor="phpnews">
        <vers num="1.2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2475" seq="2004-2475" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Google Toolbar 2.0.114.1 allows remote attackers to inject arbitrary web script via about.html in the About section.  NOTE: some followup posts suggest that the demonstration code's use of the res:// protocol does not cross privilege boundaries, since it is not allowed in the Internet Zone. Thus this might not be a vulnerability.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-09/0226.html">20040917 GoogleToolbar:About -- Allows Script Injection</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0629.html">20040918 Re: GoogleToolbar:About -- Allows Script Injection</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0639.html">20040918 Re: GoogleToolbar:About -- Allows Script Injection</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011351">1011351</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11210">11210</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17435">google-toolbar-about-code-execution(17435)</ref>
    </refs>
    <vuln_soft>
      <prod name="toolbar" vendor="google">
        <vers num="1.1.41"/>
        <vers num="1.1.42"/>
        <vers num="1.1.43"/>
        <vers num="1.1.44"/>
        <vers num="1.1.45"/>
        <vers num="1.1.47"/>
        <vers num="1.1.48"/>
        <vers num="1.1.49"/>
        <vers num="1.1.53"/>
        <vers num="1.1.54"/>
        <vers num="1.1.55"/>
        <vers num="1.1.56"/>
        <vers num="1.1.57"/>
        <vers num="1.1.58"/>
        <vers num="1.1.59"/>
        <vers num="1.1.60"/>
        <vers num="2.0.114.1" edition=":big_en_ggld"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2476" seq="2004-2476" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Microsoft Internet Explorer 6.0 allows remote attackers to cause a denial of service (infinite loop and crash) via an IFRAME with "?" as the file source.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-04/0061.html">20040406 Kerio Personal Firewall 4 and IE 6 "Bug"</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-04/0080.html">20040407 Internet Explorer 6 -  Crash</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10073">10073</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15832">ie-iframe-dos(15832)</ref>
    </refs>
    <vuln_soft>
      <prod name="ie" vendor="microsoft">
        <vers num="6.0.2800"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2477" seq="2004-2477" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">DiamondCS Process Guard Free 2.000 allows local users to disable the process guard protection system by overwriting the current Service Descriptor Table (SDT) in \device\physicalmemory with the original SDT found in ntoskrnl.exe.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.security.org.sg/vuln/procguard.html">http://www.security.org.sg/vuln/procguard.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10675">10675</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Jul/1010662.html">1010662</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16654">diamondcs-process-guard-disable-protection(16654)</ref>
    </refs>
    <vuln_soft>
      <prod name="process_guard_free" vendor="diamondcs">
        <vers num="2.000"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2478" seq="2004-2478" published="2004-12-31" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Jetty HTTP Server, as used in (1) IBM Trading Partner Interchange before 4.2.4, (2) CA Unicenter Web Services Distributed Management (WSDM) before 3.11, and possibly other products, allows remote attackers to read arbitrary files via a .. (dot dot) in the URL.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049846.html">20061003 [CAID 34661]: CA Unicenter WSDM File System Read Access Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011545">1011545</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1016975">1016975</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/447648/100/0/threaded">20061003 [CAID 34661]: CA Unicenter WSDM File System Read Access Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11330">11330</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2006/3873" adv="1">ADV-2006-3873</ref>
      <ref source="MISC" url="http://www-1.ibm.com/support/docview.wss?uid=swg21178665" adv="1">http://www-1.ibm.com/support/docview.wss?uid=swg21178665</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17600">trading-partner-gain-access(17600)</ref>
    </refs>
    <vuln_soft>
      <prod name="unicenter_web_services_distributed_management" vendor="ca">
        <vers num="3.1" prev="1"/>
      </prod>
      <prod name="trading_partner_interchange" vendor="ibm">
        <vers num="4.2.1"/>
        <vers num="4.2.2" prev="1"/>
      </prod>
      <prod name="jetty_http_server" vendor="jetty">
        <vers num="3.1.6"/>
        <vers num="3.1.7"/>
        <vers num="4.1.0"/>
        <vers num="4.1.0_rc4"/>
        <vers num="4.1.1"/>
        <vers num="4.2.4"/>
        <vers num="4.2.5"/>
        <vers num="4.2.6"/>
        <vers num="4.2.7"/>
        <vers num="4.2.9"/>
        <vers num="4.2.11"/>
        <vers num="4.2.12"/>
        <vers num="4.2.14"/>
        <vers num="4.2.15"/>
        <vers num="4.2.16"/>
        <vers num="4.2.17"/>
        <vers num="4.2.18"/>
        <vers num="4.2.19"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2479" seq="2004-2479" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Squid Web Proxy Cache 2.5 might allow remote attackers to obtain sensitive information via URLs containing invalid hostnames that cause DNS operations to fail, which results in references to previously used error messages.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FEDORA" url="http://fedoranews.org/updates/FEDORA--.shtml">FLSA-2006:152809</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012466" patch="1">1012466</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2005-766.html">RHSA-2005:766</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11865" patch="1">11865</ref>
      <ref source="CONFIRM" url="http://www.squid-cache.org/bugs/show_bug.cgi?id=1143" patch="1">http://www.squid-cache.org/bugs/show_bug.cgi?id=1143</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18406">squid-hostname-obtain-info(18406)</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9711">oval:org.mitre.oval:def:9711</ref>
    </refs>
    <vuln_soft>
      <prod name="squid_web_proxy_cache" vendor="national_science_foundation">
        <vers num="2.5_stable1"/>
        <vers num="2.5_stable2"/>
        <vers num="2.5_stable3"/>
        <vers num="2.5_stable4"/>
        <vers num="2.5_stable5"/>
        <vers num="2.5_stable6"/>
        <vers num="2.5_stable7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2480" seq="2004-2480" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Squid Web Proxy Cache 2.3.STABLE5 allows remote attackers to bypass security controls and access arbitrary websites via "@@" sequences in a URL within Internet Explorer.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-05/0070.html">20040510 a litle bypass with IE</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10315">10315</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16153">squid-url-bypass-security(16153)</ref>
    </refs>
    <vuln_soft>
      <prod name="squid_web_proxy_cache" vendor="national_science_foundation">
        <vers num="2.3_stable5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2481" seq="2004-2481" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">MyProxy 6.58 allows remote authenticated users in the Users Tab to connect to arbitrary hosts from the MyProxy server, possibly bypassing access restrictions, by connecting to the proxy and issuing a CONNECT command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Nov/1012322.html" adv="1">1012322</ref>
      <ref source="MISC" url="http://www.securitylab.ru/vulnerability/source/210758.php" adv="1">http://www.securitylab.ru/vulnerability/source/210758.php</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18265">myproxy-connect-gain-access(18265)</ref>
    </refs>
    <vuln_soft>
      <prod name="myproxy" vendor="myproxy">
        <vers num="6.58"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2482" seq="2004-2482" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Microsoft Outlook 2000 and 2003, when configured to use Microsoft Word 2000 or 2003 as the e-mail editor and when forwarding e-mail, does not properly handle an opening OBJECT tag that does not have a closing OBJECT tag, which causes Outlook to automatically download the URI in the data property of the OBJECT tag and might allow remote attackers to execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/368492" adv="1">20040708 Microsoft Word Email Object Data Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10683">10683</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16663">microsoft-object-gain-access(16663)</ref>
    </refs>
    <vuln_soft>
      <prod name="outlook" vendor="microsoft">
        <vers num="2000"/>
        <vers num="2003"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2483" seq="2004-2483" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss).</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.kerio.com/security_advisory.html" adv="1">http://www.kerio.com/security_advisory.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11870">11870</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18410">kerio-winroute-dns-cache-poisoning(18410)</ref>
    </refs>
    <vuln_soft>
      <prod name="winroute_firewall" vendor="kerio">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="6.0.7"/>
        <vers num="6.0.8"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2484" seq="2004-2484" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in PHP Gift Registry 1.3.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the message parameter to (1) event.php or (2) index.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/phpgiftreg/src/event.php?r1=1.4&amp;r2=1.5">http://cvs.sourceforge.net/viewcvs.py/phpgiftreg/src/event.php?r1=1.4&amp;r2=1.5</ref>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/phpgiftreg/src/index.php?r1=1.20&amp;r2=1.21">http://cvs.sourceforge.net/viewcvs.py/phpgiftreg/src/index.php?r1=1.20&amp;r2=1.21</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=288731" patch="1">http://sourceforge.net/project/shownotes.php?release_id=288731</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11879" patch="1">11879</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18412">phpgiftregistry-message-xss(18412)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgiftreg" vendor="php_gift_registry">
        <vers num="1.0.2"/>
        <vers num="1.1.0"/>
        <vers num="1.2.0"/>
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2485" seq="2004-2485" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in PHP Live! before 2.8.2, due to a "major security problem," allows remote attackers to include arbitrary files and directories via unspecified attack vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://archives.neohapsis.com/archives/apps/freshmeat/2004-11/0022.html">[fm-news] 20041123 Newsletter for Monday, November 22nd 2004</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012467">1012467</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11863">11863</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18414">php-live(18414)</ref>
    </refs>
    <vuln_soft>
      <prod name="php_live" vendor="php_live">
        <vers num="2.8.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2486" seq="2004-2486" published="2004-12-31" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The DSS verification code in Dropbear SSH Server before 0.43 frees uninitialized variables, which might allow remote attackers to gain access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://matt.ucc.asn.au/dropbear/CHANGES" adv="1">http://matt.ucc.asn.au/dropbear/CHANGES</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml" adv="1">20080213 Cisco Unified IP Phone Overflow and Denial of Service Vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10803" adv="1">10803</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2008/0543" adv="1">ADV-2008-0543</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16810" adv="1">dropbear-dss-code-execution(16810)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40490" adv="1">cisco-unifiedipphone-ssh-bo(40490)</ref>
    </refs>
    <vuln_soft>
      <prod name="dropbear_ssh" vendor="dropbear_ssh_project">
        <vers num="0.28"/>
        <vers num="0.29"/>
        <vers num="0.30"/>
        <vers num="0.31"/>
        <vers num="0.32"/>
        <vers num="0.33"/>
        <vers num="0.34"/>
        <vers num="0.35"/>
        <vers num="0.36"/>
        <vers num="0.37"/>
        <vers num="0.38"/>
        <vers num="0.39"/>
        <vers num="0.40"/>
        <vers num="0.41"/>
        <vers num="0.42"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2487" seq="2004-2487" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Nexgen FTP Server before 2.2.3.23 allows remote authenticated users to read or list arbitrary files via (1) "..", (2) "\..\" (backslash dot dot), or (3) "/../" sequences in (a) RETR (get), (b) NLST (ls), (c) LIST (ls), (d) RNFR, or (e) RNTO FTP commands.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.nexgenserver.com/cgi-bin/loadframe2.cgi?/History.html">http://www.nexgenserver.com/cgi-bin/loadframe2.cgi?/History.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9970" patch="1">9970</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Mar/1009545.html">1009545</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15594">nexgen-dotdot-directory-traversal(15594)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2488" seq="2004-2488" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Nexgen FTP Server before 2.2.3.23 allows remote authenticated users to read or list arbitrary files via "C:" sequences in the (1) RETR (get), (2) NLST (ls), (3) LIST (ls), (4) RNFR, or (5) RNTO FTP commands.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.nexgenserver.com/cgi-bin/loadframe2.cgi?/History.html">http://www.nexgenserver.com/cgi-bin/loadframe2.cgi?/History.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9970" patch="1">9970</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Mar/1009545.html">1009545</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15594">nexgen-dotdot-directory-traversal(15594)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2489" seq="2004-2489" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in IBM Informix Dynamic Server (IDS) before 9.40.xC3 allows local users to execute arbitrary code via a modified INFORMIXDIR environment variable that points to a file with format string specifiers in the filename.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107524391217364&amp;w=2">20030314 SRT2004-01-18-0747 - IBM Informix IDS 9.4 contains multiple vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9511" patch="1">9511</ref>
      <ref source="MISC" url="http://www-1.ibm.com/support/docview.wss?uid=swg21153336" adv="1">http://www-1.ibm.com/support/docview.wss?uid=swg21153336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14967">informix-informixdir-format-string(14967)</ref>
    </refs>
    <vuln_soft>
      <prod name="informix_dynamic_server" vendor="ibm">
        <vers num="9.40.uc1"/>
        <vers num="9.40.uc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2490" seq="2004-2490" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in IBM Informix Dynamic Server (IDS) 9.40.xC1 and 9.40.xC2 allows local users to execute arbitrary code via a long GL_PATH environment variable.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=107524391217364&amp;w=2">20030314 SRT2004-01-18-0747 - IBM Informix IDS 9.4 contains multiple vulnerabilities</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9511">9511</ref>
      <ref source="MISC" url="http://www-1.ibm.com/support/docview.wss?uid=swg21153336" adv="1">http://www-1.ibm.com/support/docview.wss?uid=swg21153336</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14949">informix-ids-glpath-bo(14949)</ref>
    </refs>
    <vuln_soft>
      <prod name="informix_dynamic_server" vendor="ibm">
        <vers num="9.40.uc1"/>
        <vers num="9.40.uc2"/>
      </prod>
      <prod name="informix_extended_parallel_server" vendor="ibm">
        <vers num="8.40_uc1"/>
        <vers num="8.40_uc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2491" seq="2004-2491" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">A race condition in Opera web browser 7.53 Build 3850 causes Opera to fill in the address bar before the page has been loaded, which allows remote attackers to spoof the URL in the address bar via the window.open and location.replace HTML parameters, which facilitates phishing attacks.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1056.html">20040726 Opera 7.53 (Build 3850) Address Bar Spoofing Issue</ref>
      <ref source="CONFIRM" url="http://www.opera.com/windows/changelogs/754/" patch="1">http://www.opera.com/windows/changelogs/754/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10810" patch="1">10810</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16816">opera-addressbar-spoofing(16816)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="7.53_build_3850"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2492" seq="2004-2492" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Groupmax World Wide Web (GmaxWWW) Desktop 5, 6, and Desktop for Jichitai 6, allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.hitachi-support.com/security_e/vuls_e/HS04-007_e/01-e.html" patch="1">http://www.hitachi-support.com/security_e/vuls_e/HS04-007_e/01-e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11773">11773</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18277">groupmax-query-xss(18277)</ref>
    </refs>
    <vuln_soft>
      <prod name="groupmax_world_wide_web_desktop" vendor="hitachi">
        <vers num="05_00"/>
        <vers num="05_11_f"/>
        <vers num="05_11_i"/>
        <vers num="05_11_j"/>
        <vers num="06_00"/>
        <vers num="06_50_b"/>
        <vers num="06_50_c"/>
        <vers num="06_51" edition=":jichitai"/>
        <vers num="06_51_b"/>
        <vers num="06_51_c"/>
        <vers num="06_52" edition=":jichitai"/>
        <vers num="06_52_b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2493" seq="2004-2493" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Groupmax World Wide Web (GmaxWWW) 2 and 3, and Desktop 5, 6, and Desktop for Jichitai allows remote authenticated users to read arbitrary .html files via the template name parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.hitachi-support.com/security_e/vuls_e/HS04-007_e/01-e.html" adv="1" patch="1">http://www.hitachi-support.com/security_e/vuls_e/HS04-007_e/01-e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11773">11773</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18278">groupmax-directory-traversal(18278)</ref>
    </refs>
    <vuln_soft>
      <prod name="groupmax_world_wide_web" vendor="hitachi">
        <vers num="2"/>
        <vers num="02_00"/>
        <vers num="02_20"/>
        <vers num="02_20_a"/>
        <vers num="02_31_i"/>
        <vers num="3"/>
        <vers num="03_00"/>
        <vers num="03_10_h"/>
        <vers num="03_11_b"/>
      </prod>
      <prod name="groupmax_world_wide_web_desktop" vendor="hitachi">
        <vers num="5"/>
        <vers num="05_00"/>
        <vers num="05_11_f"/>
        <vers num="05_11_i"/>
        <vers num="05_11_j"/>
        <vers num="6"/>
        <vers num="06_00"/>
        <vers num="06_50_b"/>
        <vers num="06_50_c"/>
        <vers num="06_51" edition=":jichitai"/>
        <vers num="06_51_b"/>
        <vers num="06_51_c"/>
        <vers num="06_52" edition=":jichitai"/>
        <vers num="06_52_b"/>
        <vers num="gold" edition=":jichitai"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2494" seq="2004-2494" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in _error in Ability Mail Server 1.18 allows remote attackers to inject arbitrary web script or HTML via the erromsg parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/Ability_mail_server_1.18.txt" adv="1">http://members.lycos.co.uk/r34ct/main/Ability_mail_server_1.18.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010672" adv="1">1010672</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10695">10695</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16676">ability-errormsg-xss(16676)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2495" seq="2004-2495" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The (1) Webmail, (2) admin, and (3) SMTP services in Ability Mail Server 1.18 allow remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous connections to the service.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/Ability_mail_server_1.18.txt" adv="1">http://members.lycos.co.uk/r34ct/main/Ability_mail_server_1.18.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010672" adv="1">1010672</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10695">10695</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16677">ability-mult-connection-dos(16677)</ref>
    </refs>
    <vuln_soft>
      <prod name="ability_mail_server" vendor="code-crafters">
        <vers num="1.18"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2496" seq="2004-2496" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The HTTP daemon in OpenText FirstClass 7.1 and 8.0 allows remote attackers to cause a denial of service (service availability loss) via a large number of POST requests to /Search.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-12/0321.html" adv="1">20041214 OpenText FirstClass 8.0 HTTP Daemon /Search Remote DoS Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012478">1012478</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11877">11877</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18424">firstclass-dos(18424)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2497" seq="2004-2497" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the error handler in Hitachi Web Page Generator and Web Page Generator Enterprise 4.01 and earlier, when using the default error template and debug mode is set to ON, allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.hitachi-support.com/security_e/vuls_e/HS04-003_e/index-e.html" adv="1">http://www.hitachi-support.com/security_e/vuls_e/HS04-003_e/index-e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10818">10818</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16822">web-page-generator-xss(16822)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_page_generator" vendor="hitachi">
        <vers num="01_00"/>
        <vers num="01_01_c"/>
        <vers num="02_00"/>
        <vers num="02_00_c"/>
      </prod>
      <prod name="web_page_generator_enterprise" vendor="hitachi">
        <vers num="03_00"/>
        <vers num="03_02_c"/>
        <vers num="03_03"/>
        <vers num="03_03_c"/>
        <vers num="03_03_d"/>
        <vers num="04_00"/>
        <vers num="04_00_c"/>
        <vers num="04_01"/>
        <vers num="04_01_b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2498" seq="2004-2498" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the error handler in Hitachi Web Page Generator and Web Page Generator Enterprise 4.01 and earlier, when using the default error template and debug mode is set to ON, allows remote attackers to determine internal directory structures via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.hitachi-support.com/security_e/vuls_e/HS04-003_e/index-e.html" adv="1">http://www.hitachi-support.com/security_e/vuls_e/HS04-003_e/index-e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10818">10818</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16822">web-page-generator-xss(16822)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2499" seq="2004-2499" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Hitachi Web Page Generator and Web Page Generator Enterprise 4.01 and earlier allows remote attackers to cause a denial of service via unknown attack vectors when a web site is "improperly accessed."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.hitachi-support.com/security_e/vuls_e/HS04-002_e/index-e.html" adv="1">http://www.hitachi-support.com/security_e/vuls_e/HS04-002_e/index-e.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10817">10817</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16821">web-page-generator-dos(16821)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2500" seq="2004-2500" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in IlohaMail before 0.8.14-rc1 has unknown impact and attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=54027&amp;release_id=288409" patch="1">http://sourceforge.net/project/shownotes.php?group_id=54027&amp;release_id=288409</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11872" patch="1">11872</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18426">Ilohamail(18426)</ref>
    </refs>
    <vuln_soft>
      <prod name="ilohamail" vendor="ilohamail">
        <vers num="0.7.0"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.7.3"/>
        <vers num="0.7.4"/>
        <vers num="0.7.4.2"/>
        <vers num="0.7.5"/>
        <vers num="0.7.6"/>
        <vers num="0.7.7"/>
        <vers num="0.7.8"/>
        <vers num="0.7.9"/>
        <vers num="0.8.6"/>
        <vers num="0.8.7"/>
        <vers num="0.8.8"/>
        <vers num="0.8.9"/>
        <vers num="0.8.10"/>
        <vers num="0.8.11"/>
        <vers num="0.8.12"/>
        <vers num="0.8.13"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2501" seq="2004-2501" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote attackers to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.html" adv="1" patch="1">20041125 Remote buffer overflow in MailEnable IMAP service [Hat-Squad Advisory]</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012327" adv="1" patch="1">1012327</ref>
      <ref source="MISC" url="http://www.hat-squad.com/en/000102.html" adv="1" patch="1">http://www.hat-squad.com/en/000102.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11755" patch="1">11755</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18285">mailenable-imap-bo(18285)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18286">mailenable-imap-code-execution(18286)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailenable_enterprise" vendor="mailenable">
        <vers num="1.01"/>
      </prod>
      <prod name="mailenable_professional" vendor="mailenable">
        <vers num="1.52"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2502" seq="2004-2502" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">im-switch before 11.4-46.1 in Fedora Core 2 allows local users to overwrite arbitrary files via a symlink attack on the imswitcher[PID] temporary file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=126940">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=126940</ref>
      <ref source="MISC" url="http://packetstormsecurity.org/0407-advisories/fedora_im-switch_tempfile_race.txt" adv="1">http://packetstormsecurity.org/0407-advisories/fedora_im-switch_tempfile_race.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10717" patch="1">10717</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16682">fedora-imswitch-symlink(16682)</ref>
    </refs>
    <vuln_soft>
      <prod name="im-switch" vendor="im-switch">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2503" seq="2004-2503" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">INweb Mail Server 2.40 allows remote attackers to cause a denial of service (crash) via a large number of connect/disconnect actions to the (1) POP3 and (2) SMTP services.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/inwebmail.txt">http://members.lycos.co.uk/r34ct/main/inwebmail.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010680">1010680</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10719">10719</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16683">inweb-mult-connections-dos(16683)</ref>
    </refs>
    <vuln_soft>
      <prod name="mail_server" vendor="inweb">
        <vers num="2.40"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2504" seq="2004-2504" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The GUI in Alt-N Technologies MDaemon 7.2 and earlier, including 6.8, executes child processes such as NOTEPAD.EXE with SYSTEM privileges when users create new files, which allows local users with physical access to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-11/0385.html">20041129 Privilege escalation flaw in MDaemon 7.2.</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1324.html">20041129 Privilege escalation flaw in MDaemon 7.2.</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1353.html">20041130 Re: Privilege escalation flaw in MDaemon 7.2.</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012350">1012350</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11736">11736</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18287">mdaemon-gain-privileges(18287)</ref>
    </refs>
    <vuln_soft>
      <prod name="mdaemon" vendor="alt-n">
        <vers num="6.8.0"/>
        <vers num="6.8.1"/>
        <vers num="6.8.2"/>
        <vers num="6.8.3"/>
        <vers num="6.8.4"/>
        <vers num="6.8.5"/>
        <vers num="7.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2505" seq="2004-2505" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Macromedia ColdFusion MX before 6.1 does not restrict the size of error messages, which allows remote attackers to cause a denial of service (memory consumption and crash) by sending repeated GET or POST requests that trigger error messages that use long strings of data.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-04/0184.html">20040417 Network Intelligence Advisory - Denial of Service Vulnerability in ColdFusion MX</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10163" patch="1">10163</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15895">coldfusion-file-upload-dos(15895)</ref>
    </refs>
    <vuln_soft>
      <prod name="coldfusion" vendor="macromedia">
        <vers num="5.0"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2506" seq="2004-2506" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unparsed web content delivery vulnerability in WIKINDX before 0.9.9g allows remote attackers to obtain sensitive information via a direct HTTP request to the config.inc file.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=231421" patch="1">http://sourceforge.net/project/shownotes.php?release_id=231421</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15885">wikindx-configinc-obtain-information(15885)</ref>
    </refs>
    <vuln_soft>
      <prod name="wikindx" vendor="wikindx">
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.9b"/>
        <vers num="0.9.9c"/>
        <vers num="0.9.9d"/>
        <vers num="0.9.9e"/>
        <vers num="0.9.9f"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2507" seq="2004-2507" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Absolute path traversal vulnerability in main.cgi in Linksys WVC11B Wireless-B Internet Video Camera allows remote attackers to read arbitrary files via an absolute pathname in the next_file parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0103.html">20040606 Linksys Web Camera File Inclusion Vuln</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010489">1010489</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10476">10476</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16339">linksys-webcamera-file-include(16339)</ref>
    </refs>
    <vuln_soft>
      <prod name="wvc11b" vendor="linksys">
        <vers num="2.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2508" seq="2004-2508" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in main.cgi in Linksys WVC11B Wireless-B Internet Video Camera allows remote attackers to inject arbitrary web script or HTML via the next_file parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0215.html">20040613 Linksys Web Camera Cross-site Scripting Vuln</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010424">1010424</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10533">10533</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16415">linksys-webcamera-main-xss(16415)</ref>
    </refs>
    <vuln_soft>
      <prod name="wvc11b" vendor="linksys">
        <vers num="2.10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2509" seq="2004-2509" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerabilities in (1) calendar.php, (2) login.php, and (3) online.php in Infopop UBB.Threads 6.2.3 and 6.5 allow remote attackers to inject arbitrary web script or HTML via the Cat parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-12/0239.html">20041213 Multiple XSS Vulnerabilities in several UBB.Thread Versions</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012503">1012503</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11900">11900</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18432">ubbthreads-multiple-scripts-xss(18432)</ref>
    </refs>
    <vuln_soft>
      <prod name="ubb.threads" vendor="ubbcentral">
        <vers num="6.2.3"/>
        <vers num="6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2510" seq="2004-2510" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in showflat.php in Infopop UBB.Threads before 6.5 allows remote attackers to inject arbitrary web script or HTML via the Cat parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-12/0239.html" adv="1">20041213 Multiple XSS Vulnerabilities in several UBB.Thread Versions</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012503">1012503</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11900">11900</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18432">ubbthreads-multiple-scripts-xss(18432)</ref>
    </refs>
    <vuln_soft>
      <prod name="ubb.threads" vendor="ubbcentral">
        <vers num="6.0"/>
        <vers num="6.0.1"/>
        <vers num="6.0.2"/>
        <vers num="6.0.3"/>
        <vers num="6.1"/>
        <vers num="6.1.1"/>
        <vers num="6.2"/>
        <vers num="6.2.1"/>
        <vers num="6.2.2"/>
        <vers num="6.2.3"/>
        <vers num="6.3"/>
        <vers num="6.3.1"/>
        <vers num="6.4"/>
        <vers num="6.4.1"/>
        <vers num="6.4.2"/>
        <vers num="6.4.3"/>
        <vers num="6.4.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2511" seq="2004-2511" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in DCP-Portal 5.3.2 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the year, (2) month, and (3) day parameters in calendar.php; (4) the cid and (5) url parameters in index.php; (6) the cid parameter in annoucement.php; (7) the cid parameter in news.php; (8) the cid parameter in contents.php; (9) the q parameter in search.php; and (10) the country parameter in register.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0042.html">20041006 [Maxpatrol Security Advisory] Multiple vulnerabilities in DCP-Portal</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1006351">1006351</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11338">11338</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11339">11339</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17638">dcpportal-get-xss(17638)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17639">dcpportal-post-xss(17639)</ref>
    </refs>
    <vuln_soft>
      <prod name="dcp-portal" vendor="codeworx_technologies">
        <vers num="3.7"/>
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.2"/>
        <vers num="4.5.1"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="5.3.1"/>
        <vers num="5.3.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2512" seq="2004-2512" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">CRLF injection vulnerability in calendar.php in DCP-Portal 5.3.2 and earlier allows remote attackers to conduct HTTP response splitting attacks to spoof web content and poison web caches via CRLF ("%0d%0a") sequences in the PHPSESSID parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0042.html">20041006 [Maxpatrol Security Advisory] Multiple vulnerabilities in DCP-Portal</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011481">1011481</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11340">11340</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17640">dcpportal-phpsessid-response-splitting(17640)</ref>
    </refs>
    <vuln_soft>
      <prod name="dcp-portal" vendor="codeworx_technologies">
        <vers num="3.7"/>
        <vers num="4.0"/>
        <vers num="4.1"/>
        <vers num="4.2"/>
        <vers num="4.5.1"/>
        <vers num="5.0.1"/>
        <vers num="5.0.2"/>
        <vers num="5.1"/>
        <vers num="5.2"/>
        <vers num="5.3"/>
        <vers num="5.3.1"/>
        <vers num="5.3.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2513" seq="2004-2513" published="2004-12-31" modified="2017-10-18" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in the IMAP service of Mercury (Pegasus) Mail 4.01 allows remote attackers to execute arbitrary code via a long SELECT command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://home.kabelfoon.nl/~jaabogae/han/m_401b.html" patch="1">http://home.kabelfoon.nl/~jaabogae/han/m_401b.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18295">pegasus-imap-select-bo(18295)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/663">663</ref>
    </refs>
    <vuln_soft>
      <prod name="pegasus" vendor="pmail">
        <vers num="4.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2514" seq="2004-2514" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in modules/private_messages/index.php in PowerPortal 1.x allows remote attackers to inject arbitrary web script or HTML via the (1) SUBJECT or (2) MESSAGE field.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010802">1010802</ref>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/5TP0O2ADFK.html">http://www.securiteam.com/unixfocus/5TP0O2ADFK.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10835">10835</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16838">powerportal-private-message-xss(16838)</ref>
    </refs>
    <vuln_soft>
      <prod name="powerportal" vendor="powerportal">
        <vers num="1.1b"/>
        <vers num="1.3"/>
        <vers num="1.3b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2515" seq="2004-2515" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Format string vulnerability in VMware Workstation 4.5.2 build-8848, if running with elevated privileges, might allow local users to execute arbitrary code via format string specifiers in command line arguments. NOTE: it is not clear if there are any default or typical circumstances under which VMware would be running with privileges beyond those already available to the attackers, so this might not be a vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1320.html">20041129 Format string flaw in VMWare Workstation 4.5.2 build-8848.</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11737">11737</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18297">vmware-format-string(18297)</ref>
    </refs>
    <vuln_soft>
      <prod name="workstation" vendor="vmware">
        <vers num="4.5.2_build_8848"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2516" seq="2004-2516" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in myServer 0.7 allows remote attackers to list arbitrary directories via an HTTP GET command with a large number of "./" sequences followed by "../" sequences.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0052.html" patch="1">20040915 myServer 0.7 Directory Traversal Vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011278">1011278</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=267444" patch="1">http://sourceforge.net/project/shownotes.php?release_id=267444</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11189" patch="1">11189</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17390">myserver-get-directory-traversal(17390)</ref>
    </refs>
    <vuln_soft>
      <prod name="myserver" vendor="myserver">
        <vers num="0.7" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2517" seq="2004-2517" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">myServer 0.7.1 allows remote attackers to cause a denial of service (crash) via a long HTTP POST request in a View=Logon operation to index.html.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://fux0r.phathookups.com/advisory/sp-x14-advisory.txt" adv="1">http://fux0r.phathookups.com/advisory/sp-x14-advisory.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011427">1011427</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=270736" sig="1">http://sourceforge.net/project/shownotes.php?release_id=270736</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17496">myserver-http-post-dos(17496)</ref>
    </refs>
    <vuln_soft>
      <prod name="myserver" vendor="myserver">
        <vers num="0.7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2518" seq="2004-2518" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Gattaca Server 2003 1.1.10.0 allows remote attackers to obtain sensitive information via (1) a trailing null byte ("%00") to a URL or (2) an invalid LANGUAGE parameter to web.tmpl, which reveals the full installation path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/Gattaca%20Server%202003.txt" patch="1">http://members.lycos.co.uk/r34ct/main/Gattaca%20Server%202003.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010703">1010703</ref>
      <ref source="CONFIRM" url="http://www.gattaca-server.com/cgi-bin/yabb/YaBB.pl?board=gattaca_discussion;action=display;num=1091194176;start=0#0">http://www.gattaca-server.com/cgi-bin/yabb/YaBB.pl?board=gattaca_discussion;action=display;num=1091194176;start=0#0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10729">10729</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16699">gattaca-null-path-disclosure(16699)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16700">gattaca-language-path-disclosure(16700)</ref>
    </refs>
    <vuln_soft>
      <prod name="gattaca_server_2003" vendor="geeos_team">
        <vers num="1.1.10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2519" seq="2004-2519" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Gattaca Server 2003 1.1.10.0 allows remote attackers to cause a denial of service (CPU consumption) via directory specifiers in the LANGUAGE parameter to (1) index.tmpl and (2) web.tmpl, such as (a) slash "/", (b) backslash "\", (c) dot ".",, (d) dot dot "..", and (e) internal slash "lang//en".</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/Gattaca%20Server%202003.txt" adv="1">http://members.lycos.co.uk/r34ct/main/Gattaca%20Server%202003.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010703">1010703</ref>
      <ref source="CONFIRM" url="http://www.gattaca-server.com/cgi-bin/yabb/YaBB.pl?board=gattaca_discussion;action=display;num=1091194176;start=0#0" patch="1">http://www.gattaca-server.com/cgi-bin/yabb/YaBB.pl?board=gattaca_discussion;action=display;num=1091194176;start=0#0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10728">10728</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16700">gattaca-language-path-disclosure(16700)</ref>
    </refs>
    <vuln_soft>
      <prod name="gattaca_server_2003" vendor="geeos_team">
        <vers num="1.1.10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2520" seq="2004-2520" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">POP3 protocol in Gattaca Server 2003 1.1.10.0 allows remote authenticated users to cause a denial of service (application crash) via a large numeric value in the (1) LIST, (2) RETR, or (3) UIDL commands.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/Gattaca%20Server%202003.txt">http://members.lycos.co.uk/r34ct/main/Gattaca%20Server%202003.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010703">1010703</ref>
      <ref source="CONFIRM" url="http://www.gattaca-server.com/cgi-bin/yabb/YaBB.pl?board=gattaca_discussion;action=display;num=1091194176;start=0#0" patch="1">http://www.gattaca-server.com/cgi-bin/yabb/YaBB.pl?board=gattaca_discussion;action=display;num=1091194176;start=0#0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10728">10728</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16703">gattaca-pop3-dos(16703)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2521" seq="2004-2521" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Mail server in Gattaca Server 2003 1.1.10.0 allows remote attackers to perform a denial of service (application crash) via a large number of connections to TCP port (1) 25 (SMTP) or (2) 110 (POP).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/Gattaca%20Server%202003.txt">http://members.lycos.co.uk/r34ct/main/Gattaca%20Server%202003.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010703">1010703</ref>
      <ref source="CONFIRM" url="http://www.gattaca-server.com/cgi-bin/yabb/YaBB.pl?board=gattaca_discussion;action=display;num=1091194176;start=0#0">http://www.gattaca-server.com/cgi-bin/yabb/YaBB.pl?board=gattaca_discussion;action=display;num=1091194176;start=0#0</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16703">gattaca-pop3-dos(16703)</ref>
    </refs>
    <vuln_soft>
      <prod name="gattaca_server_2003" vendor="geeos_team">
        <vers num="1.1.10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2522" seq="2004-2522" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in web.tmpl in Gattaca Server 2003 1.1.10.0 allows remote attackers to inject arbitrary web script or HTML via the (1) template or (2) language parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/Gattaca%20Server%202003.txt" adv="1">http://members.lycos.co.uk/r34ct/main/Gattaca%20Server%202003.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010703">1010703</ref>
      <ref source="CONFIRM" url="http://www.gattaca-server.com/cgi-bin/yabb/YaBB.pl?board=gattaca_discussion;action=display;num=1091194176;start=0#0" patch="1">http://www.gattaca-server.com/cgi-bin/yabb/YaBB.pl?board=gattaca_discussion;action=display;num=1091194176;start=0#0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10731">10731</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16701">gattaca-web-xss(16701)</ref>
    </refs>
    <vuln_soft>
      <prod name="gattaca_server_2003" vendor="geeos_team">
        <vers num="1.1.10.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2523" seq="2004-2523" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in the msg command (cat_message function in msg.c) in OpenFTPD 0.30.2 and earlier allows remote authenticated users to execute arbitrary code via format string specifiers in the message argument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-07/0350.html" patch="1">20040729 [VSA0402] OpenFTPD format string vulnerability</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0017.html">20040803 EXPLOIT for Re: [VSA0402] OpenFTPD format string vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010823" patch="1">1010823</ref>
      <ref source="CONFIRM" url="http://www.openftpd.org:9673/openftpd">http://www.openftpd.org:9673/openftpd</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10830" patch="1">10830</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16843">openftpd-ncftpformat-string(16843)</ref>
    </refs>
    <vuln_soft>
      <prod name="openftpd_ftp_server" vendor="openftpd">
        <vers num="0.29.4"/>
        <vers num="0.30"/>
        <vers num="0.30.1"/>
        <vers num="0.30.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2524" seq="2004-2524" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">clogin.php in Benchmark Designs' WHM AutoPilot 2.4.5 and earlier allows remote attackers to obtain plaintext username and password credentials by using the clogin_e and base64_encode functions to encode the desired user ID in the c parameter, then read the plaintext values in the resulting form.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1310.html" adv="1">20040802 Benchmark Designs' WHM Autopilot backdoor vulnerability to plain-text password.</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010833" adv="1">1010833</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10846">10846</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16849">whmautopilot-clogin-gain-access(16849)</ref>
    </refs>
    <vuln_soft>
      <prod name="whm_autopilot" vendor="whm_autopilot">
        <vers num="2.4.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2525" seq="2004-2525" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in compat.php in Serendipity before 0.7.1 allows remote attackers to inject arbitrary web script or HTML via the searchTerm variable.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012383" patch="1">1012383</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1076762&amp;group_id=75065&amp;atid=542822">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1076762&amp;group_id=75065&amp;atid=542822</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11790" patch="1">11790</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18322">serendipity-combatphp-xss(18322)</ref>
    </refs>
    <vuln_soft>
      <prod name="serendipity" vendor="s9y">
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.5_pl1"/>
        <vers num="0.6"/>
        <vers num="0.6_pl1"/>
        <vers num="0.6_pl2"/>
        <vers num="0.6_pl3"/>
        <vers num="0.6_rc1"/>
        <vers num="0.6_rc2"/>
        <vers num="0.7"/>
        <vers num="0.7_beta1"/>
        <vers num="0.7_beta2"/>
        <vers num="0.7_beta3"/>
        <vers num="0.7_beta4"/>
        <vers num="0.7_rc1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2526" seq="2004-2526" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in ldacgi.exe in IBM Tivoli Directory Server 4.1 and earlier allows remote attackers to view arbitrary files via a .. (dot dot) in the Template parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1311.html">20040802 IBM Directory Server - ldacgi.exe</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010834" adv="1" patch="1">1010831</ref>
      <ref source="MISC" url="http://www.oliverkarow.de/research/IDS_directory_traversal.txt" adv="1" patch="1">http://www.oliverkarow.de/research/IDS_directory_traversal.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10841" adv="1">10841</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=isg1IR52692" adv="1" patch="1">IR52692</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IR53631" adv="1" patch="1">IR53631</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16850">tivoli-directory-directory-traversal(16850)</ref>
    </refs>
    <vuln_soft>
      <prod name="tivoli_directory_server" vendor="ibm">
        <vers num="3.2.2"/>
        <vers num="4.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2527" seq="2004-2527" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.4" CVSS_base_score="5.4" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The local and remote desktop login screens in Microsoft Windows XP before SP2 and 2003 allow remote attackers to cause a denial of service (CPU and memory consumption) by repeatedly using the WinKey+"U" key combination, which causes multiple copies of Windows Utility Manager to be loaded more quickly than they can be closed when the copies detect that another instance is running.</descript>
    </desc>
    <sols>
      <sol source="nvd">The DoS flaw affects slower machines and those with less ram quicker than higher specification machines. On very hi-spec machines, the flaw does not seem to be exploitable.</sol>
    </sols>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1313.html" adv="1">20040801 Remotely Exploitable DoS Flaw in XP and 2003</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010836">1010836</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16851">win-winkey-u-dos(16851)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2528" seq="2004-2528" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in sresult.exe in Webcam Watchdog 4.0.1a allows remote attackers to inject arbitrary web script or HTML via the cam parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/Webcam_watchdog_401a.txt" adv="1">http://members.lycos.co.uk/r34ct/main/Webcam_watchdog_401a.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010824" adv="1">1010824</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10837">10837</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16854">webcam-watchdog-sresult-xss(16854)</ref>
    </refs>
    <vuln_soft>
      <prod name="webcam_watchdog" vendor="webcam_corp">
        <vers num="4.0.1a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2529" seq="2004-2529" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Gadu-Gadu allows remote attackers to bypass the "image send" option by sending a very small image file, which could be used in conjunction with image-related vulnerabilities.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110295777306493&amp;w=2">20041213 Gadu-Gadu several vulnerabilities</ref>
      <ref source="MISC" url="http://www.man.poznan.pl/~security/gg-adv.txt" adv="1">http://www.man.poznan.pl/~security/gg-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11899">11899</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18463">gadu-gadu-image-bypass-security(18463)</ref>
    </refs>
    <vuln_soft>
      <prod name="gadu-gadu_instant_messenger" vendor="gadu-gadu">
        <vers num="6.0"/>
        <vers num="6.0_build149"/>
        <vers num="6.0_build150"/>
        <vers num="6.0_build151"/>
        <vers num="6.0_build152"/>
        <vers num="6.0_build153"/>
        <vers num="6.0_build154"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2530" seq="2004-2530" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Visual truncation vulnerability in Gadu-Gadu allows remote attackers to spoof the file extension on transmitted files via a filename with a large number of spaces followed by the real extension, which is not displayed in the dialog box.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULN-DEV" url="http://seclists.org/lists/vuln-dev/2004/Aug/0007.html">20040821 GADU-GADU Instant messanger - long file name</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011037">1011037</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11017">11017</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17105">gadu-gadu-file-ext-spoof(17105)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2531" seq="2004-2531" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">X.509 Certificate Signature Verification in Gnu transport layer security library (GnuTLS) 1.0.16 allows remote attackers to cause a denial of service (CPU consumption) via certificates containing long chains and signed with large RSA keys.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.gnupg.org/pipermail/gnutls-dev/2004-August/000703.html">[gnutls-dev] 20040802 gnutls 1.0.17</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010838" adv="1" patch="1">1010838</ref>
      <ref source="MISC" url="http://www.hornik.sk/SA/SA-20040802.txt" adv="1" patch="1">http://www.hornik.sk/SA/SA-20040802.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10839" patch="1">10839</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16858">gnutls-rsa-key-size-dos(16858)</ref>
    </refs>
    <vuln_soft>
      <prod name="gnutls" vendor="gnu">
        <vers num="1.0.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2532" seq="2004-2532" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Serv-U FTP server before 5.1.0.0 has a default account and password for local administration, which allows local users to execute arbitrary commands by connecting to the server using the default administrator account, creating a new user, logging in as that new user, and then using the SITE EXEC command.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0216.html">20040808 Serv-U 3.x, 4.x, 5.x local privilege escalation vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10886">10886</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16925">servu-default-admin-account(16925)</ref>
    </refs>
    <vuln_soft>
      <prod name="serv-u" vendor="serv-u">
        <vers num="3.0.0.16"/>
        <vers num="3.0.0.17"/>
        <vers num="3.1.0.0"/>
        <vers num="3.1.0.1"/>
        <vers num="3.1.0.3"/>
        <vers num="4.0.0.4"/>
        <vers num="4.1.0.0"/>
        <vers num="4.1.0.3"/>
        <vers num="5.0.0.0"/>
        <vers num="5.0.0.4"/>
        <vers num="5.0.0.9"/>
        <vers num="5.0.0.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2533" seq="2004-2533" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Serv-U FTP Server 4.1 (possibly 4.0) allows remote attackers to cause a denial of service (application crash) via a SITE CHMOD command with a "\\...\" followed by a short string, causing partial memory corruption, a different vulnerability than CVE-2004-2111.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009086">1009086</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9675">9675</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15251">servu-sitechmod-command-dos(15251)</ref>
    </refs>
    <vuln_soft>
      <prod name="serv-u" vendor="serv-u">
        <vers num="4.1.0.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2534" seq="2004-2534" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Fastream NETFile Server 7.1.2 does not properly handle keep-alive connection timeouts and does not close the connection after a HEAD request, which allows remote attackers to perform a denial of service (connection consumption) by sending a large number HTTP HEAD requests.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012267">1012267</ref>
      <ref source="MISC" url="http://users.pandora.be/bratax/advisories/b003.html">http://users.pandora.be/bratax/advisories/b003.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11687">11687</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18192">fastream-head-request-dos(18192)</ref>
    </refs>
    <vuln_soft>
      <prod name="netfile_server" vendor="fastream">
        <vers num="6.5.1.980"/>
        <vers num="6.5.1.981"/>
        <vers num="6.7.2.1085"/>
        <vers num="6.7.3"/>
        <vers num="6.7.5"/>
        <vers num="7.1"/>
        <vers num="7.1.2" edition=":professional"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2535" seq="2004-2535" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The person-to-person secure messaging feature in Sticker before 3.1.0 beta 2 allows remote attackers to post messages to unauthorized private groups by using the group's public encryption key.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product update:
Matthew Phillips, Sticker, 3.1.0 Beta 2</sol>
    </sols>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011580" patch="1">1011580</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11333" patch="1">11333</ref>
      <ref source="CONFIRM" url="http://www.tickertape.org/projects/sticker/release_notes-3.1.0b2.html">http://www.tickertape.org/projects/sticker/release_notes-3.1.0b2.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17664">sticker-unauth-message-posting(17664)</ref>
    </refs>
    <vuln_soft>
      <prod name="sticker" vendor="matthew_phillips">
        <vers num="3.0.0"/>
        <vers num="3.1.0_beta_1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2536" seq="2004-2536" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The exit_thread function (process.c) in Linux kernel 2.6 through 2.6.5 does not invalidate the per-TSS io_bitmap pointers if a process obtains IO access permissions from the ioperm function but does not drop those permissions when it exits, which allows other processes to access the per-TSS pointers, access restricted memory locations, and possibly gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.6">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.6</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10302">10302</ref>
      <ref source="MLIST" url="http://www.ussg.iu.edu/hypermail/linux/kernel/0405.0/1242.html" patch="1">20040507 Bug in IO bitmap handling? Probably exploitable (2.6.5)</ref>
      <ref source="MLIST" url="http://www.ussg.iu.edu/hypermail/linux/kernel/0405.0/1265.html">20040507 Re: Bug in IO bitmap handling? Probably exploitable (2.6.5)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16106">linux-exitthread-gain-privileges(16106)</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2537" seq="2004-2537" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in SurgeMail before 2.2c10 has unknown impact and attack vectors, related to a "Webmail security bug."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://netwinsite.com/surgemail/help/updates.htm">http://netwinsite.com/surgemail/help/updates.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12086" patch="1">12086</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18648">surgemail-webmail(18648)</ref>
    </refs>
    <vuln_soft>
      <prod name="surgemail" vendor="netwin">
        <vers num="1.8a"/>
        <vers num="1.8b3"/>
        <vers num="1.8d"/>
        <vers num="1.8f"/>
        <vers num="1.8g3"/>
        <vers num="1.9"/>
        <vers num="1.9b2"/>
        <vers num="2.0a2"/>
        <vers num="2.0c"/>
        <vers num="2.0e"/>
        <vers num="2.0g2"/>
        <vers num="2.1a"/>
        <vers num="2.1c7"/>
        <vers num="2.2a6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2538" seq="2004-2538" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.5" CVSS_base_score="6.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Direct static code injection vulnerability in the PCG simple application generation in phpCodeGenie before 3.0.2 allows remote authenticated users to execute arbitrary code via the (1) header or (2) footer.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://phpcodegenie.sourceforge.net/phpCodeGenie/docs/ChangeLog.txt">http://phpcodegenie.sourceforge.net/phpCodeGenie/docs/ChangeLog.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011911" patch="1">1011911</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11524" patch="1">11524</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17848">phpcodegenie-header-footer-command-execution(17848)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpcodegenie" vendor="nilesh_dosooye">
        <vers num="1.1"/>
        <vers num="1.4"/>
        <vers num="1.21"/>
        <vers num="3.0.1" prev="1"/>
        <vers num="3.0_alpha"/>
        <vers num="3.0_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2539" seq="2004-2539" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Network Appliance NetCache 5.2 and Data ONTAP 6.0 allows remote attackers to cause a denial of service (panic and reboot) and possibly other impacts via unknown attack vectors, possibly related to unspecified worms, as identified by bug ID</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010013">1010013</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10319">10319</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16032">netcache-ontap-dos(16032)</ref>
    </refs>
    <vuln_soft>
      <prod name="data_ontap" vendor="network_appliance">
        <vers num="6.0"/>
      </prod>
      <prod name="netcache" vendor="network_appliance">
        <vers num="5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2540" seq="2004-2540" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">readObject in (1) Java Runtime Environment (JRE) and (2) Software Development Kit (SDK) 1.4.0 through 1.4.2_05 allows remote attackers to cause a denial of service (JVM unresponsive) via crafted serialized data.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2005-04/0113.html">20050407 MacOSX Java Runtime Environment Remote Denial-of-Service (DoS) Vulnerability</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-57707-1">57707</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/20027">jre-sdk-readobject-dos(20027)</ref>
    </refs>
    <vuln_soft>
      <prod name="jdk" vendor="sun">
        <vers num="1.4" edition=":linux"/>
        <vers num="1.4" edition=":solaris"/>
        <vers num="1.4" edition=":windows"/>
        <vers num="1.4.0_01" edition=":windows"/>
        <vers num="1.4.0_02" edition=":linux"/>
        <vers num="1.4.0_02" edition=":solaris"/>
        <vers num="1.4.0_02" edition=":windows"/>
        <vers num="1.4.0_03" edition=":linux"/>
        <vers num="1.4.0_03" edition=":solaris"/>
        <vers num="1.4.0_03" edition=":windows"/>
        <vers num="1.4.0_4" edition=":linux"/>
        <vers num="1.4.0_4" edition=":solaris"/>
        <vers num="1.4.0_4" edition=":windows"/>
        <vers num="1.4.1" edition=":linux"/>
        <vers num="1.4.1" edition=":solaris"/>
        <vers num="1.4.1" edition=":windows"/>
        <vers num="1.4.1_01" edition=":linux"/>
        <vers num="1.4.1_01" edition=":solaris"/>
        <vers num="1.4.1_01" edition=":windows"/>
        <vers num="1.4.1_02" edition=":linux"/>
        <vers num="1.4.1_02" edition=":solaris"/>
        <vers num="1.4.1_02" edition=":windows"/>
        <vers num="1.4.1_03" edition=":linux"/>
        <vers num="1.4.1_03" edition=":solaris"/>
        <vers num="1.4.1_03" edition=":windows"/>
        <vers num="1.4.2" edition=":linux"/>
        <vers num="1.4.2" edition=":solaris"/>
        <vers num="1.4.2" edition=":windows"/>
        <vers num="1.4.2_01" edition=":linux"/>
        <vers num="1.4.2_02" edition=":linux"/>
        <vers num="1.4.2_03" edition=":linux"/>
        <vers num="1.4.2_03" edition=":solaris"/>
        <vers num="1.4.2_03" edition=":windows"/>
        <vers num="1.4.2_04" edition=":linux"/>
        <vers num="1.4.2_04" edition=":solaris"/>
        <vers num="1.4.2_04" edition=":windows"/>
        <vers num="1.4.2_05" edition=":linux"/>
        <vers num="1.4.2_05" edition=":solaris"/>
        <vers num="1.4.2_05" edition=":windows"/>
      </prod>
      <prod name="jre" vendor="sun">
        <vers num="1.4" edition=":linux"/>
        <vers num="1.4" edition=":solaris"/>
        <vers num="1.4" edition=":windows"/>
        <vers num="1.4.0_01" edition=":solaris"/>
        <vers num="1.4.0_01" edition=":windows"/>
        <vers num="1.4.0_02" edition=":linux"/>
        <vers num="1.4.0_02" edition=":solaris"/>
        <vers num="1.4.0_02" edition=":windows"/>
        <vers num="1.4.0_03" edition=":linux"/>
        <vers num="1.4.0_03" edition=":solaris"/>
        <vers num="1.4.0_03" edition=":windows"/>
        <vers num="1.4.0_04" edition=":linux"/>
        <vers num="1.4.0_04" edition=":solaris"/>
        <vers num="1.4.0_04" edition=":windows"/>
        <vers num="1.4.1" edition=":linux"/>
        <vers num="1.4.1" edition=":solaris"/>
        <vers num="1.4.1" edition=":windows"/>
        <vers num="1.4.1" edition="update3:linux"/>
        <vers num="1.4.1" edition="update3:solaris"/>
        <vers num="1.4.1" edition="update3:windows"/>
        <vers num="1.4.1_01" edition=":linux"/>
        <vers num="1.4.1_01" edition=":solaris"/>
        <vers num="1.4.1_01" edition=":windows"/>
        <vers num="1.4.1_02" edition=":linux"/>
        <vers num="1.4.1_02" edition=":solaris"/>
        <vers num="1.4.1_02" edition=":windows"/>
        <vers num="1.4.1_07" edition=":windows"/>
        <vers num="1.4.2" edition=":linux"/>
        <vers num="1.4.2" edition=":solaris"/>
        <vers num="1.4.2" edition=":windows"/>
        <vers num="1.4.2" edition="update1:linux"/>
        <vers num="1.4.2" edition="update1:solaris"/>
        <vers num="1.4.2" edition="update1:windows"/>
        <vers num="1.4.2" edition="update2:linux"/>
        <vers num="1.4.2" edition="update2:solaris"/>
        <vers num="1.4.2" edition="update2:windows"/>
        <vers num="1.4.2" edition="update3:linux"/>
        <vers num="1.4.2" edition="update3:solaris"/>
        <vers num="1.4.2" edition="update3:windows"/>
        <vers num="1.4.2" edition="update4:linux"/>
        <vers num="1.4.2" edition="update4:solaris"/>
        <vers num="1.4.2" edition="update4:windows"/>
        <vers num="1.4.2" edition="update5:linux"/>
        <vers num="1.4.2" edition="update5:solaris"/>
        <vers num="1.4.2" edition="update5:windows"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2541" seq="2004-2541" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Buffer overflow in Cscope 15.5, and possibly multiple overflows, allows remote attackers to execute arbitrary code via a C file with a long #include line that is later browsed by the target.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://docs.info.apple.com/article.html?artnum=306172">http://docs.info.apple.com/article.html?artnum=306172</ref>
      <ref source="APPLE" url="http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html">APPLE-SA-2007-07-31</ref>
      <ref source="MISC" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1064875&amp;group_id=4664&amp;atid=104664">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1064875&amp;group_id=4664&amp;atid=104664</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1064">DSA-1064</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200606-10.xml">GLSA-200606-10</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-1101.html">RHSA-2009:1101</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2009-1102.html">RHSA-2009:1102</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/18050">18050</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/25159">25159</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2007/2732">ADV-2007-2732</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=490667">https://bugzilla.redhat.com/show_bug.cgi?id=490667</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10069">oval:org.mitre.oval:def:10069</ref>
    </refs>
    <vuln_soft>
      <prod name="cscope" vendor="cscope">
        <vers num="15.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2542" seq="2004-2542" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Dynix (formerly known as epixtech) WebPAC allow remote attackers to execute arbitrary SQL commands via unknown attack vectors, resulting in an ability to execute stored procedures, bypass login authentication, and cause an unspecified denial of service to backend databases.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0354.html">20040824 Dynix Webpac Input Validation</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011073">1011073</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11037">11037</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17128">webpac-sql-injection(17128)</ref>
    </refs>
    <vuln_soft>
      <prod name="webpac" vendor="dynix">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2543" seq="2004-2543" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Secure Computing Corporation Sidewinder G2 6.1.0.01 might allow remote attackers to cause a denial of service (proxy failure) via invalid traffic to the (1) T.120 or (2) RTSP proxy, or (3) invalid MIME messages to the mail filter.  NOTE: this might not be a vulnerability because the embedded monitoring sub-system automatically restarts after the failure.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.securecomputing.com/pdf/SW61002Rel_Notes_0512.pdf">http://www.securecomputing.com/pdf/SW61002Rel_Notes_0512.pdf</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16183">sidewinder-t120-dos(16183)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16184">sidewinder-rtsp-dos(16184)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16186">sidewinder-mail-filter-dos(16186)</ref>
    </refs>
    <vuln_soft>
      <prod name="sidewinder_g2" vendor="securecomputing">
        <vers num="6.1.0.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2544" seq="2004-2544" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Admin Console in Secure Computing Corporation Sidewinder G2 6.1.0.01 exports private keys when exporting firewall certificates, which might allow attackers to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.securecomputing.com/pdf/SW61002Rel_Notes_0512.pdf" patch="1">http://www.securecomputing.com/pdf/SW61002Rel_Notes_0512.pdf</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/24364">sidewinder-private-key-disclosure(24364)</ref>
    </refs>
    <vuln_soft>
      <prod name="sidewinder_g2" vendor="securecomputing">
        <vers num="6.1.0.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2545" seq="2004-2545" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Secure Computing Corporation Sidewinder G2 6.1.0.01 allows remote attackers to cause a denial of service (SMTP proxy failure) via unknown attack vendors involving an "extremely busy network."  NOTE: this might not be a vulnerability because the embedded monitoring sub-system automatically restarts after the failure.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.securecomputing.com/pdf/SW61002Rel_Notes_0512.pdf" patch="1">http://www.securecomputing.com/pdf/SW61002Rel_Notes_0512.pdf</ref>
    </refs>
    <vuln_soft>
      <prod name="sidewinder_g2" vendor="securecomputing">
        <vers num="6.1.0.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2546" seq="2004-2546" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple memory leaks in Samba before 3.0.6 allow attackers to cause a denial of service (memory consumption).</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.samba.org/samba/history/samba-3.0.6.html">http://www.samba.org/samba/history/samba-3.0.6.html</ref>
      <ref source="TRUSTIX" url="http://www.trustix.org/errata/2004/0043">2004-0043</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17139">samba-memory-information-disclosure(17139)</ref>
    </refs>
    <vuln_soft>
      <prod name="samba" vendor="samba">
        <vers num="1.9.17" edition="p1"/>
        <vers num="1.9.17" edition="p3"/>
        <vers num="1.9.17" edition="p4"/>
        <vers num="1.9.17" edition="p5"/>
        <vers num="1.9.18" edition="p1"/>
        <vers num="1.9.18" edition="p10"/>
        <vers num="1.9.18" edition="p2"/>
        <vers num="1.9.18" edition="p3"/>
        <vers num="1.9.18" edition="p4"/>
        <vers num="1.9.18" edition="p5"/>
        <vers num="1.9.18" edition="p6"/>
        <vers num="1.9.18" edition="p7"/>
        <vers num="1.9.18" edition="p8"/>
        <vers num="2.0"/>
        <vers num="2.0.0"/>
        <vers num="2.0.5a"/>
        <vers num="2.2.1"/>
        <vers num="2.2.1a"/>
        <vers num="2.2.3a"/>
        <vers num="2.2.7a"/>
        <vers num="2.2.8a"/>
        <vers num="2.2.9"/>
        <vers num="2.2.10"/>
        <vers num="2.2.11"/>
        <vers num="2.2.12"/>
        <vers num="2.2a"/>
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.2a"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4" edition="rc1"/>
        <vers num="3.0.5"/>
      </prod>
      <prod name="secure_linux" vendor="trustix">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2547" seq="2004-2547" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">NetWin (1) SurgeMail before 2.0c and (2) WebMail allow remote attackers to obtain sensitive information via HTTP requests that (a) specify the / URI, (b) specify the /scripts/ URI, or (c) specify a non-existent file, which reveal the path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0056.html" patch="1">20040603 Surgemail - Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt" patch="1">http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt</ref>
      <ref source="CONFIRM" url="http://www.netwinsite.com/surgemail/help/updates.htm" patch="1">http://www.netwinsite.com/surgemail/help/updates.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10483" patch="1">10483</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16319">surgemail-invalid-path-disclosure(16319)</ref>
    </refs>
    <vuln_soft>
      <prod name="surgemail" vendor="netwin">
        <vers num="1.0c"/>
        <vers num="1.0d"/>
        <vers num="1.1a"/>
        <vers num="1.1b"/>
        <vers num="1.1c"/>
        <vers num="1.1d"/>
        <vers num="1.2a"/>
        <vers num="1.2b"/>
        <vers num="1.2c"/>
        <vers num="1.3a"/>
        <vers num="1.3a_rc1"/>
        <vers num="1.3b"/>
        <vers num="1.3c"/>
        <vers num="1.3d"/>
        <vers num="1.3e"/>
        <vers num="1.3f"/>
        <vers num="1.3g"/>
        <vers num="1.3h"/>
        <vers num="1.3i"/>
        <vers num="1.3j"/>
        <vers num="1.3k"/>
        <vers num="1.3l"/>
        <vers num="1.4a"/>
        <vers num="1.4b"/>
        <vers num="1.4c"/>
        <vers num="1.5a"/>
        <vers num="1.5b"/>
        <vers num="1.5c"/>
        <vers num="1.5d"/>
        <vers num="1.5d2"/>
        <vers num="1.5f"/>
        <vers num="1.6a"/>
        <vers num="1.6b"/>
        <vers num="1.6d"/>
        <vers num="1.6e"/>
        <vers num="1.6e2"/>
        <vers num="1.7a"/>
        <vers num="1.7b3"/>
        <vers num="1.8a"/>
        <vers num="1.8b3"/>
        <vers num="1.8d"/>
        <vers num="1.8e"/>
        <vers num="1.8g3"/>
        <vers num="1.9b2"/>
        <vers num="2.0a2"/>
      </prod>
      <prod name="webmail" vendor="netwin">
        <vers num="3.1d"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2548" seq="2004-2548" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in NetWin (1) SurgeMail before 2.0c and (2) WebMail allow remote attackers to inject arbitrary web script or HTML via (a) a URI containing the script, or (b) the username field in the login form.  NOTE: it is possible that the first attack vector is resultant from the error message issue (CVE-2004-2547).</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0056.html" patch="1">20040603 Surgemail - Multiple Vulnerabilities</ref>
      <ref source="MISC" url="http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt">http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt</ref>
      <ref source="MISC" url="http://www.netwinsite.com/surgemail/help/updates.htm">http://www.netwinsite.com/surgemail/help/updates.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10483" patch="1">10483</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16320">surgemail-username-xss(16320)</ref>
    </refs>
    <vuln_soft>
      <prod name="surgemail" vendor="netwin">
        <vers num="1.8a"/>
        <vers num="1.8b3"/>
        <vers num="1.8d"/>
        <vers num="1.8f"/>
        <vers num="1.8g3"/>
        <vers num="1.9"/>
        <vers num="1.9b2"/>
        <vers num="2.0a2" prev="1"/>
      </prod>
      <prod name="webmail" vendor="netwin">
        <vers num="3.1d"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2549" seq="2004-2549" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Nortel Wireless LAN (WLAN) Access Point (AP) 2220, 2221, and 2225 allow remote attackers to cause a denial of service (service crash) via a TCP request with a large string, followed by 8 newline characters, to (1) the Telnet service on TCP port 23 and (2) the HTTP service on TCP port 80, possibly due to a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-03/0055.html">20040301 Nortel Networks Wireless LAN Access Point 2200 DoS + PoC</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009294">1009294</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9787">9787</ref>
      <ref source="MISC" url="http://www116.nortelnetworks.com/docs/bvdoc/wlan/216109a.pdf">http://www116.nortelnetworks.com/docs/bvdoc/wlan/216109a.pdf</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15373">nortel-accesspoint-telnet-dos(15373)</ref>
    </refs>
    <vuln_soft>
      <prod name="wlan_access_point_2220" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="wlan_access_point_2221" vendor="nortel">
        <vers num=""/>
      </prod>
      <prod name="wlan_access_point_2225" vendor="nortel">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2550" seq="2004-2550" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in unspecified Perl scripts in SandSurfer before 1.7.1 allow remote attackers to inject arbitrary web script or HTML, which is later executed by a target who views reports containing the injected data.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=356882">http://sourceforge.net/forum/forum.php?forum_id=356882</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9801" patch="1">9801</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15377">sandsurfer-xss(15377)</ref>
    </refs>
    <vuln_soft>
      <prod name="sandsurfer" vendor="xperience">
        <vers num="1.6.2"/>
        <vers num="1.6.3"/>
        <vers num="1.6.4"/>
        <vers num="1.6.5"/>
        <vers num="1.7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2551" seq="2004-2551" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Layton HelpBox 3.0.1 allow remote attackers to execute arbitrary SQL commands via (1) the sys_comment_id parameter in editcommentenduser.asp, (2) the sys_suspend_id parameter in editsuspensionuser.asp, (3) the table parameter in export_data.asp, (4) the sys_analgroup parameter in manageanalgrouppreference.asp, (5) the sys_asset_id parameter in quickinfoassetrequests.asp, (6) the sys_eusername parameter in quickinfoenduserrequests.asp, and the sys_request_id parameter in (7) requestauditlog.asp, (8) requestcommentsenduser.asp, (9) selectrequestapplytemplate.asp, and (10) selectrequestlink.asp, resulting in an ability to create a new HelpBox user account and read, modify, or delete data from the backend database.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5VP0S0ADFW.html">http://www.securiteam.com/windowsntfocus/5VP0S0ADFW.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10776">10776</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16772">helpbox-multiple-sql-injection(16772)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16774">helpbox-url-gain-access(16774)</ref>
    </refs>
    <vuln_soft>
      <prod name="helpbox" vendor="layton_technology">
        <vers num="3.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2552" seq="2004-2552" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in XBoard 4.2.7 and earlier might allow local users to execute arbitrary code via a long -icshost command line argument. NOTE: since the program is not setuid and not normally called from remote programs, there may not be a typical attack vector for the issue that crosses privilege boundaries.  Therefore this may not be a vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-03/0030.html" adv="1">20040301 Smashing "XBoard 4.2.7(All versions)" For Fun &amp; Profit.*Unpublished Local Stack Overflow Vulnerablity!</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15362">xboard-icshost-bo(15362)</ref>
    </refs>
    <vuln_soft>
      <prod name="xboard" vendor="tim_mann">
        <vers num="4.2.1"/>
        <vers num="4.2.2"/>
        <vers num="4.2.3"/>
        <vers num="4.2.4"/>
        <vers num="4.2.5"/>
        <vers num="4.2.6"/>
        <vers num="4.2.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2553" seq="2004-2553" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Ignition Project ignitionServer 0.1.2 through 0.1.2-R2 allows remote authenticated users with local IRC operator privileges to obtain global IRC operator privileges by using the unofficial umode command with the +ORD argument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.sourceforge.net/viewcvs.py/ignition/ignitionserver/docs/security/20040302-operator-privilege-escalation.txt?view=markup">http://cvs.sourceforge.net/viewcvs.py/ignition/ignitionserver/docs/security/20040302-operator-privilege-escalation.txt?view=markup</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009301" patch="1">1009301</ref>
      <ref source="MISC" url="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=891555&amp;group_id=96071&amp;atid=613526">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=891555&amp;group_id=96071&amp;atid=613526</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9783" patch="1">9783</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15363">ignition-server-gain-privileges(15363)</ref>
    </refs>
    <vuln_soft>
      <prod name="ignitionserver" vendor="the_ignition_project">
        <vers num="0.1.2"/>
        <vers num="0.1.2_r1"/>
        <vers num="0.1.2_r2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2554" seq="2004-2554" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Novell Client Firewall (NCF) 2.0, as based on the Agnitum Outpost Firewall, allows local users to execute arbitrary code with SYSTEM privileges by opening the NCF tray icon and using the Help functionality to launch programs with SYSTEM privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008755">1008755</ref>
      <ref source="CONFIRM" url="http://support.novell.com/cgi-bin/search/searchtid.cgi?/10090585.htm" adv="1">http://support.novell.com/cgi-bin/search/searchtid.cgi?/10090585.htm</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-090.shtml" adv="1">O-090</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9441">9441</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15367">ncf-tray-icon-gain-privileges(15367)</ref>
    </refs>
    <vuln_soft>
      <prod name="client_firewall" vendor="novell">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2555" seq="2004-2555" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Riverdeep FoolProof Security 3.9.x on Windows 98 and Windows ME uses weak cryptography (arithmetic and XOR operations) to relate the Control password to the Administrator password, which allows local users to calculate the Administrator password if they know the Control password and password recovery key.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0081.html">20040604 [CYSA-0329] Password recovery vulnerability in FoolProof Security 3.9.x for Windows 95/9</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10467">10467</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16327">foolproof-admin-password-recovery(16327)</ref>
    </refs>
    <vuln_soft>
      <prod name="foolproof_security" vendor="smartstuff">
        <vers num="3.9"/>
        <vers num="3.9.4"/>
        <vers num="3.9.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2556" seq="2004-2556" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">NetGear WG602 (aka WG602v1) Wireless Access Point firmware 1.04.0 and 1.5.67 has a hardcoded account of username "super" and password "5777364", which allows remote attackers to modify the configuration.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html">20040603 Netgear WG602 Accesspoint vulnerability</ref>
      <ref source="CONFIRM" url="http://kbserver.netgear.com/kb_web_files/n101383.asp">http://kbserver.netgear.com/kb_web_files/n101383.asp</ref>
      <ref source="MISC" url="http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126&amp;tid=172">http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126&amp;tid=172</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-159.shtml">O-159</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/365230">20040605 Re: Netgear WG602 Accesspoint vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10459">10459</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16312">netgearwg602-default-account(16312)</ref>
    </refs>
    <vuln_soft>
      <prod name="wg602" vendor="netgear">
        <vers num="1.04.0"/>
        <vers num="1.5.67"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2557" seq="2004-2557" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">NetGear WG602 (aka WG602v1) Wireless Access Point 1.7.14 has a hardcoded account of username "superman" and password "21241036", which allows remote attackers to modify the configuration.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0036.html">20040603 Netgear WG602 Accesspoint vulnerability</ref>
      <ref source="CONFIRM" url="http://kbserver.netgear.com/kb_web_files/n101383.asp">http://kbserver.netgear.com/kb_web_files/n101383.asp</ref>
      <ref source="MISC" url="http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126&amp;tid=172">http://slashdot.org/articles/04/06/08/1319206.shtml?tid=126&amp;tid=172</ref>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-159.shtml">O-159</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/365230">20040605 Re: Netgear WG602 Accesspoint vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10459">10459</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16312">netgearwg602-default-account(16312)</ref>
    </refs>
    <vuln_soft>
      <prod name="wg602" vendor="netgear">
        <vers num="1.7.14"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2558" seq="2004-2558" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in IBM Tivoli SecureWay Policy Director 3.8, Access Manager for e-business 3.9 to 5.1, Access Manager Identity Manager Solution 5.1, Configuration Manager 4.2, Configuration Manager for Automated Teller Machines 2.1.0, and IBM WebSphere Everyplace Server, Service Provider Offering for Multi-platforms 2.1.3 to 2.15 allow remote attackers to hijack sessions of authenticated users via unknown attack vectors involving certain cookies, aka "Potential Credential Impersonation Attack."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10449" patch="1">10449</ref>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?uid=swg21168762" adv="1" patch="1">http://www-1.ibm.com/support/docview.wss?uid=swg21168762</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16315">ibm-cookie-session-hijack(16315)</ref>
    </refs>
    <vuln_soft>
      <prod name="tivoli_access_manager_for_e-business" vendor="ibm">
        <vers num="3.9"/>
        <vers num="4.1"/>
        <vers num="5.1"/>
      </prod>
      <prod name="tivoli_access_manager_identity_manager_solution" vendor="ibm">
        <vers num="5.1"/>
      </prod>
      <prod name="tivoli_configuration_manager" vendor="ibm">
        <vers num="4.2"/>
      </prod>
      <prod name="tivoli_configuration_manager_for_atm" vendor="ibm">
        <vers num="2.1"/>
      </prod>
      <prod name="tivoli_secureway_policy_director" vendor="ibm">
        <vers num="3.8"/>
      </prod>
      <prod name="websphere_everyplace_server" vendor="ibm">
        <vers num="2.1.3"/>
        <vers num="2.1.4"/>
        <vers num="2.1.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2559" seq="2004-2559" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">DokuWiki before 2004-10-19 allows remote attackers to access administrative functionality including (1) Mediaselectiondialog, (2) Recent changes, (3) feed, and (4) search, possibly due to the lack of ACL checks.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011802" patch="1">1011802</ref>
      <ref source="CONFIRM" url="http://wiki.splitbrain.org/wiki:old_changes">http://wiki.splitbrain.org/wiki:old_changes</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17799">dokuwiki-acl-gain-access(17799)</ref>
    </refs>
    <vuln_soft>
      <prod name="dokuwiki" vendor="andreas_gohr">
        <vers num="release_2004-07-04"/>
        <vers num="release_2004-07-07"/>
        <vers num="release_2004-07-12"/>
        <vers num="release_2004-07-21"/>
        <vers num="release_2004-07-25"/>
        <vers num="release_2004-08-08"/>
        <vers num="release_2004-08-15a"/>
        <vers num="release_2004-08-22"/>
        <vers num="release_2004-09-12"/>
        <vers num="release_2004-09-25"/>
        <vers num="release_2004-09-30"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2560" seq="2004-2560" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">DokuWiki before 2004-10-19, when used on a web server that permits execution based on file extension, allows remote attackers to execute arbitrary code by uploading a file with an appropriate extension such as ".php" or ".cgi".</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://wiki.splitbrain.org/wiki:old_changes">http://wiki.splitbrain.org/wiki:old_changes</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11486" patch="1">11486</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17899">dokuwiki-file-upload(17899)</ref>
    </refs>
    <vuln_soft>
      <prod name="dokuwiki" vendor="andreas_gohr">
        <vers num="release_2004-07-04"/>
        <vers num="release_2004-07-07"/>
        <vers num="release_2004-07-12"/>
        <vers num="release_2004-07-21"/>
        <vers num="release_2004-07-25"/>
        <vers num="release_2004-08-08"/>
        <vers num="release_2004-08-15a"/>
        <vers num="release_2004-08-22"/>
        <vers num="release_2004-09-12"/>
        <vers num="release_2004-09-25"/>
        <vers num="release_2004-09-30"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2561" seq="2004-2561" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Internet Software Sciences Web+Center 4.0.1 allow remote attackers to execute arbitrary SQL commands via (1) the ISS_TECH_CENTER_LOGIN cookie in search.asp and (2) one or more cookies in DoCustomerOptions.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5RP0N0ADGK.html" adv="1">http://www.securiteam.com/windowsntfocus/5RP0N0ADGK.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10771">10771</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16775">webcenter-cookie-sql-injection(16775)</ref>
    </refs>
    <vuln_soft>
      <prod name="web+center" vendor="internet_sofware_sciences">
        <vers num="4.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2562" seq="2004-2562" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in jobedit.asp in Leigh Business Enterprises (LBE) Web Helpdesk before 4.0.0.81 allows remote attackers to execute arbitrary SQL commands via the id parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.lbehelpdesk.com/patch/web/history.txt">http://www.lbehelpdesk.com/patch/web/history.txt</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5QP0M0ADGI.html" patch="1">http://www.securiteam.com/windowsntfocus/5QP0M0ADGI.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10773" patch="1">10773</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16779">webhelpdesk-jobedit-sql-injection(16779)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_helpdesk" vendor="leigh_business_enterprises">
        <vers num="1.2_1999-07-00"/>
        <vers num="1.3_2000-07-00"/>
        <vers num="1.4_2000-08-00"/>
        <vers num="4.0.0.33_2001-05-00"/>
        <vers num="4.0.0.35_2001-06-04"/>
        <vers num="4.0.0.38_2001-06-10"/>
        <vers num="4.0.0.40_2001-07-21"/>
        <vers num="4.0.0.41_2001-08-27"/>
        <vers num="4.0.0.43_2001-09-28"/>
        <vers num="4.0.0.50"/>
        <vers num="4.0.0.52"/>
        <vers num="4.0.0.53"/>
        <vers num="4.0.0.54"/>
        <vers num="4.0.0.59"/>
        <vers num="4.0.0.60"/>
        <vers num="4.0.0.61"/>
        <vers num="4.0.0.62"/>
        <vers num="4.0.0.63"/>
        <vers num="4.0.0.64"/>
        <vers num="4.0.0.65"/>
        <vers num="4.0.0.66"/>
        <vers num="4.0.0.67"/>
        <vers num="4.0.0.68"/>
        <vers num="4.0.0.69"/>
        <vers num="4.0.0.70"/>
        <vers num="4.0.0.71"/>
        <vers num="4.0.0.72"/>
        <vers num="4.0.0.73"/>
        <vers num="4.0.0.74"/>
        <vers num="4.0.0.75"/>
        <vers num="4.0.0.76"/>
        <vers num="4.0.0.77"/>
        <vers num="4.0.0.78"/>
        <vers num="4.0.0.79"/>
        <vers num="4.0.0.80"/>
        <vers num="4.0_2001-03-00"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2563" seq="2004-2563" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Serena TeamTrack 6.1.1 allows remote attackers to obtain sensitive information such as user names, versions, and database information, and conduct cross-site scripting (XSS) attacks, via a direct request to tmtrack.dll with modified LoginPage and Template parameters.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5SP0O0ADGG.html">http://www.securiteam.com/windowsntfocus/5SP0O0ADGG.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10770">10770</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16771">teamtrack-tmtrackdll-xss(16771)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16777">teamtrack-loginpage-information-disclosure(16777)</ref>
    </refs>
    <vuln_soft>
      <prod name="serena_teamtrack" vendor="serena_software">
        <vers num="6.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2564" seq="2004-2564" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, allow remote attackers to inject arbitrary web script or HTML via (1) the show parameter in show.asp and (2) the title parameter in showperf.asp.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010353">1010353</ref>
      <ref source="MISC" url="http://www.oliverkarow.de/research/sambar.txt">http://www.oliverkarow.de/research/sambar.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10444">10444</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16286">sambar-show-showperf-xss(16286)</ref>
    </refs>
    <vuln_soft>
      <prod name="sambar_server" vendor="sambar">
        <vers num="6.1" edition="beta2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2565" seq="2004-2565" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, when the administrative IP address restrictions have been modified from the default, allow remote authenticated users to read arbitrary files via (1) a "..\" (dot dot backslash) in the file parameter to showini.asp, or (2) an absolute path with drive letter in the log parameter to showlog.asp.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010353">1010353</ref>
      <ref source="MISC" url="http://www.oliverkarow.de/research/sambar.txt">http://www.oliverkarow.de/research/sambar.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10444">10444</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16287">sambar-multiple-directory-traversal(16287)</ref>
    </refs>
    <vuln_soft>
      <prod name="sambar_server" vendor="sambar">
        <vers num="6.1" edition="beta2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2566" seq="2004-2566" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in LiveWorld products, possibly including (1) LiveForum, (2) LiveQ&amp;A, (3) LiveChat, and (4) LiveFocusGroup, allow remote attackers to inject arbitrary web script or HTML via the q parameter in (a) search.jsp, (b) findclub!execute.jspa, and (c) search!execute.jspa.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0326.html">20040824 Possible Security Issues In LiveWorld Products</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011036">1011036</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00044-08232004">http://www.gulftech.org/?node=research&amp;article_id=00044-08232004</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17104">liveworld-xss(17104)</ref>
    </refs>
    <vuln_soft>
      <prod name="livechat" vendor="liveworld">
        <vers num=""/>
      </prod>
      <prod name="livefocusgroup" vendor="liveworld">
        <vers num=""/>
      </prod>
      <prod name="liveforum" vendor="liveworld">
        <vers num=""/>
      </prod>
      <prod name="liveq_and_a" vendor="liveworld">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2567" seq="2004-2567" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in ReciPants 1.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) user id, (2) recipe id, (3) category id, and (4) other ID number fields.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009984" patch="1">1009984</ref>
      <ref source="MISC" url="http://sourceforge.net/project/shownotes.php?group_id=90737&amp;release_id=234415" patch="1">http://sourceforge.net/project/shownotes.php?group_id=90737&amp;release_id=234415</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10250" patch="1">10250</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16024">recipants-id-sql-injection(16024)</ref>
    </refs>
    <vuln_soft>
      <prod name="recipants" vendor="recipants">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2568" seq="2004-2568" published="2004-12-31" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in ReciPants 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) user id, (2) recipe id, (3) category id, and (4) other ID number fields.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009984" patch="1">1009984</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=90737&amp;release_id=234415" patch="1">http://sourceforge.net/project/shownotes.php?group_id=90737&amp;release_id=234415</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10250" patch="1">10250</ref>
    </refs>
    <vuln_soft>
      <prod name="recipants" vendor="recipants">
        <vers num="1.0"/>
        <vers num="1.0.1"/>
        <vers num="1.1"/>
        <vers num="1.1.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2569" seq="2004-2569" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">ipmenu 0.0.3 before Debian GNU/Linux ipmenu_0.0.3-5 allows local users to overwrite arbitrary files via a symlink attack on the ipmenu.log temporary file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=244709">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=244709</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010064">1010064</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2005/dsa-907" adv="1" patch="1">DSA-907</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10269">10269</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16052">ipmenu-symlink(16052)</ref>
    </refs>
    <vuln_soft>
      <prod name="ipmenu" vendor="david_stes">
        <vers num="0.0.3"/>
        <vers num="0.0.3-2"/>
        <vers num="0.0.3-3"/>
        <vers num="0.0.3-4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2570" seq="2004-2570" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Opera before 7.54 allows remote attackers to modify properties and methods of the location object and execute Javascript to read arbitrary files from the client's local filesystem or display a false URL to the user.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0131.html">20040805 Opera: Location, Location, Location</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200408-05.xml" patch="1">GLSA-200408-05</ref>
      <ref source="MISC" url="http://www.greymagic.com/security/advisories/gm008-op/" adv="1">http://www.greymagic.com/security/advisories/gm008-op/</ref>
      <ref source="CONFIRM" url="http://www.opera.com/docs/changelogs/windows/754/" patch="1">http://www.opera.com/docs/changelogs/windows/754/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10873" patch="1">10873</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16904">opera-location-method-overwrite(16904)</ref>
    </refs>
    <vuln_soft>
      <prod name="opera_web_browser" vendor="opera_software">
        <vers num="5.0.2"/>
        <vers num="5.1.0"/>
        <vers num="5.1.1"/>
        <vers num="6.0.3"/>
        <vers num="6.0.4"/>
        <vers num="6.0.5"/>
        <vers num="6.0.6"/>
        <vers num="7.0"/>
        <vers num="7.0.1"/>
        <vers num="7.0.2"/>
        <vers num="7.0.3"/>
        <vers num="7.0_beta1"/>
        <vers num="7.0_beta2"/>
        <vers num="7.10"/>
        <vers num="7.11"/>
        <vers num="7.11b"/>
        <vers num="7.11j"/>
        <vers num="7.20"/>
        <vers num="7.20_beta1_build2981"/>
        <vers num="7.21"/>
        <vers num="7.22"/>
        <vers num="7.23"/>
        <vers num="7.50"/>
        <vers num="7.50b1"/>
        <vers num="7.51"/>
        <vers num="7.52"/>
        <vers num="7.53"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2571" seq="2004-2571" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in EnderUNIX isoqlog 2.1.1 allow remote attackers to execute arbitrary code via the (1) parseQmailFromBytesLine, (2) parseQmailToRemoteLine, (3) parseQmailToLocalLine, (4) parseSendmailFromBytesLine, (5) parseSendmailToLine, (6) parseEximFromBytesLine, and (7) parseEximToLine functions in Parser.c; allow local users to execute arbitrary code via the (8) lowercase and (9) check_syslog_date functions in Parser.c, and (10) unspecified functions in Dir.c; and allow unspecified attackers to execute arbitrary code via the (11) loadconfig and (12) removespaces functions in loadconfig.c, the (13) loadLang function in LangCfg.c, and (14) unspecified functions in Html.c.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-05/0298.html">20040528 EnderUNIX Security Anouncement (Isoqlog and Spamguard)</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010292" patch="1">1010292</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10433" patch="1">10433</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16308">isoqlog-multiple-bo(16308)</ref>
    </refs>
    <vuln_soft>
      <prod name="isoqlog" vendor="enderunix">
        <vers num="2.1.1"/>
        <vers num="2.2_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2572" seq="2004-2572" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">AMAX Magic Winmail Server 3.6 allows remote attackers to obtain sensitive information by entering (1) invalid characters such as "()" or (2) a large number of characters in the Lookup field on the netaddressbook.php web form, which reveals the path in an ldaplib.php error message when the ldap_search function fails, due to improper processing of the $keyword variable.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/ldaplib/ldaplib.php%20reveal%20local%20path%20of%20Winmail%203.6%20webmail%20directory.txt">http://members.lycos.co.uk/r34ct/main/ldaplib/ldaplib.php%20reveal%20local%20path%20of%20Winmail%203.6%20webmail%20directory.txt</ref>
      <ref source="CONFIRM" url="http://www.magicwinmail.net/download/english-help.chm">http://www.magicwinmail.net/download/english-help.chm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9786">9786</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15361">magic-winmail-path-disclosure(15361)</ref>
    </refs>
    <vuln_soft>
      <prod name="magic_winmail_server" vendor="amax_information_technologies">
        <vers num="3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2573" seq="2004-2573" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in tables_update.inc.php in phpGroupWare 0.9.14.005 and earlier allows remote attackers to execute arbitrary PHP code via an external URL in the appdir parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/12074">12074</ref>
      <ref source="CONFIRM" url="https://savannah.gnu.org/bugs/?func=detailitem&amp;item_id=7478">https://savannah.gnu.org/bugs/?func=detailitem&amp;item_id=7478</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.14.003"/>
        <vers num="0.9.14.005" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2574" seq="2004-2574" published="2004-12-31" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in phpGroupWare 0.9.14.005 and earlier allows remote attackers to inject arbitrary web script or HTML via the date parameter in a calendar.uicalendar.planner menuaction.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/12082" patch="1">12082</ref>
      <ref source="CONFIRM" url="https://savannah.gnu.org/bugs/?func=detailitem&amp;item_id=7478">https://savannah.gnu.org/bugs/?func=detailitem&amp;item_id=7478</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.16.000"/>
        <vers num="0.9.16.002"/>
        <vers num="0.9.16.003"/>
        <vers num="0.9.16.005" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2575" seq="2004-2575" published="2004-12-31" modified="2011-03-07" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">phpGroupWare 0.9.14.005 and earlier allow remote attackers to obtain sensitive information via a direct request to (1) hook_admin.inc.php, (2) hook_home.inc.php, (3) class.holidaycalc.inc.php, and (4) setup.inc.php.sample, which reveals the path in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="https://savannah.gnu.org/bugs/?func=detailitem&amp;item_id=7478">https://savannah.gnu.org/bugs/?func=detailitem&amp;item_id=7478</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.16.000"/>
        <vers num="0.9.16.002"/>
        <vers num="0.9.16.003"/>
        <vers num="0.9.16.005"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2576" seq="2004-2576" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">class.vfs_dav.inc.php in phpGroupWare 0.9.16.000 does not create .htaccess files to enable authorization checks for access to users' home-directory files, which allows remote attackers to obtain sensitive information from these files.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/19195">phpgroupware-classvfsdavinc-security-bypass(19195)</ref>
      <ref source="CONFIRM" url="https://savannah.gnu.org/bugs/?func=detailitem&amp;item_id=8359">https://savannah.gnu.org/bugs/?func=detailitem&amp;item_id=8359</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.16.000"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2577" seq="2004-2577" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The acl_check function in phpGroupWare 0.9.16RC2 always returns True, even when mkdir does not behave as expected, which could allow remote attackers to obtain sensitive information via WebDAV from users' home directories that lack .htaccess files, and possibly has other unknown impacts.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/12237" patch="1">12237</ref>
      <ref source="CONFIRM" url="https://savannah.gnu.org/bugs/?func=detailitem&amp;item_id=7227">https://savannah.gnu.org/bugs/?func=detailitem&amp;item_id=7227</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.16rc1"/>
        <vers num="0.9.16rc2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2578" seq="2004-2578" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">phpGroupWare before 0.9.16.002 transmits the (1) header admin and (2) setup passwords in plaintext via cookies, which allows remote attackers to sniff passwords.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/10895">10895</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16970">phpgroupware-plaintext-password(16970)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpgroupware" vendor="phpgroupware">
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.3"/>
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
        <vers num="0.9.9_pl1"/>
        <vers num="0.9.10"/>
        <vers num="0.9.12"/>
        <vers num="0.9.13"/>
        <vers num="0.9.14.003"/>
        <vers num="0.9.14.005"/>
        <vers num="0.9.14.006"/>
        <vers num="0.9.14.007"/>
        <vers num="0.9.16.000"/>
        <vers num="0.9.16.001"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2579" seq="2004-2579" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ACLCHECK module in Novell iChain 2.3 allows attackers to bypass access control rules of an unspecified component via an unspecified attack vector involving a string that contains escape sequences represented with "overlong UTF-8 encoding."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011074">1011074</ref>
      <ref source="CONFIRM" url="http://support.novell.com/cgi-bin/search/searchtid.cgi?2972080.htm">http://support.novell.com/cgi-bin/search/searchtid.cgi?2972080.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11061" patch="1">11061</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17132">ichain-access-control-bypass(17132)</ref>
    </refs>
    <vuln_soft>
      <prod name="ichain" vendor="novell">
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2580" seq="2004-2580" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Novell iChain 2.3 allows remote attackers to obtain login credentials via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011074" patch="1">1011074</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11061" patch="1">11061</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17133">ichain-xss(17133)</ref>
    </refs>
    <vuln_soft>
      <prod name="ichain" vendor="novell">
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2581" seq="2004-2581" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Novell iChain 2.3 allows attackers to cause a denial of service via a URL with a "specific string."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011074" patch="1">1011074</ref>
      <ref source="CONFIRM" url="http://support.novell.com/cgi-bin/search/searchtid.cgi?2972080.htm">http://support.novell.com/cgi-bin/search/searchtid.cgi?2972080.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11061" patch="1">11061</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17134">ichain-dos(17134)</ref>
    </refs>
    <vuln_soft>
      <prod name="ichain" vendor="novell">
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2582" seq="2004-2582" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Novell iChain 2.3 includes the build number in the VIA line of the proxy server's HTTP headers, which allows remote attackers to obtain sensitive information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011074" patch="1">1011074</ref>
      <ref source="CONFIRM" url="http://support.novell.com/cgi-bin/search/searchtid.cgi?2972080.htm">http://support.novell.com/cgi-bin/search/searchtid.cgi?2972080.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11061" patch="1">11061</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17135">ichain-build-version-disclosure(17135)</ref>
    </refs>
    <vuln_soft>
      <prod name="ichain" vendor="novell">
        <vers num="2.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2583" seq="2004-2583" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">SMTP service in SmarterTools SmarterMail 1.6.1511 and 1.6.1529 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous open connections to TCP port 25.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/smarter_mail%203.1/smarter_mail.txt">http://members.lycos.co.uk/r34ct/main/smarter_mail%203.1/smarter_mail.txt</ref>
      <ref source="MISC" url="http://www.zone-h.org/advisories/read/id=4098" adv="1">http://www.zone-h.org/advisories/read/id=4098</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15391">smartermail-multiple-connection-dos(15391)</ref>
    </refs>
    <vuln_soft>
      <prod name="smartermail" vendor="smartertools">
        <vers num="1.6.1511"/>
        <vers num="1.6.1529"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2584" seq="2004-2584" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">frmAddfolder.aspx in SmarterTools SmarterMail 1.6.1511 and 1.6.1529 allows remote authenticated users to create a folder that SmarterMail cannot delete or rename via a folder name with a null byte ("%00"). NOTE: it is not clear whether this issue poses a vulnerability.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15392">smartermail-frmaddfolder-file-manipulation(15392)</ref>
    </refs>
    <vuln_soft>
      <prod name="smartermail" vendor="smartertools">
        <vers num="1.6.1511"/>
        <vers num="1.6.1529"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2585" seq="2004-2585" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in frmCompose.aspx in SmarterTools SmarterMail 1.6.1511 and 1.6.1529 allows remote attackers to inject arbitrary web script or HTML via Javascript to the "check spelling" feature in the compose area.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/smarter_mail%203.1/smarter_mail.txt">http://members.lycos.co.uk/r34ct/main/smarter_mail%203.1/smarter_mail.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009307">1009307</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9805">9805</ref>
      <ref source="MISC" url="http://www.zone-h.org/advisories/read/id=4098" adv="1">http://www.zone-h.org/advisories/read/id=4098</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15393">smartermail-spellchecker-xss(15393)</ref>
    </refs>
    <vuln_soft>
      <prod name="smartermail" vendor="smartertools">
        <vers num="1.6.1511"/>
        <vers num="1.6.1529"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2586" seq="2004-2586" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in frmGetAttachment.aspx in SmarterTools SmarterMail 1.6.1511 and 1.6.1529 allows remote attackers to read arbitrary files via the filename parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/smarter_mail%203.1/smarter_mail.txt">http://members.lycos.co.uk/r34ct/main/smarter_mail%203.1/smarter_mail.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009307">1009307</ref>
      <ref source="MISC" url="http://www.zone-h.org/advisories/read/id=4098" adv="1">http://www.zone-h.org/advisories/read/id=4098</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15389">smartermail-dotdot-directory-traversal(15389)</ref>
    </refs>
    <vuln_soft>
      <prod name="smartermail" vendor="smartertools">
        <vers num="1.6.1511"/>
        <vers num="1.6.1529"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2587" seq="2004-2587" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">login.aspx in SmarterTools SmarterMail 1.6.1511 and 1.6.1529 allows remote attackers to cause a denial of service via a long txtusername parameter, possibly due to a buffer overflow.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://members.lycos.co.uk/r34ct/main/smarter_mail%203.1/smarter_mail.txt">http://members.lycos.co.uk/r34ct/main/smarter_mail%203.1/smarter_mail.txt</ref>
      <ref source="MISC" url="http://www.zone-h.org/advisories/read/id=4098" adv="1">http://www.zone-h.org/advisories/read/id=4098</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15390">smartermail-login-dos(15390)</ref>
    </refs>
    <vuln_soft>
      <prod name="smartermail" vendor="smartertools">
        <vers num="1.6.1511"/>
        <vers num="1.6.1529"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2588" seq="2004-2588" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Intentional information leak in phpinfo.php in XMB (aka extreme message board) 1.9 beta (aka Nexus beta) allows remote attackers to obtain sensitive information such as the configuration of the web server and the PHP application.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0265.html" adv="1">20040326 [waraxe-2004-SA#012 - Multiple vulnerabilities in XMB Forum 1.8 SP3 and 1.9 beta]</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108032355905265&amp;w=2">20040326 [waraxe-2004-SA#012 - Multiple vulnerabilities in XMB Forum 1.8 Partagium SP3 and 1.9 Nexus Beta]</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009561">1009561</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9983">9983</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15656">xmb-phpinfo-obtain-information(15656)</ref>
    </refs>
    <vuln_soft>
      <prod name="xmb_forum" vendor="xmb_software">
        <vers num="1.9_nexus_beta"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2589" seq="2004-2589" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Gaim before 0.82 allows remote servers to cause a denial of service (application crash) via a long HTTP Content-Length header, which causes Gaim to abort when attempting to allocate memory.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://gaim.sourceforge.net/security/?id=6">http://gaim.sourceforge.net/security/?id=6</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011083">1011083</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11056" patch="1">11056</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17150">gaim-content-length-dos(17150)</ref>
    </refs>
    <vuln_soft>
      <prod name="gaim" vendor="rob_flynn">
        <vers num="0.10"/>
        <vers num="0.10.3"/>
        <vers num="0.50"/>
        <vers num="0.51"/>
        <vers num="0.52"/>
        <vers num="0.53"/>
        <vers num="0.54"/>
        <vers num="0.55"/>
        <vers num="0.56"/>
        <vers num="0.57"/>
        <vers num="0.58"/>
        <vers num="0.59"/>
        <vers num="0.59.1"/>
        <vers num="0.60"/>
        <vers num="0.61"/>
        <vers num="0.62"/>
        <vers num="0.63"/>
        <vers num="0.64"/>
        <vers num="0.65"/>
        <vers num="0.66"/>
        <vers num="0.67"/>
        <vers num="0.68"/>
        <vers num="0.69"/>
        <vers num="0.70"/>
        <vers num="0.71"/>
        <vers num="0.72"/>
        <vers num="0.73"/>
        <vers num="0.74"/>
        <vers num="0.75"/>
        <vers num="0.76"/>
        <vers num="0.77"/>
        <vers num="0.78"/>
        <vers num="0.79"/>
        <vers num="0.80"/>
        <vers num="0.81"/>
        <vers num="0.82"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2590" seq="2004-2590" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in meindlSOFT Cute PHP Library (aka cphplib) 0.46 has unknown impact and attack vectors, related to regular expressions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://prdownloads.sourceforge.net/cphplib/cphplib-0.47.tar.gz?download">http://prdownloads.sourceforge.net/cphplib/cphplib-0.47.tar.gz?download</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011076" patch="1">1011076</ref>
      <ref source="CONFIRM" url="http://www.meindlsoft.com/cphplib_changelog.php">http://www.meindlsoft.com/cphplib_changelog.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11062" patch="1">11062</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17145">cphplib-parameter-improper-validation(17145)</ref>
    </refs>
    <vuln_soft>
      <prod name="cute_php_library" vendor="meindlsoft">
        <vers num="0.46"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2591" seq="2004-2591" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The data-overwrite capability of ButtUglySoftware CleanCache 2.19 does not properly overwrite data in files, which allows attackers to recover the data.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-12/0418.html">20041225 CleanCache v2.19: False Sense of Security</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012701">1012701</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12117">12117</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18692">cleancache-information-disclosure(18692)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2592" seq="2004-2592" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Quake II server before R1Q2, as used in multiple products, allows remote attackers to cause a denial of service (application crash) via a modified client that asks the server to send data stored at a negative array offset, which is not handled when processing Configstrings and Baselines.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0299.html">20041027 Multiple Vulnerabilites in Quake II Server</ref>
      <ref source="MISC" url="http://secur1ty.net/advisories/001" adv="1">http://secur1ty.net/advisories/001</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011979">1011979</ref>
      <ref source="CONFIRM" url="http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/">http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11551">11551</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17890">quake-configstrings-baselines-dos(17890)</ref>
    </refs>
    <vuln_soft>
      <prod name="quake_ii_server" vendor="id_software">
        <vers num="3.20"/>
        <vers num="3.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2593" seq="2004-2593" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in command-packet processing of Quake II server before R1Q2, as used in multiple products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a packet with a long cmd_args buffer.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0299.html">20041027 Multiple Vulnerabilites in Quake II Server</ref>
      <ref source="MISC" url="http://secur1ty.net/advisories/001" adv="1">http://secur1ty.net/advisories/001</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011979">1011979</ref>
      <ref source="CONFIRM" url="http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/">http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11551">11551</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17891">quake-cmdargs-bo(17891)</ref>
    </refs>
    <vuln_soft>
      <prod name="quake_ii_server" vendor="id_software">
        <vers num="3.20"/>
        <vers num="3.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2594" seq="2004-2594" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Absolute path traversal vulnerability in Quake II server before R1Q2 on Windows, as used in multiple products, allows remote attackers to read arbitrary files via a "\/" in a pathname argument, as demonstrated by "download \/server.cfg".</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0299.html">20041027 Multiple Vulnerabilites in Quake II Server</ref>
      <ref source="MISC" url="http://secur1ty.net/advisories/001" adv="1">http://secur1ty.net/advisories/001</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011979">1011979</ref>
      <ref source="CONFIRM" url="http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/">http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11551">11551</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17892">quake-path-information-disclosure(17892)</ref>
    </refs>
    <vuln_soft>
      <prod name="quake_ii_server_windows" vendor="id_software">
        <vers num="3.20"/>
        <vers num="3.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2595" seq="2004-2595" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Absolute path traversal vulnerability in Quake II server before R1Q2 on Linux, as used in multiple products, allows remote attackers to cause a denial of service (application crash) via a download command with a full pathname for a directory in the argument, which causes the server to crash when it cannot read data.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0299.html">20041027 Multiple Vulnerabilites in Quake II Server</ref>
      <ref source="MISC" url="http://secur1ty.net/advisories/001" adv="1">http://secur1ty.net/advisories/001</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011979">1011979</ref>
      <ref source="CONFIRM" url="http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/">http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11551">11551</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17893">quake-path-dos(17893)</ref>
    </refs>
    <vuln_soft>
      <prod name="quake_ii_server_linux" vendor="id_software">
        <vers num="3.20"/>
        <vers num="3.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2596" seq="2004-2596" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Quake II server before R1Q2, as used in multiple products, allows remote attackers to cause a denial of service (exhaustion of connection slots) via a large number of connections from the same IP address.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0299.html">20041027 Multiple Vulnerabilites in Quake II Server</ref>
      <ref source="MISC" url="http://secur1ty.net/advisories/001" adv="1">http://secur1ty.net/advisories/001</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011979">1011979</ref>
      <ref source="CONFIRM" url="http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/">http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11551">11551</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17894">quake-mult-conn-dos(17894)</ref>
    </refs>
    <vuln_soft>
      <prod name="quake_ii_server" vendor="id_software">
        <vers num="3.20"/>
        <vers num="3.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2597" seq="2004-2597" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Quake II server before R1Q2, as used in multiple products, allows remote attackers to bypass IP-based access control rules via a userinfo string that already contains an "ip" key/value pair but is also long enough to cause a new key/value pair to be truncated, which interferes with the server's ability to find the client's IP address.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0299.html">20041027 Multiple Vulnerabilites in Quake II Server</ref>
      <ref source="MISC" url="http://secur1ty.net/advisories/001" adv="1">http://secur1ty.net/advisories/001</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011979">1011979</ref>
      <ref source="CONFIRM" url="http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/">http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11551">11551</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17895">quake-ip-spoofing(17895)</ref>
    </refs>
    <vuln_soft>
      <prod name="quake_ii_server" vendor="id_software">
        <vers num="3.20"/>
        <vers num="3.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2598" seq="2004-2598" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Quake II server before R1Q2, as used in multiple products, allows remote attackers to corrupt the server's client state data structure by exiting a session without a valid disconnect command, then reconnecting, which prevents a mod from being notified of changes in the client state.  NOTE: the impact of this issue will vary depending on which mod is being used.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0299.html">20041027 Multiple Vulnerabilites in Quake II Server</ref>
      <ref source="MISC" url="http://secur1ty.net/advisories/001" adv="1">http://secur1ty.net/advisories/001</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011979">1011979</ref>
      <ref source="CONFIRM" url="http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/">http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11551">11551</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2599" seq="2004-2599" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Quake II server before R1Q2, as used in multiple products, allow local users to cause a denial of service (application crash) via the server console or rcon.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0299.html">20041027 Multiple Vulnerabilites in Quake II Server</ref>
      <ref source="MISC" url="http://secur1ty.net/advisories/001" adv="1">http://secur1ty.net/advisories/001</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011979">1011979</ref>
      <ref source="CONFIRM" url="http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/">http://web.archive.org/web/20041130092749/www.r1ch.net/stuff/r1q2/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17898">quake-bo(17898)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2600" seq="2004-2600" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The firmware for Intelligent Platform Management Interface (IPMI) 1.5-based Intel Server Boards and Platforms is shipped with an Authentication Type Enables parameter set to an invalid None parameter, which allows remote attackers to obtain sensitive information when LAN management functionality is enabled.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://download.intel.com/support/motherboards/server/sb/aa6791invalidlanconfiguration040504.pdf" adv="1">ftp://download.intel.com/support/motherboards/server/sb/aa6791invalidlanconfiguration040504.pdf</ref>
      <ref source="MISC" url="http://support.intel.com/support/motherboards/server/sb/CS-010422.htm">http://support.intel.com/support/motherboards/server/sb/CS-010422.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10068">10068</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15775">intel-ssu-gain-access(15775)</ref>
    </refs>
    <vuln_soft>
      <prod name="cli_auto-configuration_utility" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="client_system_setup_utility" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="server_configuration_wizard" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="server_control" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="system_setup_utility" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="carrier_grade_server_cc2300" vendor="hp">
        <vers num="a6898a"/>
        <vers num="a6899a"/>
      </prod>
      <prod name="carrier_grade_server_cc3300" vendor="hp">
        <vers num="a6900a"/>
        <vers num="a6901a"/>
      </prod>
      <prod name="carrier_grade_server_cc3310" vendor="hp">
        <vers num="a9862a"/>
        <vers num="a9863a"/>
      </prod>
      <prod name="carrier_grade_server_tigpr2u" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="carrier_grade_server_tsrlt2" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="carrier_grade_server_tsrmt2" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="entry_server_board_se7210tp1-e" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="entry_server_platform_sr1325tp1-e" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="server_board_scb2" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="server_board_sds2" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="server_board_se7500wv2" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="server_board_se7501hg2" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="server_board_shg2" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="server_platform_spsh4" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="server_platform_sr870bh2" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="server_platform_sr870bn4" vendor="intel">
        <vers num=""/>
      </prod>
      <prod name="server_platform_srsh4" vendor="intel">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2601" seq="2004-2601" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in UberTec Help Center Live (HCL) allows remote attackers to read local files and possibly execute PHP code via a URL in the SKIN_inner parameter to inc/skin.php.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012685">1012685</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00058-12242004">http://www.gulftech.org/?node=research&amp;article_id=00058-12242004</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18695">help-center-skin-php-file-include(18695)</ref>
    </refs>
    <vuln_soft>
      <prod name="help_center_live" vendor="ubertec">
        <vers num="1.2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2602" seq="2004-2602" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in UberTec Help Center Live (HCL) before 1.2.7 allows remote attackers to execute arbitrary PHP code via a URL in the HCL_path parameter to pipe.php.</descript>
    </desc>
    <impacts>
      <impact source="nvd">Successful exploitation requires that "register_globals" is enabled.</impact>
    </impacts>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012685">1012685</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00058-12242004">http://www.gulftech.org/?node=research&amp;article_id=00058-12242004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12105">12105</ref>
      <ref source="CONFIRM" url="http://www.ubertec.co.uk/forums/showthread/php?t=2376" patch="1">http://www.ubertec.co.uk/forums/showthread/php?t=2376</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18694">help-center-php-file-include(18694)</ref>
    </refs>
    <vuln_soft>
      <prod name="help_center_live" vendor="ubertec">
        <vers num="1.1"/>
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2603" seq="2004-2603" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Search module in UberTec Help Center Live (HCL) allows remote attackers to inject arbitrary web script or HTML via the find parameter to index.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012685">1012685</ref>
      <ref source="MISC" url="http://www.gulftech.org/?node=research&amp;article_id=00058-12242004">http://www.gulftech.org/?node=research&amp;article_id=00058-12242004</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12105">12105</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18696">help-center-index-xss(18696)</ref>
    </refs>
    <vuln_soft>
      <prod name="help_center_live" vendor="ubertec">
        <vers num="1.0"/>
        <vers num="1.2"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2604" seq="2004-2604" published="2004-12-31" modified="2017-07-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in PHProxy allows remote attackers to inject arbitrary web script or HTML via the error parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012702">1012702</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12115">12115</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18697">phproxy-error-xss(18697)</ref>
    </refs>
    <vuln_soft>
      <prod name="phproxy" vendor="phproxy">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2605" seq="2004-2605" published="2004-12-31" modified="2017-07-10" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">aStats 1.6.5 allows local users to overwrite arbitrary files via a symlink attack on (1) the aStats-Graphic-Signature-Generation file and (2) certain PNG image files.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=287604">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=287604</ref>
      <ref source="MLIST" url="http://shellcode.org/pipermail/debian-audit/2004-December/000078.html">[Debian-audit] 20041229 More temporary filenames/dirs related bugs</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12128">12128</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18698">astats-symlink(18698)</ref>
    </refs>
    <vuln_soft>
      <prod name="astats" vendor="astats">
        <vers num="1.6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2606" seq="2004-2606" published="2004-12-31" modified="2017-07-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Web interface in Linksys WRT54G 2.02.7 and BEFSR41 version 3, with the firewall disabled, allows remote attackers to attempt to login to an administration web page, even when the configuration specifies that remote administration is disabled.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="ftp://ftp.linksys.com/pub/network/wrt54g_2.02.8_US_code_beta.zip" patch="1">ftp://ftp.linksys.com/pub/network/wrt54g_2.02.8_US_code_beta.zip</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-05/0316.html">20040531 LinkSys WRT54G administration page availble to WAN</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0002.html">20040601 Re: LinkSys WRT54G administration page availble to WAN</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0020.html">20040602 Additional information on WRT54G administration page</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0190.html">20040602 Re: The Linksys WRT54G "security problem" doesn't exist</ref>
      <ref source="MISC" url="http://web.archive.org/web/20040823075750/http://www.linksys.com/download/firmware.asp?fwid=201" patch="1">http://web.archive.org/web/20040823075750/http://www.linksys.com/download/firmware.asp?fwid=201</ref>
      <ref source="MISC" url="http://www.nwfusion.com/news/2004/0607confuse.html">http://www.nwfusion.com/news/2004/0607confuse.html</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/365175">20040604 The Linksys WRT54G "security problem" doesn't exist</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/365227/30/0/threaded">20040604 RE: The Linksys WRT54G "security problem" doesn't exist</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10441" patch="1">10441</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16274">linksys-remote-bypass-security(16274)</ref>
    </refs>
    <vuln_soft>
      <prod name="befsr41_v3" vendor="linksys">
        <vers num=""/>
      </prod>
      <prod name="wrt54g" vendor="linksys">
        <vers num="2.02.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2607" seq="2004-2607" published="2004-12-31" modified="2010-04-02" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loop from filling a buffer.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1018">DSA-1018</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:072">MDKSA-2006:072</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/16759">16759</ref>
      <ref source="MLIST" url="http://www.uwsg.iu.edu/hypermail/linux/kernel/0404.2/0313.html">[linux-kernel] 20040416 Re: [CHECKER] Probable security holes in 2.6.5</ref>
      <ref source="MLIST" url="http://www.uwsg.iu.edu/hypermail/linux/kernel/0404.2/0743.html">[linux-kernel] 20040416 Re: [CHECKER] Probable security holes in 2.6.5</ref>
      <ref source="MANDRIVA" url="http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044">MDKSA-2006:044</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.18" edition=":x86"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22" edition="pre10"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.4.28"/>
        <vers num="2.4.29" edition="rc1"/>
        <vers num="2.6.0"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2608" seq="2004-2608" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">SmartWebby Smart Guest Book stores SmartGuestBook.mdb (aka the "news database") under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as the unencrypted username and password of the administrator's account.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011084">1011084</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17146">smart-guestbook-database-file-access(17146)</ref>
    </refs>
    <vuln_soft>
      <prod name="smart_guest_book" vendor="smartwebby">
        <vers num="2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2609" seq="2004-2609" published="2004-12-31" modified="2017-07-19" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The stuffit.com executable on Symantec PowerQuest DeployCenter 5.5 boot disks allows local users to obtain sensitive information (an unencrypted password for a Windows domain account) via four "stuffit /f:stuffit.dat" invocations, possibly due to a buffer overflow.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/1180.html">20040827 Power Quest Deploy Center 5.5 boot disks</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011081">1011081</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11068">11068</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17147">powerquest-deploycenter-obtain-password(17147)</ref>
    </refs>
    <vuln_soft>
      <prod name="powerquest_deploycenter" vendor="symantec">
        <vers num="5.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2610" seq="2004-2610" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">mntd_mount.c in mntd before 0.4.2 might allow local users to gain privileges via shell metacharacters in a remount option in the configuration file.  NOTE: It is not clear whether this is a vulnerability because there is not necessarily any common usage in which privilege boundaries are crossed.  Typical usage would restrict write access to the configuration file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://prdownloads.sourceforge.net/mntd/mntd-0.4.2.tar.gz?download" patch="1">http://prdownloads.sourceforge.net/mntd/mntd-0.4.2.tar.gz?download</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011088">1011088</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17149">mntd-read-configuration-gain-privileges(17149)</ref>
    </refs>
    <vuln_soft>
      <prod name="mntd" vendor="stefan_bambach">
        <vers num="0.3.4"/>
        <vers num="0.3.5"/>
        <vers num="0.4.0"/>
        <vers num="0.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2611" seq="2004-2611" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Change Permissions function in the Sophster suite before 0.9.6 28 May 2004 (aka 0.9.6-r5), possibly including Sophster, FreeSophster, and FreeSophsterPAM, removes the (1) setuid, (2) setgid, and (3) sticky bits when changing a file, which might allow attackers to gain privileges or conduct other unauthorized activities.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010431" patch="1">1010431</ref>
      <ref source="CONFIRM" url="http://www.schaefer.dhcp.biz/CHANGELOG.txt">http://www.schaefer.dhcp.biz/CHANGELOG.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16359">sophster-change-permissions-file-access(16359)</ref>
    </refs>
    <vuln_soft>
      <prod name="sophster" vendor="steven_schaefer">
        <vers num="0.9.5_r8"/>
        <vers num="0.9.5_r10"/>
        <vers num="0.9.5_r12"/>
        <vers num="0.9.5_r15"/>
        <vers num="0.9.6_r1"/>
        <vers num="0.9.6_r2"/>
        <vers num="0.9.6_r3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2612" seq="2004-2612" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">BNC 2.9.0 only grants access when an incorrect password is provided, which allows remote attackers to use the functionality intended for authorized users.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.gotbnc.com/changes.html#2.9.1">http://www.gotbnc.com/changes.html#2.9.1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11650" patch="1">11650</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18103">bnc-invalid-password-auth-bypass(18103)</ref>
    </refs>
    <vuln_soft>
      <prod name="bnc" vendor="bnc">
        <vers num="2.9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2613" seq="2004-2613" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in procfs in the Linux-VServer stable branch for the 2.4 kernel before 1.23 and Linux-VServer development branch for the 2.4 kernel before 1.3.5 has unspecified impact and attack vectors, related to "write access to specific proc entries from a vserver context", a different vulnerability than CVE-2004-2408.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://linux-vserver.org/ChangeLog">http://linux-vserver.org/ChangeLog</ref>
      <ref source="MLIST" url="http://list.linux-vserver.org/archive/vserver/msg05824.html">[Vserver] 20050108 [Advisory] procfs in vserver</ref>
    </refs>
    <vuln_soft>
      <prod name="linux-vserver" vendor="vserver">
        <vers num="1.3.0"/>
        <vers num="1.3.1"/>
        <vers num="1.3.2"/>
        <vers num="1.3.3"/>
        <vers num="1.3.4"/>
        <vers num="1.20"/>
        <vers num="1.21"/>
        <vers num="1.22"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2614" seq="2004-2614" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in MyWeb 3.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://fux0r.phathookups.com/advisory/sp-x11-advisory.txt" adv="1">http://fux0r.phathookups.com/advisory/sp-x11-advisory.txt</ref>
      <ref source="MISC" url="http://security-protocols.com/modules.php?name=News&amp;file=article&amp;sid=1931" adv="1">http://security-protocols.com/modules.php?name=News&amp;file=article&amp;sid=1931</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10303">10303</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16101">myweb-long-get-bo(16101)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2615" seq="2004-2615" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The documentation for CuteNews 1.3.6 and possibly other versions specifies that files under cutenews/data must be manually given world-writable permissions, which allows local users to insert false news, delete news, and possibly gain privileges or have other unknown impact.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0396.html" adv="1">20040829 CuteNews News.txt writable to world</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011099">1011099</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17161">cutenews-newstxt-world-writable(17161)</ref>
    </refs>
    <vuln_soft>
      <prod name="cutenews" vendor="cutephp">
        <vers num="1.3.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2616" seq="2004-2616" published="2004-12-31" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The file server in ActivePost Standard 3.1 and earlier allows remote authenticated users to obtain sensitive information by uploading a file, which reveals the path in a success message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://aluigi.altervista.org/adv/actp-adv.txt" adv="1">http://aluigi.altervista.org/adv/actp-adv.txt</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0852.html" adv="1">20040923 Multiple vulnerabilities in ActivePost Standard 3.1</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;amp;m=109597139011373&amp;amp;w=2">20040923 Multiple vulnerabilities in ActivePost Standard 3.1</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011406" adv="1">1011406</ref>
    </refs>
    <vuln_soft>
      <prod name="activepost_standard" vendor="onnuri_infotek">
        <vers num="2.5"/>
        <vers num="3.0"/>
        <vers num="3.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2617" seq="2004-2617" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Pegasi Web Server (PWS) 0.2.2 allows remote attackers to read files outside of the web root via a .. (dot dot) directly after the initial '/' (slash) in the URI.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0109.html" adv="1">20040311 Multiple Vulnerabilities in PWS 0.2.2</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0136.html">20040314 Re: Multiple Vulnerabilities in PWS 0.2.2</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=359660" patch="1">http://sourceforge.net/forum/forum.php?forum_id=359660</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/pws0.2.2-adv.txt" adv="1">http://www.autistici.org/fdonato/advisory/pws0.2.2-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9847" patch="1">9847</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15435">pws-dotdot-directory-traversal(15435)</ref>
    </refs>
    <vuln_soft>
      <prod name="pegasi_web_server" vendor="pegasi_web_server">
        <vers num="0.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2618" seq="2004-2618" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Pegasi Web Server (PWS) 0.2.2 allows remote attackers to inject arbitrary web script or HTML via the URI, directly after the initial '/' (slash).</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0109.html">20040311 Multiple Vulnerabilities in PWS 0.2.2</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-03/0136.html" patch="1">20040314 Re: Multiple Vulnerabilities in PWS 0.2.2</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/forum/forum.php?forum_id=359660" patch="1">http://sourceforge.net/forum/forum.php?forum_id=359660</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/pws0.2.2-adv.txt" adv="1" patch="1">http://www.autistici.org/fdonato/advisory/pws0.2.2-adv.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9847" patch="1">9847</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15436">pws-xss(15436)</ref>
    </refs>
    <vuln_soft>
      <prod name="pegasi_web_server" vendor="pegasi_web_server">
        <vers num="0.2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2619" seq="2004-2619" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">ripMIME 1.3.2.3 and earlier allows remote attackers to bypass e-mail protection via a base64 MIME encoded attachment containing invalid characters that are not properly extracted.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.pldaniels.com/ripmime/CHANGELOG">http://www.pldaniels.com/ripmime/CHANGELOG</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10848" patch="1">10848</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16867">ripmime-attachment-filters-bypass(16867)</ref>
    </refs>
    <vuln_soft>
      <prod name="ripmime" vendor="paul_l_daniels">
        <vers num="1.2.0"/>
        <vers num="1.2.1"/>
        <vers num="1.2.2"/>
        <vers num="1.2.3"/>
        <vers num="1.2.4"/>
        <vers num="1.2.5"/>
        <vers num="1.2.6"/>
        <vers num="1.2.7"/>
        <vers num="1.3.2.0"/>
        <vers num="1.3.2.2"/>
        <vers num="1.3.2.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2620" seq="2004-2620" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The MIMEH_read_headers function in ripMIME 1.3.1.0 does not properly handle trailing "\r" and "\n" characters in headers, which leads to a buffer underflow.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.pldaniels.com/ripmime/CHANGELOG">http://www.pldaniels.com/ripmime/CHANGELOG</ref>
    </refs>
    <vuln_soft>
      <prod name="ripmime" vendor="paul_l_daniels">
        <vers num="1.3.1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2621" seq="2004-2621" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Nortel Contivity VPN Client 2.1.7, 3.00, 3.01, 4.91, and 5.01, when opening a VPN tunnel, does not check the gateway certificate until after a dialog box has been displayed to the user, which creates a race condition that allows remote attackers to perform a man-in-the-middle (MITM) attack.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011846">1011846</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11495">11495</ref>
      <ref source="CONFIRM" url="http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?level=6&amp;category=8&amp;subcategory=6&amp;subtype=&amp;DocumentOID=276620&amp;RenditionID=REND159588">http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?level=6&amp;category=8&amp;subcategory=6&amp;subtype=&amp;DocumentOID=276620&amp;RenditionID=REND159588</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17812">nortel-contivity-gain-access(17812)</ref>
    </refs>
    <vuln_soft>
      <prod name="contivity" vendor="nortel">
        <vers num="2.1.7"/>
        <vers num="3.00"/>
        <vers num="3.01"/>
        <vers num="4.91"/>
        <vers num="5.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2622" seq="2004-2622" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">AClient.exe in Altiris Deployment Solution 6.x and 5.x does not require authentication from the first Deployment Server that it connects to, which allows remote malicious servers to gain administrator access.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0211.html" adv="1">20041021 Critical Vulnerability in Altiris Deployment Server architecture</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0266.html">20041025 RE: Critical Vulnerability in Altiris Deployment Server architecture</ref>
      <ref source="CONFIRM" url="http://packetstorm.linuxsecurity.com/0410-advisories/index2.html">http://packetstorm.linuxsecurity.com/0410-advisories/index2.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011862" adv="1">1011862</ref>
      <ref source="CONFIRM" url="http://www.altiris.com/support/forum/Framesearch.aspx?vpath=/aexkb/public%20articles/6.x/deployment%20solution/kb/ds%20client%20security%20kb%20article%2010-22-04.doc&amp;art=AKB6859&amp;source=Altiris%20Helpdesk&amp;artID=23644&amp;refpara=532392&amp;key=akb6859">http://www.altiris.com/support/forum/Framesearch.aspx?vpath=/aexkb/public%20articles/6.x/deployment%20solution/kb/ds%20client%20security%20kb%20article%2010-22-04.doc&amp;art=AKB6859&amp;source=Altiris%20Helpdesk&amp;artID=23644&amp;refpara=532392&amp;key=akb6859</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11498">11498</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17814">altiris-gain-unauth-access(17814)</ref>
    </refs>
    <vuln_soft>
      <prod name="deployment_server_extension_for_ibm_director" vendor="altiris">
        <vers num="5.0.1"/>
        <vers num="5.5"/>
        <vers num="6.0"/>
        <vers num="6.1" edition="sp1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2623" seq="2004-2623" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unknown vulnerability in Rippy the Aggregator before 0.10, when register_globals is enabled, has unknown attack vectors and impact, possibly related to the "user-controlled filter."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://ansuz.sooke.bc.ca/rippy/ChangeLog">http://ansuz.sooke.bc.ca/rippy/ChangeLog</ref>
      <ref source="CONFIRM" url="http://freshmeat.net/projects/rippy/?branch_id=30091&amp;release_id=173997">http://freshmeat.net/projects/rippy/?branch_id=30091&amp;release_id=173997</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011582">1011582</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17674">rippy-aggregator-registerglobals-enabled(17674)</ref>
    </refs>
    <vuln_soft>
      <prod name="rippy_the_aggregator" vendor="matthew_skala">
        <vers num="0.1"/>
        <vers num="0.2"/>
        <vers num="0.3"/>
        <vers num="0.4"/>
        <vers num="0.5"/>
        <vers num="0.6"/>
        <vers num="0.7"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2624" seq="2004-2624" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in "TextSearch" in WackoWiki 3.5 allows remote attackers to inject arbitrary web script or HTML via the "phrase" parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://wackowiki.com/WackoDownload/VersionHistory?v=yrv">http://wackowiki.com/WackoDownload/VersionHistory?v=yrv</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10860" patch="1">10860</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16878">wackowiki-text-search-xss(16878)</ref>
    </refs>
    <vuln_soft>
      <prod name="wackowiki" vendor="wackowiki">
        <vers num="r3"/>
        <vers num="r3.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2625" seq="2004-2625" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Outblaze Email allows remote attackers to inject arbitrary web script or HTML via Javascript in an attribute of an IMG tag.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0733.html">20040718 Cross-Site Scripting email Outblaze</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Jul/1010735.html">1010735</ref>
      <ref source="MISC" url="http://www.securiteam.com/securitynews/5CP0O20DFI.html">http://www.securiteam.com/securitynews/5CP0O20DFI.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10756">10756</ref>
      <ref source="MISC" url="http://www.swp-zone.org/archivos/advisory-09.txt">http://www.swp-zone.org/archivos/advisory-09.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16788">outblaze-email-xss(16788)</ref>
    </refs>
    <vuln_soft>
      <prod name="outblaze_email" vendor="outblaze">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2626" seq="2004-2626" published="2004-12-31" modified="2017-07-19" severity="Low" CVSS_version="2.0" CVSS_score="3.7" CVSS_base_score="3.7" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">GUI overlay vulnerability in the Java API in Siemens S55 cellular phones allows remote attackers to send unauthorized SMS messages by overlaying a confirmation message with a malicious message.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108308895624565&amp;w=2">20040427 Phenoelit Advisory &lt;wir-haben-auch-mal-was-gefunden #0815 ++++></ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108325033624812&amp;w=2">20040429 Re: Phenoelit Advisory</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Apr/1009959.html">1009959</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10227">10227</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15995">siemens-unauth-sms-message(15995)</ref>
    </refs>
    <vuln_soft>
      <prod name="s55" vendor="siemens">
        <vers num="09.2179"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2627" seq="2004-2627" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Java 2 Micro Edition (J2ME) does not properly validate bytecode, which allows remote attackers to escape the Kilobyte Virtual Machine (KVM) sandbox and execute arbitrary code.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-10/0231.html">20041022 J2ME security vulnerabilities</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-10/0884.html">20041022 J2ME security vulnerabilities</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011898">1011898</ref>
      <ref source="MISC" url="http://www.theregister.co.uk/2004/10/22/mobile_java_peril/">http://www.theregister.co.uk/2004/10/22/mobile_java_peril/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17825">java2-command-execution(17825)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2628" seq="2004-2628" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in thttpd 2.07 beta 0.4, when running on Windows, allow remote attackers to read arbitrary files via a URL that contains (1) a hex-encoded backslash dot-dot sequence ("%5C..") or (2) a drive letter (such as "C:").</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0097.html">20040804 Bug@thttpd</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109164010629836&amp;w=2">20040804 Bug@thttpd</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Aug/1010850.html">1010850</ref>
      <ref source="MISC" url="http://www.acme.com/software/thttpd/#releasenotes">http://www.acme.com/software/thttpd/#releasenotes</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10862">10862</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16882">thttpd-directory-traversal(16882)</ref>
    </refs>
    <vuln_soft>
      <prod name="thttpd" vendor="acme_labs">
        <vers num="2.0.7_beta_0.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2629" seq="2004-2629" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Multiple vulnerabilities in the H.323 protocol implementation for First Virtual Communications Click to Meet Express (when used with H.323 conferencing endpoints), Click to Meet Premier, Conference Server, and V-Gate allow remote attackers to cause a denial of service, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.fvc.com/eng/docs/misc_docs/H.323_Security_Bulletin.pdf">http://support.fvc.com/eng/docs/misc_docs/H.323_Security_Bulletin.pdf</ref>
      <ref source="CERT" url="http://www.cert.org/advisories/CA-2004-01.html" adv="1">CA-2004-01</ref>
      <ref source="MISC" url="http://www.uniras.gov.uk/vuls/2004/006489/h323.htm">http://www.uniras.gov.uk/vuls/2004/006489/h323.htm</ref>
    </refs>
    <vuln_soft>
      <prod name="click_to_meet_express" vendor="first_virtual_communications">
        <vers num="h.323"/>
      </prod>
      <prod name="click_to_meet_premier" vendor="first_virtual_communications">
        <vers num="h.323"/>
      </prod>
      <prod name="conference_server" vendor="first_virtual_communications">
        <vers num="h.323"/>
      </prod>
      <prod name="v-gate" vendor="first_virtual_communications">
        <vers num="h.323"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2630" seq="2004-2630" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The MIME transformation system (transformations/text_plain__external.inc.php) in phpMyAdmin 2.5.0 up to 2.6.0-pl1 allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109816584519779&amp;w=2">20041018 phpMyAdmin: Vulnerability in MIME-based transformation</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=109810251501643&amp;w=2">20041018: phpMyAdmin: Vulnerability in MIME-based transformation</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Oct/1011761.html" patch="1">1011761</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200410-14.xml" patch="1">GLSA-200410-14</ref>
      <ref source="CONFIRM" url="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-2" patch="1">http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-2</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11391" patch="1">11391</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17698">phpmyadmin-command-execution(17698)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmyadmin" vendor="phpmyadmin">
        <vers num="2.5.0"/>
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.2_pl1"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.5_pl1"/>
        <vers num="2.5.5_rc1"/>
        <vers num="2.5.5_rc2"/>
        <vers num="2.5.6_rc1"/>
        <vers num="2.5.6_rc2"/>
        <vers num="2.5.7"/>
        <vers num="2.5.7_pl1"/>
        <vers num="2.6.0_pl1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2631" seq="2004-2631" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Eval injection vulnerability in left.php in phpMyAdmin 2.5.1 up to 2.5.7, when LeftFrameLight is FALSE, allows remote attackers to execute arbitrary PHP code via a crafted table name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0444.html">20040628 php codes injection in phpMyAdmin version 2.5.7.</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0473.html">20040630 Re: php codes injection in phpMyAdmin version 2.5.7.</ref>
      <ref source="MISC" url="http://eagle.kecapi.com/sec/fd/phpMyAdmin.html">http://eagle.kecapi.com/sec/fd/phpMyAdmin.html</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109816584519779&amp;w=2">20041018 phpMyAdmin: Vulnerability in MIME-based transformation</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010614">1010614</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-22.xml">GLSA-200407-22</ref>
      <ref source="CONFIRM" url="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-1" patch="1">http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-1</ref>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/5QP040ADFW.html">http://www.securiteam.com/unixfocus/5QP040ADFW.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10629" patch="1">10629</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16542">phpmyadmin-php-injection(16542)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmyadmin" vendor="phpmyadmin">
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.2_pl1"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.5_pl1"/>
        <vers num="2.5.5_rc1"/>
        <vers num="2.5.5_rc2"/>
        <vers num="2.5.6_rc1"/>
        <vers num="2.5.6_rc2"/>
        <vers num="2.5.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2632" seq="2004-2632" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">phpMyAdmin 2.5.1 up to 2.5.7 allows remote attackers to modify configuration settings and gain unauthorized access to MySQL servers via modified $cfg['Servers'] variables.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0444.html">20040628 php codes injection in phpMyAdmin version 2.5.7.</ref>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0473.html">20040630 Re: php codes injection in phpMyAdmin version 2.5.7.</ref>
      <ref source="MISC" url="http://eagle.kecapi.com/sec/fd/phpMyAdmin.html">http://eagle.kecapi.com/sec/fd/phpMyAdmin.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Jun/1010614.html">1010614</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200407-22.xml" patch="1">GLSA-200407-22</ref>
      <ref source="CONFIRM" url="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-1" patch="1">http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10629" patch="1">10629</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16555">phpmyadmin-code-manipulation(16555)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmyadmin" vendor="phpmyadmin">
        <vers num="2.5.1"/>
        <vers num="2.5.2"/>
        <vers num="2.5.2_pl1"/>
        <vers num="2.5.3"/>
        <vers num="2.5.4"/>
        <vers num="2.5.5"/>
        <vers num="2.5.5_pl1"/>
        <vers num="2.5.5_rc1"/>
        <vers num="2.5.5_rc2"/>
        <vers num="2.5.6_rc1"/>
        <vers num="2.5.6_rc2"/>
        <vers num="2.5.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2633" seq="2004-2633" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Sesamie 1.0 allows remote anonymous attackers to gain access to repositories of other users via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Apr/1009978.html" patch="1">1009978</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=234477" patch="1">http://sourceforge.net/project/shownotes.php?release_id=234477</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10239" patch="1">10239</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16006">sesame-servlets-repository-access(16006)</ref>
    </refs>
    <vuln_soft>
      <prod name="sesame_rdf_container" vendor="arjohn_kampman">
        <vers num="1.0"/>
        <vers num="1.0_pre1"/>
        <vers num="1.0_pre2"/>
        <vers num="1.0_pre3"/>
        <vers num="1.0_pre4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2634" seq="2004-2634" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="6.2" CVSS_base_score="6.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The (1) bos.rte.serv_aid or (2) bos.rte.console filesets in IBM AIX 5.1 and 5.2 allow local users to overwrite arbitrary files via a symlink attack on temporary files via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009975" patch="1">1009975</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10231" patch="1">10231</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IY55789&amp;apar=only">IY55789</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/search.wss?rs=0&amp;q=IY55790&amp;apar=only">IY55790</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16008">aix-console-commands-symlink(16008)</ref>
      <ref source="CONFIRM" url="https://techsupport.services.ibm.com/server/pseries.subscriptionSvcs?mode=18&amp;ID=279" patch="1">https://techsupport.services.ibm.com/server/pseries.subscriptionSvcs?mode=18&amp;ID=279</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2635" seq="2004-2635" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">An ActiveX control for McAfee Security Installer Control System 4.0.0.81 allows remote attackers to access the Windows registry via web pages that use the control's RegQueryValue() method.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="NTBUGTRAQ" url="http://archives.neohapsis.com/archives/ntbugtraq/2004-q2/0026.html">20040425 McAfee VirusScan installer uses insecure ActiveX controls</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10236">10236</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Apr/1009956.html">1009956</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15994">mcafee-virusscan-activex-gain-access(15994)</ref>
    </refs>
    <vuln_soft>
      <prod name="security_installer_control_system" vendor="mcafee">
        <vers num="4.0.0.81"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2636" seq="2004-2636" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">TinyWeb 1.9 allows remote attackers to read source code of scripts via "/./" in the URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/May/1010346.html">1010346</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10445/info">10445</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16275">tinyweb-get-download-scripts(16275)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2637" seq="2004-2637" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">The NAT implementation in Zonet ZSR1104WE Wireless Router Runtime Code Version 2.41 converts IP addresses of inbound connections to the IP address of the router, which allows remote attackers to bypass intended security restrictions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108324905314026&amp;w=2">20040429 Zonet ZSR1104WE Router problem</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009967">1009967</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10225">10225</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16005">zonet-bypass-security(16005)</ref>
    </refs>
    <vuln_soft>
      <prod name="zsr1104we_wireless_router_runtime_code" vendor="zonet">
        <vers num="2.41"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2638" seq="2004-2638" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The Admin Access With Levels plugin in osCommerce 1.5.1 allows remote attackers to access files in the "admin/" directory by modifying the in_login parameter to a non-zero value.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://secwatch.org/advisories/1007857" adv="1" patch="1">http://secwatch.org/advisories/1007857</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10235">10235</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16009">oscommerce-plugin-bypass-security(16009)</ref>
    </refs>
    <vuln_soft>
      <prod name="oscommerce" vendor="oscommerce">
        <vers num="1.5.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2639" seq="2004-2639" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Journalness 3.0.7 and earlier allows remote attackers to create or modify posts via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Apr/1009909.html" patch="1">1009909</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15923">journalness-data-manipulation(15923)</ref>
      <ref source="CONFIRM" url="https://sourceforge.net/project/shownotes.php?release_id=232566&amp;group_id=101583">https://sourceforge.net/project/shownotes.php?release_id=232566&amp;group_id=101583</ref>
    </refs>
    <vuln_soft>
      <prod name="journalness" vendor="drew_withers">
        <vers num="1.11"/>
        <vers num="1.12"/>
        <vers num="1.12_r1"/>
        <vers num="1.13"/>
        <vers num="1.13_r1"/>
        <vers num="2.1"/>
        <vers num="2.1.1"/>
        <vers num="2.1.2"/>
        <vers num="2.1.4"/>
        <vers num="3.0.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0.5"/>
        <vers num="3.0.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2640" seq="2004-2640" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in lstat.cgi in LinuxStat before 2.3.1 allows remote attackers to read arbitrary files via (1) .. (dot dot) sequences or (2) absolute paths to the template parameter.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011920">1011920</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=277371">http://sourceforge.net/project/shownotes.php?release_id=277371</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11517" patch="1">11517</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17833">linuxstat-template-directory-traversal(17833)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2641" seq="2004-2641" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Sun Fire 3800/4800/4810/6800, Sun Fire V1280, and Netra 1280 allows remote attackers to cause a denial of service (system controller hang) via IP Packets With Type of Service (TOS) Bits set.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009888" patch="1">1009888</ref>
      <ref source="CONFIRM" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57544-1" patch="1">http://sunsolve.sun.com/search/document.do?assetkey=1-26-57544-1</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10189" patch="1">10189</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15925">sun-fire-ip-controller-dos(15925)</ref>
    </refs>
    <vuln_soft>
      <prod name="netra_1280" vendor="sun">
        <vers num=""/>
      </prod>
      <prod name="sun_fire" vendor="sun">
        <vers num="3800"/>
        <vers num="4800"/>
        <vers num="4810"/>
        <vers num="6800"/>
        <vers num="v1280"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2642" seq="2004-2642" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Yeemp 0.9.9 and earlier does not properly encrypt inbound files, which allows remote attackers to spoof the identity of the sender.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://deekoo.net/technocracy/yeemp/#advisory" patch="1">http://deekoo.net/technocracy/yeemp/#advisory</ref>
      <ref source="CONFIRM" url="http://deekoo.net/technocracy/yeemp/changes.html">http://deekoo.net/technocracy/yeemp/changes.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011586" patch="1">1011586</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11353" patch="1">11353</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17692">yeemp-message-spoofing(17692)</ref>
    </refs>
    <vuln_soft>
      <prod name="yeemp" vendor="nathaniel_bray">
        <vers num="0.5.1"/>
        <vers num="0.6"/>
        <vers num="0.6.1"/>
        <vers num="0.6.2"/>
        <vers num="0.7"/>
        <vers num="0.7.1"/>
        <vers num="0.7.2"/>
        <vers num="0.8"/>
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.9.2"/>
        <vers num="0.9.2pre2"/>
        <vers num="0.9.4"/>
        <vers num="0.9.6"/>
        <vers num="0.9.7"/>
        <vers num="0.9.8"/>
        <vers num="0.9.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2643" seq="2004-2643" published="2004-12-31" modified="2017-07-19" severity="Low" CVSS_version="2.0" CVSS_score="3.7" CVSS_base_score="3.7" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="1.9" CVSS_vector="(AV:L/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Microsoft cabarc allows remote attackers to overwrite files via "../" sequences in file names in a CAB archive.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-10/0341.html">20041012 Microsoft cabarc directory traversal</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109759710121018&amp;w=2">20041012 Microsoft cabarc directory traversal</ref>
      <ref source="MISC" url="http://packetstormsecurity.org/0410-exploits/cabarc.txt">http://packetstormsecurity.org/0410-exploits/cabarc.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011626">1011626</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11376">11376</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17693">cabarc-dotdot-directory-traversal(17693)</ref>
    </refs>
    <vuln_soft>
      <prod name="cabarc" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2644" seq="2004-2644" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in ASN.1 Compiler (asn1c) before 0.9.7 has unknown impact and attack vectors when processing "ANY" type tags.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011622" patch="1">1011622</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=103893&amp;release_id=274592">http://sourceforge.net/project/shownotes.php?group_id=103893&amp;release_id=274592</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11370" patch="1">11370</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17695">asn1c-any-type(17695)</ref>
    </refs>
    <vuln_soft>
      <prod name="asn.1_compiler" vendor="asn.1_compiler">
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2645" seq="2004-2645" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in ASN.1 Compiler (asn1c) before 0.9.7 has unknown impact and attack vectors when processing "CHOICE" types with "indefinite length structures."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011622" patch="1">1011622</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?group_id=103893&amp;release_id=274592">http://sourceforge.net/project/shownotes.php?group_id=103893&amp;release_id=274592</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11370" patch="1">11370</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17696">asn1c-choice-type(17696)</ref>
    </refs>
    <vuln_soft>
      <prod name="asn.1_compiler" vendor="asn.1_compiler">
        <vers num="0.9.4"/>
        <vers num="0.9.5"/>
        <vers num="0.9.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2646" seq="2004-2646" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The addUser function in UserManager.java in Free Web Chat 2.0 allows remote attackers to cause a denial of service (uncaught NullPointerException) via unknown attack vectors that cause the usrName variable to be null.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0102.html" patch="1">20040804 Multiple Vulnerabilities in Free Web Chat</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109164397601049&amp;w=2">20040804 Multiple Vulnerabilities in Free Web Chat</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Aug/1010851.html" patch="1">1010851</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10863">10863</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16893">freewebchat-usermanager-dos(16893)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2647" seq="2004-2647" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Free Web Chat 2.0 allows remote attackers to cause a denial of service (CPU consumption) via multiple connections from the same user.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0102.html" patch="1">20040804 Multiple Vulnerabilities in Free Web Chat</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=109164397601049&amp;w=2">20040804 Multiple Vulnerabilities in Free Web Chat</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Aug/1010851.html" patch="1">1010851</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10863">10863</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16901">freewebchat-mult-connection-dos(16901)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2648" seq="2004-2648" published="2004-12-31" modified="2017-07-19" severity="Low" CVSS_version="2.0" CVSS_score="1.0" CVSS_base_score="1.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="1.5" CVSS_vector="(AV:L/AC:H/Au:S/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">FreezeX 1.00.100.0666 allows local users with administrator privileges to cause a denial of service (FreezeX application) by overwriting the db.fzx file.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-12/0458.html">20041220 FreezeX file access vulnerability</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012699" patch="1">1012699</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18643">freezex-dbfzx-dos(18643)</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2649" seq="2004-2649" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Eudora 6.1.0.6 allows remote attackers to obfuscate URLs displayed in the status bar by inserting a large number of characters (e.g. spaces coded as "&amp;#32") in the middle of the URL.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product release:
Qualcomm, Eudora, 6.1.2</sol>
    </sols>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-05/0066.html">20040508 Status bar exploit hides spoofed URLs Eudora, possibly other e-mail clients</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/May/1010117.html">1010117</ref>
      <ref source="CONFIRM" url="http://www.eudora.com/download/eudora/windows/6.1.2/RelNotes.txt" patch="1">http://www.eudora.com/download/eudora/windows/6.1.2/RelNotes.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10305">10305</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16105">eudora-url-spoofing(16105)</ref>
    </refs>
    <vuln_soft>
      <prod name="eudora" vendor="eudora">
        <vers num="6.1.0.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2650" seq="2004-2650" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Spooler in Apache Foundation James 2.2.0 allows local users to cause a denial of service (memory consumption) by triggering various error conditions in the retrieve function, which prevents a lock from being released and causes a memory leak.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://issues.apache.org/jira/browse/JAMES-268">http://issues.apache.org/jira/browse/JAMES-268</ref>
      <ref source="CONFIRM" url="http://james.apache.org/changelog.html">http://james.apache.org/changelog.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/15765">15765</ref>
    </refs>
    <vuln_soft>
      <prod name="james" vendor="apache">
        <vers num="2.2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2651" seq="2004-2651" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in YaCy before 0.32 allow remote attackers to inject arbitrary web script or HTML via the (1) urlmaskfilter parameter to index.html or the (2) page parameter to Wiki.html.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-12/0413.html" adv="1">20041224 XSS in yacy 0.31</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012686" patch="1">1012686</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12104">12104</ref>
      <ref source="CONFIRM" url="http://www.yacy.net/yacy/News.html">http://www.yacy.net/yacy/News.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18688">yacy-index-xss(18688)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18690">yacy-wiki-xss(18690)</ref>
    </refs>
    <vuln_soft>
      <prod name="yacy" vendor="michael_christen">
        <vers num="0.1_build2004-01-19"/>
        <vers num="0.11_build2004-01-24"/>
        <vers num="0.12_build2004-02-04"/>
        <vers num="0.13_build2004-02-10"/>
        <vers num="0.14_build2004-02-13"/>
        <vers num="0.15_build2004-03-18"/>
        <vers num="0.16_build2004-05-03"/>
        <vers num="0.20_build2004-06-14"/>
        <vers num="0.21_build2004-06-27"/>
        <vers num="0.22_build2004-07-11"/>
        <vers num="0.23_build2004-08-08"/>
        <vers num="0.24_build2004-08-16"/>
        <vers num="0.25_build2004-08-22"/>
        <vers num="0.26_build2004-09-16"/>
        <vers num="0.27_build2004-09-24"/>
        <vers num="0.28_build2004-10-01"/>
        <vers num="0.29_build2004-10-22"/>
        <vers num="0.30_build2004-11-25"/>
        <vers num="0.31_build2004-12-09"/>
        <vers num="build2003-12-15"/>
        <vers num="build2003-12-18"/>
        <vers num="build2003-12-29"/>
        <vers num="build2004-01-05"/>
        <vers num="build2004-01-07"/>
        <vers num="build2004-01-10"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2652" seq="2004-2652" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">The DecodeTCPOptions function in decode.c in Snort before 2.3.0, when printing TCP/IP options using FAST output or verbose mode, allows remote attackers to cause a denial of service (crash) via packets with invalid TCP/IP options, which trigger a null dereference.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012656" patch="1">1012656</ref>
      <ref source="MISC" url="http://taosecurity.blogspot.com/2004/12/details-on-snort-dos-condition-you-may.html" adv="1">http://taosecurity.blogspot.com/2004/12/details-on-snort-dos-condition-you-may.html</ref>
      <ref source="MISC" url="http://www.frsirt.com/exploits/20041222.angelDust.c.php">http://www.frsirt.com/exploits/20041222.angelDust.c.php</ref>
      <ref source="MISC" url="http://www.securiteam.com/exploits/6X00L20C0S.html">http://www.securiteam.com/exploits/6X00L20C0S.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12084">12084</ref>
      <ref source="CONFIRM" url="http://www.snort.org/arc_news/">http://www.snort.org/arc_news/</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18689">snort-tcpip-printing-dos(18689)</ref>
    </refs>
    <vuln_soft>
      <prod name="snort" vendor="sourcefire">
        <vers num="2.1.0"/>
        <vers num="2.1.1_rc1"/>
        <vers num="2.1.3"/>
        <vers num="2.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2653" seq="2004-2653" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in PD9 Software MegaBBS 2.0 and 2.1 allows attackers to gain privileges via unknown vectors involving (1) admin/userlevelmembers-edit.asp and (2) admin/edit-groups.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.pd9soft.com/megabbs/forums/thread-view.asp?tid=4924" patch="1">http://www.pd9soft.com/megabbs/forums/thread-view.asp?tid=4924</ref>
    </refs>
    <vuln_soft>
      <prod name="megabbs" vendor="pd9_software">
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2654" seq="2004-2654" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The clientAbortBody function in client_side.c in Squid Web Proxy Cache before 2.6 STABLE6 allows remote attackers to cause a denial of service (segmentation fault) via unspecified vectors that trigger a null dereference.  NOTE: in a followup advisory, a researcher claimed that the issue was a buffer overflow that was not fixed in STABLE6. However, the vendor's bug report clearly shows that the researcher later retracted this claim, because the tested product was actually STABLE5.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011214">1011214</ref>
      <ref source="VIM" url="http://www.attrition.org/pipermail/vim/2006-February/000570.html">20060223 old Squid clientAbortBody issue - NOT an overflow?</ref>
      <ref source="MISC" url="http://www.securitylab.ru/47881.html">http://www.securitylab.ru/47881.html</ref>
      <ref source="MISC" url="http://www.squid-cache.org/bugs/show_bug.cgi?id=972">http://www.squid-cache.org/bugs/show_bug.cgi?id=972</ref>
    </refs>
    <vuln_soft>
      <prod name="squid" vendor="squid">
        <vers num="2.5_stable5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2655" seq="2004-2655" published="2004-12-31" modified="2018-10-03" severity="Medium" CVSS_version="2.0" CVSS_score="5.4" CVSS_base_score="5.4" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">rdesktop 1.3.1 with xscreensaver 4.14, and possibly other versions, when running on Fedora and possibly other platforms, does not release the keyboard focus when xscreensaver starts, which causes the password to be entered into the active window when the user unlocks the screen.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product release:
XScreenSaver, XScreenSaver, 4.18</sol>
    </sols>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SGI" url="ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc">20060602-01-U</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1016150">1016150</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1016151">1016151</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2006-107.htm">http://support.avaya.com/elmodocs2/security/ASA-2006-107.htm</ref>
      <ref source="MISC" url="http://www.derkeiler.com/Newsgroups/comp.os.linux.security/2004-08/0018.html">http://www.derkeiler.com/Newsgroups/comp.os.linux.security/2004-08/0018.html</ref>
      <ref source="CONFIRM" url="http://www.jwz.org/xscreensaver/changelog.html">http://www.jwz.org/xscreensaver/changelog.html</ref>
      <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDKSA-2006:071">MDKSA-2006:071</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2006_23_sr.html">SUSE-SR:2006:023</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2006-0498.html">RHSA-2006:0498</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/17471" patch="1">17471</ref>
      <ref source="MISC" url="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188149">https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188149</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10096">oval:org.mitre.oval:def:10096</ref>
      <ref source="UBUNTU" url="https://usn.ubuntu.com/269-1/">USN-269-1</ref>
    </refs>
    <vuln_soft>
      <prod name="xscreensaver" vendor="xscreensaver">
        <vers num="4.14"/>
        <vers num="4.16"/>
        <vers num="4.17"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2656" seq="2004-2656" published="2004-12-31" modified="2017-07-19" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) before R_2_5_0_41 allow remote attackers to inject arbitrary web script or HTML via (1) the topic parameter in search.pl and (2) the filter parameter in submit.pl.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-12/0170.html" adv="1">20041215 Security Advisory for CVS Slash</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11993" patch="1">11993</ref>
      <ref source="CONFIRM" url="http://www.slashcode.com/slash/04/12/20/1946225.shtml?tid=11&amp;tid=5&amp;tid=4" adv="1" patch="1">http://www.slashcode.com/slash/04/12/20/1946225.shtml?tid=11&amp;tid=5&amp;tid=4</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18508">slashcode(18508)</ref>
    </refs>
    <vuln_soft>
      <prod name="slashcode" vendor="open_source_development_network">
        <vers num="2.2.5"/>
        <vers num="r_2_5_0_41" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2657" seq="2004-2657" published="2004-12-31" modified="2018-10-19" severity="Low" CVSS_version="2.0" CVSS_score="1.7" CVSS_base_score="1.7" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.1" CVSS_vector="(AV:L/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">** DISPUTED **  Mozilla Firefox 1.5.0.1, and possibly other versions, preserves some records of user activity even after uninstalling, which allows local users who share a Windows profile to view the records after a new installation of Firefox, as reported for the list of Passwords Never Saved web sites.  NOTE: The vendor has disputed this issue, stating that "The uninstaller is primarily there to uninstall the application. It is not there to uninstall user data. For the moment I will stick by my module-owner decision."</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability has been disputed by the vendor.</sol>
    </sols>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/431021/100/0/threaded">20060413 Firefox 1.5.0.1 Password Manager Arbtirary User Browsing History Disclosure</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/431063/100/0/threaded">20060415 Re: Firefox 1.5.0.1 Password Manager Arbtirary User Browsing History Disclosure</ref>
      <ref source="MISC" url="https://bugzilla.mozilla.org/show_bug.cgi?id=234680">https://bugzilla.mozilla.org/show_bug.cgi?id=234680</ref>
      <ref source="MISC" url="https://bugzilla.mozilla.org/show_bug.cgi?id=330884">https://bugzilla.mozilla.org/show_bug.cgi?id=330884</ref>
    </refs>
    <vuln_soft>
      <prod name="firefox" vendor="mozilla">
        <vers num="1.5.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2658" seq="2004-2658" published="2004-12-31" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">resmgr in SUSE CORE 9 does not properly identify terminal names, which allows local users to spoof terminals and login types.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.novell.com/techcenter/psdb/fa6c6a3e792bf79b1d85821c689ea578.html" patch="1">http://support.novell.com/techcenter/psdb/fa6c6a3e792bf79b1d85821c689ea578.html</ref>
    </refs>
    <vuln_soft>
      <prod name="suse_linux" vendor="suse">
        <vers num="9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2659" seq="2004-2659" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Opera offers an Open button to verify that a user wishes to execute a downloaded file, which allows user-assisted remote attackers to construct a race condition that tricks a user into clicking Open via a request for a different mouse or keyboard action very shortly before the Open dialog appears.  NOTE: this is a different issue than CVE-2005-2407.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0264.html">20040407 Race conditions in security dialogs</ref>
      <ref source="MISC" url="http://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/" adv="1">http://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/</ref>
    </refs>
    <vuln_soft>
      <prod name="mozilla" vendor="mozilla">
        <vers num=""/>
      </prod>
      <prod name="opera" vendor="opera_software">
        <vers num="9.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2660" seq="2004-2660" published="2004-12-31" modified="2018-10-30" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Memory leak in direct-io.c in Linux kernel 2.6.x before 2.6.10 allows local users to cause a denial of service (memory consumption) via certain O_DIRECT (direct IO) write requests.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product release:
Linux, Linux kernel, 2.6.10</sol>
    </sols>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://linux.bkbits.net:8080/linux-2.6/cset@4182a613oVsK0-8eCWpyYFrUf8rhLA" patch="1">http://linux.bkbits.net:8080/linux-2.6/cset@4182a613oVsK0-8eCWpyYFrUf8rhLA</ref>
      <ref source="CONFIRM" url="http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm">http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2006/dsa-1184">DSA-1184</ref>
      <ref source="CONFIRM" url="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.10" patch="1">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.10</ref>
      <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2006-0617.html">RHSA-2006:0617</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/19665">19665</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10165">oval:org.mitre.oval:def:10165</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.6.0" edition=":64-bit_x86"/>
        <vers num="2.6.0" edition=":itanium_ia64_montecito"/>
        <vers num="2.6.0" edition="test1"/>
        <vers num="2.6.0" edition="test10"/>
        <vers num="2.6.0" edition="test11"/>
        <vers num="2.6.0" edition="test2"/>
        <vers num="2.6.0" edition="test3"/>
        <vers num="2.6.0" edition="test4"/>
        <vers num="2.6.0" edition="test5"/>
        <vers num="2.6.0" edition="test6"/>
        <vers num="2.6.0" edition="test7"/>
        <vers num="2.6.0" edition="test8"/>
        <vers num="2.6.0" edition="test9"/>
        <vers num="2.6.1" edition="rc1"/>
        <vers num="2.6.1" edition="rc2"/>
        <vers num="2.6.1" edition="rc3"/>
        <vers num="2.6.2" edition="rc1"/>
        <vers num="2.6.2" edition="rc2"/>
        <vers num="2.6.2" edition="rc3"/>
        <vers num="2.6.3" edition="rc1"/>
        <vers num="2.6.3" edition="rc2"/>
        <vers num="2.6.3" edition="rc3"/>
        <vers num="2.6.3" edition="rc4"/>
        <vers num="2.6.4" edition="rc1"/>
        <vers num="2.6.4" edition="rc2"/>
        <vers num="2.6.4" edition="rc3"/>
        <vers num="2.6.5" edition="rc1"/>
        <vers num="2.6.5" edition="rc2"/>
        <vers num="2.6.5" edition="rc3"/>
        <vers num="2.6.6" edition="rc1"/>
        <vers num="2.6.6" edition="rc2"/>
        <vers num="2.6.6" edition="rc3"/>
        <vers num="2.6.7" edition="rc1"/>
        <vers num="2.6.7" edition="rc2"/>
        <vers num="2.6.7" edition="rc3"/>
        <vers num="2.6.8" edition="rc1"/>
        <vers num="2.6.8" edition="rc2"/>
        <vers num="2.6.8" edition="rc3"/>
        <vers num="2.6.8" edition="rc4"/>
        <vers num="2.6.8.1"/>
        <vers num="2.6.8.1.5" edition=":386"/>
        <vers num="2.6.8.1.5" edition=":686"/>
        <vers num="2.6.8.1.5" edition=":686_smp"/>
        <vers num="2.6.8.1.5" edition=":amd64"/>
        <vers num="2.6.8.1.5" edition=":amd64_k8"/>
        <vers num="2.6.8.1.5" edition=":amd64_k8_smp"/>
        <vers num="2.6.8.1.5" edition=":amd64_xeon"/>
        <vers num="2.6.8.1.5" edition=":k7"/>
        <vers num="2.6.8.1.5" edition=":k7_smp"/>
        <vers num="2.6.8.1.5" edition=":power3"/>
        <vers num="2.6.8.1.5" edition=":power3_smp"/>
        <vers num="2.6.8.1.5" edition=":power4"/>
        <vers num="2.6.8.1.5" edition=":power4_smp"/>
        <vers num="2.6.8.1.5" edition=":powerpc"/>
        <vers num="2.6.8.1.5" edition=":powerpc_smp"/>
        <vers num="2.6.9" edition="2.6.20"/>
        <vers num="2.6.9" edition="rc1"/>
        <vers num="2.6.9" edition="rc2"/>
        <vers num="2.6.9" edition="rc3"/>
        <vers num="2.6.9" edition="rc4"/>
        <vers num="2.6_test9_cvs"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2661" seq="2004-2661" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Soft3304 04WebServer before 1.41 does not properly check file names, which allows remote attackers to obtain sensitive information (CGI source code).</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.soft3304.net/04WebServer/Security.html">http://www.soft3304.net/04WebServer/Security.html</ref>
    </refs>
    <vuln_soft>
      <prod name="04webserver" vendor="soft3304">
        <vers num="1.40"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2662" seq="2004-2662" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Soft3304 04WebServer before 1.41 allows remote attackers to cause a denial of service (resource consumption or crash) via certain data related to OpenSSL, which causes a thread to terminate but continue to hold resources.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.soft3304.net/04WebServer/Security.html">http://www.soft3304.net/04WebServer/Security.html</ref>
    </refs>
    <vuln_soft>
      <prod name="04webserver" vendor="soft3304">
        <vers num="1.41"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2663" seq="2004-2663" published="2004-12-31" modified="2017-07-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The (1) SetDebugging and (2) RunEgatherer methods in IBM Access Support eGatherer ActiveX control 2.0.0.16 allow remote attackers to create files with arbitrary content, as demonstrated by creating a .hta file in a Startup folder.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108746693619324&amp;w=2">20040616 "IBM Access Support" (eGatherer) Activex Dangerous Methods Vulnerability</ref>
      <ref source="FULLDISC" url="http://marc.info/?l=full-disclosure&amp;m=108741557604568&amp;w=2">20040616 "IBM Access Support" (eGatherer) Activex Dangerous Methods Vulnerability</ref>
      <ref source="EEYE" url="http://research.eeye.com/html/advisories/published/AD20040615B.html">AD20040615B</ref>
      <ref source="MISC" url="http://www.eeye.com/html/research/advisories/AD20040615B.html" adv="1" patch="1">http://www.eeye.com/html/research/advisories/AD20040615B.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10562">10562</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16428">ibm-egatherer-execute-code(16428)</ref>
    </refs>
    <vuln_soft>
      <prod name="egatherer" vendor="ibm">
        <vers num="2.0.0.16"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2664" seq="2004-2664" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">John Lim ADOdb Library for PHP before 4.23 allows remote attackers to obtain sensitive information via direct requests to certain scripts that result in an undefined value of ADODB_DIR, which reveals the installation path in an error message.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product release:
John Lim, ADOdb, 4.23</sol>
    </sols>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://phplens.com/lens/adodb/docs-adodb.htm#changes" patch="1">http://phplens.com/lens/adodb/docs-adodb.htm#changes</ref>
    </refs>
    <vuln_soft>
      <prod name="adodb" vendor="john_lim">
        <vers num="3.94"/>
        <vers num="4.00"/>
        <vers num="4.01"/>
        <vers num="4.02"/>
        <vers num="4.03"/>
        <vers num="4.04"/>
        <vers num="4.05"/>
        <vers num="4.10"/>
        <vers num="4.11"/>
        <vers num="4.20"/>
        <vers num="4.21"/>
        <vers num="4.22" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2665" seq="2004-2665" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="4.9" CVSS_base_score="4.9" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the Address and Routing Parameter Area (ARPA) transport software in HP-UX B.11.00, B.11.04, and B.11.11 before 20040628 allows local users to cause a denial of service via unspecified vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&amp;cc=us&amp;objectID=PSD_HPSBUX01054">SSRT3552</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5694">oval:org.mitre.oval:def:5694</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.00"/>
        <vers num="11.4"/>
        <vers num="11.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2666" seq="2004-2666" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Mantis before 20041016 provides a complete Issue History (Bug History) in the web interface regardless of view_history_threshold, which allows remote attackers to obtain sensitive information (private bug details) by visiting a bug's web page.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://bugs.mantisbugtracker.com/view.php?id=4724">http://bugs.mantisbugtracker.com/view.php?id=4724</ref>
      <ref source="MISC" url="http://mantisbt.cvs.sourceforge.net/mantisbt/mantisbt/history_inc.php?r1=1.24&amp;r2=1.25">http://mantisbt.cvs.sourceforge.net/mantisbt/mantisbt/history_inc.php?r1=1.24&amp;r2=1.25</ref>
      <ref source="MISC" url="http://mantisbt.cvs.sourceforge.net/mantisbt/mantisbt/history_inc.php?view=log" patch="1">http://mantisbt.cvs.sourceforge.net/mantisbt/mantisbt/history_inc.php?view=log</ref>
    </refs>
    <vuln_soft>
      <prod name="mantis" vendor="mantis">
        <vers num="0.9"/>
        <vers num="0.9.1"/>
        <vers num="0.10"/>
        <vers num="0.10.1"/>
        <vers num="0.10.2"/>
        <vers num="0.11"/>
        <vers num="0.11.1"/>
        <vers num="0.12"/>
        <vers num="0.13"/>
        <vers num="0.13.1"/>
        <vers num="0.14"/>
        <vers num="0.14.1"/>
        <vers num="0.14.2"/>
        <vers num="0.14.3"/>
        <vers num="0.14.4"/>
        <vers num="0.14.5"/>
        <vers num="0.14.6"/>
        <vers num="0.14.7"/>
        <vers num="0.14.8"/>
        <vers num="0.15"/>
        <vers num="0.15.1"/>
        <vers num="0.15.2"/>
        <vers num="0.15.3"/>
        <vers num="0.15.4"/>
        <vers num="0.15.5"/>
        <vers num="0.15.6"/>
        <vers num="0.15.7"/>
        <vers num="0.15.8"/>
        <vers num="0.15.9"/>
        <vers num="0.15.10"/>
        <vers num="0.15.11"/>
        <vers num="0.15.12"/>
        <vers num="0.16"/>
        <vers num="0.16.1"/>
        <vers num="0.17"/>
        <vers num="0.17.1"/>
        <vers num="0.17.2"/>
        <vers num="0.17.3"/>
        <vers num="0.17.4"/>
        <vers num="0.17.4a"/>
        <vers num="0.17.5"/>
        <vers num="0.18"/>
        <vers num="0.18.0_rc1"/>
        <vers num="0.18.0a1"/>
        <vers num="0.18.0a2"/>
        <vers num="0.18.0a3"/>
        <vers num="0.18.0a4"/>
        <vers num="0.18.1"/>
        <vers num="0.18.2"/>
        <vers num="0.18.3"/>
        <vers num="0.18a1"/>
        <vers num="0.19"/>
        <vers num="0.19.0_rc1"/>
        <vers num="0.19.0a"/>
        <vers num="0.19.0a1"/>
        <vers num="0.19.0a2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2667" seq="2004-2667" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Lotus Domino 6.0.x before 6.0.4 and 6.5.x before 6.5.2 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www-1.ibm.com/support/docview.wss?rs=463&amp;uid=swg21171253">http://www-1.ibm.com/support/docview.wss?rs=463&amp;uid=swg21171253</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2668" seq="2004-2668" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in Interchange before 4.8.9 allows remote attackers to execute arbitrary SQL commands via unknown vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://ftp.icdevgroup.org/interchange/4.8/WHATSNEW">http://ftp.icdevgroup.org/interchange/4.8/WHATSNEW</ref>
    </refs>
  </entry>
  <entry type="CVE" name="CVE-2004-2669" seq="2004-2669" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in Land Down Under (LDU) v701 allow remote attackers to execute arbitrary SQL commands or obtain the installation path via parameters including (1) s, w, and d in users.php, (2) id in comments.php, (3) rusername in auth.php, or (4) h in plug.php.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012015">1012015</ref>
      <ref source="CONFIRM" url="http://www.neocrome.net/index.php?m=single&amp;id=91">http://www.neocrome.net/index.php?m=single&amp;id=91</ref>
      <ref source="MISC" url="http://www.neocrome.net/page.php?id=1573">http://www.neocrome.net/page.php?id=1573</ref>
      <ref source="MISC" url="http://www.ptsecurity.ru/advisory.asp">http://www.ptsecurity.ru/advisory.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11569">11569</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17912">land-down-under-sql-injection(17912)</ref>
    </refs>
    <vuln_soft>
      <prod name="land_down_under" vendor="neocrome">
        <vers num="701"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2670" seq="2004-2670" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in mod.php in eNdonesia 8.3 allow remote attackers to inject arbitrary web script or HTML via (1) the mod parameter in a viewcat operation or (2) the query parameter in a search operation in the publisher module.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://echo.or.id/adv/adv02-y3dips-2004.txt" adv="1">http://echo.or.id/adv/adv02-y3dips-2004.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010864" adv="1">1010864</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/370855" adv="1">20040804 Multiple vulnerabilities in eNdonesia CMS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10856" adv="1">10856</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/8506" adv="1">8506</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/13041">endonesia-mod-xss(13041)</ref>
    </refs>
    <vuln_soft>
      <prod name="endonesia" vendor="endonesia">
        <vers num="8.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2671" seq="2004-2671" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">mod.php in eNdonesia 8.3 allows remote attackers to obtain sensitive information via certain direct requests, and certain requests with invalid parameter values, which reveal the path in various error messages, as demonstrated by the (1) mod and (2) cid parameters.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://echo.or.id/adv/adv02-y3dips-2004.txt" adv="1">http://echo.or.id/adv/adv02-y3dips-2004.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010864" adv="1">1010864</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/370855" adv="1">20040804 Multiple vulnerabilities in eNdonesia CMS</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/8507" adv="1">8507</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/13042">endonesia-mod-path-disclosure(13042)</ref>
    </refs>
    <vuln_soft>
      <prod name="endonesia" vendor="endonesia">
        <vers num="8.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2672" seq="2004-2672" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in ArGoSoft FTP server before 1.4.2.2 allows attackers to upload .lnk files via unknown vectors.</descript>
    </desc>
    <sols>
      <sol source="nvd">This vulnerability is addressed in the following product release:
ArGoSoft, FTP server, 1.4.2.2</sol>
    </sols>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx">http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx</ref>
    </refs>
    <vuln_soft>
      <prod name="ftp_server" vendor="argosoft">
        <vers num="1.4.2"/>
        <vers num="1.4.2.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2673" seq="2004-2673" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Multiple buffer overflows in ArGoSoft FTP Server before 1.4.1.6 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via (1) a SITE ZIP command with a long first or second argument, or (2) a SITE COPY with a long argument.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx">http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5RP010KCAO.html">http://www.securiteam.com/windowsntfocus/5RP010KCAO.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9770" patch="1">9770</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15410">argosoftftp-site-bo(15410)</ref>
    </refs>
    <vuln_soft>
      <prod name="ftp_server" vendor="argosoft">
        <vers num="1.4.1.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2674" seq="2004-2674" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in ArGoSoft FTP Server before 1.4.1.6 allows remote authenticated users to determine the existence of arbitrary files via ".." sequences in the SITE UNZIP argument.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx">http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5RP010KCAO.html">http://www.securiteam.com/windowsntfocus/5RP010KCAO.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9770" patch="1">9770</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15411">argosoftftp-unzip-file-disclosure(15411)</ref>
    </refs>
    <vuln_soft>
      <prod name="ftp_server" vendor="argosoft">
        <vers num="1.4.1.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2675" seq="2004-2675" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">ArGoSoft FTP Server before 1.4.1.6 allows remote authenticated users to cause a denial of service (crash) via a SITE PASS command with a long password parameter, which causes the database to be corrupted.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx">http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx</ref>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5RP010KCAO.html">http://www.securiteam.com/windowsntfocus/5RP010KCAO.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9770" patch="1">9770</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15412">argosoftftp-site-pass-dos(15412)</ref>
    </refs>
    <vuln_soft>
      <prod name="ftp_server" vendor="argosoft">
        <vers num="1.4.1.5" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2676" seq="2004-2676" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Spy Sweeper Enterprise Client (SpySweeperTray.exe) in WebRoot Spy Sweeper before 2.0 does not drop privileges when using the help functionality, which allows local users to gain privileges.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012652" adv="1" patch="1">1012652</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18628">spy-sweeper-gain-privileges(18628)</ref>
    </refs>
    <vuln_soft>
      <prod name="spy_sweeper_enterprise" vendor="webroot_software">
        <vers num="1.5.1_build_3698"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2677" seq="2004-2677" published="2004-12-31" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Format string vulnerability in qwik-smtpd.c in QwikMail SMTP (qwik-smtpd) 0.3 and earlier allows remote attackers to execute arbitrary code via format specifiers in the (1) clientRcptTo array, and the (2) Received and (3) messageID variables, possibly involving HELO and hostname arguments.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://qwikmail.sourceforge.net/smtpd/qwik-smtpd-0.3.patch" patch="1">http://qwikmail.sourceforge.net/smtpd/qwik-smtpd-0.3.patch</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012016" adv="1" patch="1">1012016</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/460600/100/0/threaded">20070218 qwik-smtpd format string</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11572" adv="1" patch="1">11572</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2007/0687">ADV-2007-0687</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17917">qwik-smtpd-format-string(17917)</ref>
    </refs>
    <vuln_soft>
      <prod name="qwikmail_smtp" vendor="qwikmail">
        <vers num="0.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2678" seq="2004-2678" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.1" CVSS_base_score="5.1" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in HP Tru64 UNIX 5.1B PK2(BL22) and PK3(BL24), and 5.1A PK6(BL24), when using IPsec/IKE (Internet Key Exchange) with Certificates, allows remote attackers to gain privileges via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot user="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="HP" url="http://archives.neohapsis.com/archives/tru64/2004-q1/0004.html">HPSBTU00030</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009329" adv="1">1009329</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9803" adv="1">9803</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15397">tru64-ipsec-ike-gain-access(15397)</ref>
    </refs>
    <vuln_soft>
      <prod name="tru64" vendor="hp">
        <vers num="5.1a" edition="pk6"/>
        <vers num="5.1b_p3k_bl24"/>
        <vers num="5.1b_pk2_bl22"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2679" seq="2004-2679" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Check Point Firewall-1 4.1 up to NG AI R55 allows remote attackers to obtain potentially sensitive information by sending an Internet Key Exchange (IKE) with a certain Vendor ID payload that causes Firewall-1 to return a response containing version and other information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0477.html">20040616 Checkpoint Firewall-1 IKE Vendor ID information leakage</ref>
      <ref source="MISC" url="http://www.nta-monitor.com/news/checkpoint2004/index.htm">http://www.nta-monitor.com/news/checkpoint2004/index.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10558">10558</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16434">fw1-vendorid-info-disclosure(16434)</ref>
    </refs>
    <vuln_soft>
      <prod name="firewall-1" vendor="checkpoint">
        <vers num="4.0" edition="sp1"/>
        <vers num="4.0" edition="sp2"/>
        <vers num="4.0" edition="sp3"/>
        <vers num="4.0" edition="sp4"/>
        <vers num="4.0" edition="sp5"/>
        <vers num="4.0" edition="sp6"/>
        <vers num="4.0" edition="sp7"/>
        <vers num="4.0" edition="sp8"/>
        <vers num="4.1" edition="sp1"/>
        <vers num="4.1" edition="sp2"/>
        <vers num="4.1" edition="sp3"/>
        <vers num="4.1" edition="sp4"/>
        <vers num="4.1" edition="sp5"/>
        <vers num="4.1" edition="sp5a"/>
        <vers num="4.1" edition="sp6"/>
        <vers num="r55" edition=":ng-ai"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2680" seq="2004-2680" published="2004-12-31" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MLIST" url="http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3c6DCA8C14-8FFA-11D8-8B4E-000A95B0D772@pixar.com%3e">[httpd-python-dev] 20040416 Re: possible bug in filter.write()</ref>
      <ref source="MLIST" url="http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3cCD485B27-8F3E-11D8-934B-000A95B0D772@pixar.com%3e">[httpd-python-dev] 20040416 possible bug in filter.write()</ref>
      <ref source="MLIST" url="http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3cEB279100-9000-11D8-8B4E-000A95B0D772@pixar.com%3e">[httpd-python-dev] 20040416 patch for filterobject.c</ref>
      <ref source="CONFIRM" url="http://svn.apache.org/viewvc/httpd/mod_python/trunk/src/filterobject.c?r1=102649&amp;r2=103561&amp;pathrev=103561">http://svn.apache.org/viewvc/httpd/mod_python/trunk/src/filterobject.c?r1=102649&amp;r2=103561&amp;pathrev=103561</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/462185/100/0/threaded">20070307 rPSA-2007-0051-1 mod_python</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/22849">22849</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-430-1">USN-430-1</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2007/0846">ADV-2007-0846</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14751">modpython-outputfilter-info-disclosure(14751)</ref>
      <ref source="CONFIRM" url="https://issues.rpath.com/browse/RPL-1105">https://issues.rpath.com/browse/RPL-1105</ref>
      <ref source="CONFIRM" url="https://launchpad.net/bugs/89308" patch="1">https://launchpad.net/bugs/89308</ref>
    </refs>
    <vuln_soft>
      <prod name="mod_python" vendor="apache">
        <vers num="3.1.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2681" seq="2004-2681" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">PeerSec MatrixSSL before 1.1 caches session keys for an indefinitely long time, which might make it easier for remote attackers to hijack a session.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.matrixssl.org/archives/000076.html">http://www.matrixssl.org/archives/000076.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40483">matrixssl-sessionkey-session-hijacking(40483)</ref>
    </refs>
    <vuln_soft>
      <prod name="matrixssl" vendor="peersec_networks">
        <vers num="1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2682" seq="2004-2682" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">PeerSec MatrixSSL before 1.1 does not implement RSA blinding, which allows context-dependent attackers to obtain the server's private key by determining factors using timing differences on (1) the number of extra reductions during Montgomery reduction, and (2) the use of different integer multiplication algorithms ("Karatsuba" and normal), a related issue to CVE-2003-0147.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.matrixssl.org/archives/000075.html">http://www.matrixssl.org/archives/000075.html</ref>
    </refs>
    <vuln_soft>
      <prod name="matrixssl" vendor="peersec_networks">
        <vers num="1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2683" seq="2004-2683" published="2004-12-31" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the %XML.Utils.SchemaServer class in InterSystems Cache' 5.0 allows attackers to access arbitrary files on a server.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://groups.google.com/group/intersystems-public-cache/browse_thread/thread/53db65fbb73fc254/37358d45de1cc583">[Cache-News] 20040305 Security Alert Correction</ref>
      <ref source="MLIST" url="http://groups.google.com/group/intersystems-public-cache/browse_thread/thread/809f96becb84b6da/938000c0f3d48a48">[Cache-News] 20040303 Security Alert</ref>
    </refs>
    <vuln_soft>
      <prod name="cache" vendor="intersystems">
        <vers num="5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2684" seq="2004-2684" published="2004-12-31" modified="2008-09-05" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in the %template package in InterSystems Cache' 5.0 allows attackers to access certain files on a server, including (1) cache.key and (2) cache.dat, related to .csp files under (a) Dev\studio\templates and (b) Devuser\studio\templates.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://groups.google.com/group/intersystems-public-cache/browse_thread/thread/7af3237a57e97f14/da52318590c68c75">[Cache-News] 20040310 Updated Security Alert - %template</ref>
      <ref source="MLIST" url="http://groups.google.com/group/intersystems-public-cache/browse_thread/thread/cda052864061faf7/b1c4ad61ca27c514">[Cache-News] 20040309 Security Alert - %template</ref>
    </refs>
    <vuln_soft>
      <prod name="cache_database" vendor="intersystems">
        <vers num="5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2685" seq="2004-2685" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in YoungZSoft CCProxy 6.2 and earlier allows remote attackers to execute arbitrary code via a long address in a ping (p) command to the Telnet proxy service, a different vector than CVE-2004-2416.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.youngzsoft.net/ccproxy/whatsnew.htm">http://www.youngzsoft.net/ccproxy/whatsnew.htm</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/4360">4360</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/621">621</ref>
    </refs>
    <vuln_soft>
      <prod name="ccproxy" vendor="youngzsoft">
        <vers num="6.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2686" seq="2004-2686" published="2004-12-31" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in the vfs_getvfssw function in Solaris 2.6, 7, 8, and 9 allows local users to load arbitrary kernel modules via crafted (1) mount or (2) sysfs system calls.  NOTE: this might be the same issue as CVE-2004-1767, but there are insufficient details to be sure.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://seclists.org/bugtraq/2004/Apr/0081.html">20040407 Solaris vfs_getvfssw() local kernel exploit</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008833" patch="1">1008833</ref>
      <ref source="FULLDISC" url="http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2004-04/0297.html">20040407 Solaris vfs_getvfssw() local kernel exploit</ref>
      <ref source="MISC" url="http://www.immunitysec.com/downloads/solaris_kernel_vfs.sxw.pdf">http://www.immunitysec.com/downloads/solaris_kernel_vfs.sxw.pdf</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9962" patch="1">9962</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1381">oval:org.mitre.oval:def:1381</ref>
    </refs>
    <vuln_soft>
      <prod name="solaris" vendor="sun">
        <vers num="2.6"/>
        <vers num="7.0" edition=":x86"/>
        <vers num="8.0" edition=":x86"/>
        <vers num="9.0" edition=":x86"/>
      </prod>
      <prod name="sunos" vendor="sun">
        <vers num="-"/>
        <vers num="5.7"/>
        <vers num="5.8"/>
        <vers num="5.9"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2687" seq="2004-2687" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2005-03/0183.html">20050310 XCode 1.5 and distcc 2.x Exploit</ref>
      <ref source="CONFIRM" url="http://distcc.samba.org/security.html">http://distcc.samba.org/security.html</ref>
      <ref source="MLIST" url="http://lists.samba.org/archive/distcc/2004q3/002550.html">[distcc] 20040826 Exploit in distcc ( got compromised ;( )</ref>
      <ref source="MLIST" url="http://lists.samba.org/archive/distcc/2004q3/002562.html">[distcc] 20040826 Exploit in distcc ( got compromised ;( )</ref>
      <ref source="MISC" url="http://www.metasploit.org/projects/Framework/exploits.html#distcc_exec">http://www.metasploit.org/projects/Framework/exploits.html#distcc_exec</ref>
    </refs>
    <vuln_soft>
      <prod name="xcode" vendor="apple">
        <vers num="1.5"/>
      </prod>
      <prod name="samba" vendor="samba">
        <vers num="2.18.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2688" seq="2004-2688" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in index.php in NewsPHP allows remote attackers to inject arbitrary web script or HTML via the cat_id parameter.  NOTE: this issue might overlap vector 3 in CVE-2006-3358.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-04/0161.html">20040415 Re: XSS, Admin Access via Cookie and File Upload vulnerability in NewsPHP.</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Apr/1009740.html">1009740</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15837">newsphp-index-xss(15837)</ref>
    </refs>
    <vuln_soft>
      <prod name="newsphp" vendor="newsphp">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2689" seq="2004-2689" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">NewsPHP allows remote attackers to gain unauthorized administrative access by setting a cookie to the "autorized=admin; root=admin" value.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-04/0161.html">20040415 Re: XSS, Admin Access via Cookie and File Upload vulnerability in NewsPHP.</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Apr/1009740.html">1009740</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15836">newsphp-gain-admin-access(15836)</ref>
    </refs>
    <vuln_soft>
      <prod name="newsphp" vendor="newsphp">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2690" seq="2004-2690" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="8.5" CVSS_base_score="8.5" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in the Administration Panel for NewsPHP allows remote authenticated administrators to upload and execute arbitrary code instead of video files.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-04/0161.html">20040415 Re: XSS, Admin Access via Cookie and File Upload vulnerability in NewsPHP.</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/alerts/2004/Apr/1009740.html">1009740</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15838">newsphp-file-upload(15838)</ref>
    </refs>
    <vuln_soft>
      <prod name="newsphp" vendor="newsphp">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2691" seq="2004-2691" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in 3Com SuperStack 3 4400 switches with firmware version before 3.31 allows remote attackers to cause a denial of service (device reset) via a crafted request to the web management interface.  NOTE: the provenance of this information is unknown; details are obtained from third party reports.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16497">3com-superstack-mngmt-dos(16497)</ref>
    </refs>
    <vuln_soft>
      <prod name="3c17205-us" vendor="3com">
        <vers num="" edition="firmware_3.30"/>
      </prod>
      <prod name="3c17210-us" vendor="3com">
        <vers num="" edition="firmware_3.30"/>
      </prod>
      <prod name="superstack_3_switch" vendor="3com">
        <vers num="4400" edition="firmware_3.30"/>
        <vers num="4400_se" edition="firmware_3.30"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2692" seq="2004-2692" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="9.3" CVSS_base_score="9.3" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The exec_dir PHP patch (php-exec-dir) 4.3.2 through 4.3.7 with safe mode disabled allows remote attackers to bypass restrictions and execute arbitrary commands via a backtick operator, which is not handled using the php_escape_shell_cmd function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://kyberdigi.cz/projects/execdir/english.html" patch="1">http://kyberdigi.cz/projects/execdir/english.html</ref>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2004/Jul/0347.html">20040708 php-exec-dir vulnerable after latest upgrade</ref>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2004/Jul/0350.html">20040708 RE: php-exec-dir vulnerable after latest upgrade</ref>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2004/Jul/0357.html">20040708 Re: php-exec-dir vulnerable after latest upgrade</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10598" patch="1">10598</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16498">phpexecdir-semicolon-restriction-bypass(16498)</ref>
    </refs>
    <vuln_soft>
      <prod name="php-exec-dir" vendor="kyberdigi_labs">
        <vers num="4.3.2"/>
        <vers num="4.3.3"/>
        <vers num="4.3.4"/>
        <vers num="4.3.5"/>
        <vers num="4.3.6"/>
        <vers num="4.3.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2693" seq="2004-2693" published="2004-12-31" modified="2017-10-10" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">HP-UX B.11.00 and B.11.11 with B6848AB GTK+ Support Libraries installed uses insecure directory permissions, which allows local users to gain privileges via files in /opt/gnome/src/GLib/.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="HP" url="http://marc.info/?l=bugtraq&amp;m=108455531606056&amp;w=2">SSRT3613</ref>
      <ref source="HP" url="http://www.hp.com/products1/unix/java/mozilla/HPSBUX01034.html">HPSBUX01034</ref>
      <ref source="OVAL" url="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6105">oval:org.mitre.oval:def:6105</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.00"/>
        <vers num="11.04"/>
        <vers num="11.11"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2694" seq="2004-2694" published="2004-12-31" modified="2016-10-17" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Microsoft Outlook Express 6.0 allows remote attackers to bypass intended access restrictions, load content from arbitrary sources into the Outlook context, and facilitate phishing attacks via a "BASE HREF" with the target set to "_top".</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=108448627120764&amp;w=2">20040513 POA: Outlook Expresss 6.00</ref>
    </refs>
    <vuln_soft>
      <prod name="outlook_express" vendor="microsoft">
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2695" seq="2004-2695" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the Authorize.net callback code (subscriptions/authorize.php) in Jelsoft vBulletin 3.0 through 3.0.3 allows remote attackers to execute arbitrary SQL statements via the x_invoice_num parameter.  NOTE: this issue might be related to CVE-2006-4267.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/5BP0E15E0M.html">http://www.securiteam.com/unixfocus/5BP0E15E0M.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11193">11193</ref>
      <ref source="CONFIRM" url="http://www.vbulletin.com/forum/bugs.php?do=view&amp;bugid=3379" patch="1">http://www.vbulletin.com/forum/bugs.php?do=view&amp;bugid=3379</ref>
      <ref source="CONFIRM" url="http://www.vbulletin.com/forum/showthread.php?t=124876">http://www.vbulletin.com/forum/showthread.php?t=124876</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17365">vbulletin-itemnumber-sql-injection(17365)</ref>
    </refs>
    <vuln_soft>
      <prod name="vbulletin" vendor="jelsoft">
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0_beta_2"/>
        <vers num="3.0_beta_3"/>
        <vers num="3.0_beta_4"/>
        <vers num="3.0_beta_5"/>
        <vers num="3.0_beta_6"/>
        <vers num="3.0_beta_7"/>
        <vers num="3.0_gamma"/>
      </prod>
      <prod name="ppp" vendor="samba">
        <vers num="2.4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2696" seq="2004-2696" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.5" CVSS_base_score="5.5" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">BEA WebLogic Server and WebLogic Express 6.1, 7.0, and 8.1, when using Remote Method Invocation (RMI) over Internet Inter-ORB Protocol (IIOP), does not properly handle when multiple logins for different users coming from the same client, which could cause an "unexpected user identity" to be used in an RMI call.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BEA" url="http://dev2dev.bea.com/pub/advisory/59">BEA04-62.00</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010493">1010493</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10545">10545</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16421">weblogic-unexpected-user-identity(16421)</ref>
    </refs>
    <vuln_soft>
      <prod name="weblogic_server" vendor="bea">
        <vers num="6.1" edition=":express"/>
        <vers num="6.1" edition=":win32"/>
        <vers num="6.1" edition="sp1:express"/>
        <vers num="6.1" edition="sp1:win32"/>
        <vers num="6.1" edition="sp2:express"/>
        <vers num="6.1" edition="sp2:win32"/>
        <vers num="6.1" edition="sp3:express"/>
        <vers num="6.1" edition="sp3:win32"/>
        <vers num="6.1" edition="sp4:express"/>
        <vers num="6.1" edition="sp4:win32"/>
        <vers num="6.1" edition="sp5:express"/>
        <vers num="6.1" edition="sp5:win32"/>
        <vers num="6.1" edition="sp6:express"/>
        <vers num="6.1" edition="sp6:win32"/>
        <vers num="7.0" edition=":express"/>
        <vers num="7.0" edition=":win32"/>
        <vers num="7.0" edition="sp1:express"/>
        <vers num="7.0" edition="sp1:win32"/>
        <vers num="7.0" edition="sp2:express"/>
        <vers num="7.0" edition="sp2:win32"/>
        <vers num="7.0" edition="sp3:express"/>
        <vers num="7.0" edition="sp3:win32"/>
        <vers num="7.0" edition="sp4:express"/>
        <vers num="7.0" edition="sp4:win32"/>
        <vers num="7.0" edition="sp5:express"/>
        <vers num="7.0" edition="sp5:win32"/>
        <vers num="7.0.0.1" edition=":express"/>
        <vers num="7.0.0.1" edition=":win32"/>
        <vers num="7.0.0.1" edition="sp1:express"/>
        <vers num="7.0.0.1" edition="sp1:win32"/>
        <vers num="7.0.0.1" edition="sp2:express"/>
        <vers num="7.0.0.1" edition="sp2:win32"/>
        <vers num="7.0.0.1" edition="sp3:express"/>
        <vers num="7.0.0.1" edition="sp4:express"/>
        <vers num="8.1" edition=":express"/>
        <vers num="8.1" edition=":win32"/>
        <vers num="8.1" edition="sp1:express"/>
        <vers num="8.1" edition="sp1:win32"/>
        <vers num="8.1" edition="sp2:express"/>
        <vers num="8.1" edition="sp2:win32"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2697" seq="2004-2697" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">The Inventory Scout daemon (invscoutd) 1.3.0.0 and 2.0.2 for AIX 4.3.3 and 5.1 allows local users to gain privileges via a symlink attack on a command line argument (log file).  NOTE: this might be related to CVE-2006-5002.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/exploits/5CP0F0UDFG.html">http://www.securiteam.com/exploits/5CP0F0UDFG.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9982">9982</ref>
      <ref source="MISC" url="http://www.xfocus.org/exploits/200403/31.html">http://www.xfocus.org/exploits/200403/31.html</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15620">aix-invscoutd-gain-privileges(15620)</ref>
    </refs>
    <vuln_soft>
      <prod name="aix" vendor="ibm">
        <vers num="4.3.3"/>
        <vers num="5.1"/>
        <vers num="5.1l"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2698" seq="2004-2698" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.9" CVSS_base_score="6.9" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Race condition in IMWheel 1.0.0pre11 and earlier, when running with the -k option, allows local users to cause a denial of service (IMWheel crash) and possibly modify arbitrary files via a symlink attack on the imwheel.pid file.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0914.html">20040820 CAU-2004-0002 - imwheel Predictable PidFile Name Race Condition</ref>
      <ref source="CONFIRM" url="http://imwheel.sourceforge.net/files/DEVELOPMENT.txt">http://imwheel.sourceforge.net/files/DEVELOPMENT.txt</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011049">1011049</ref>
      <ref source="MISC" url="http://www.caughq.org/advisories/CAU-2004-0002.txt">http://www.caughq.org/advisories/CAU-2004-0002.txt</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11008">11008</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17082">imwheel-race-condition(17082)</ref>
    </refs>
    <vuln_soft>
      <prod name="imwheel" vendor="imwheel">
        <vers num="1.0.0pre11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2699" seq="2004-2699" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">deleteicon.aspx in AspDotNetStorefront 3.3 allows remote attackers to delete arbitrary product images via a modified ProductID parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0235.html">20040609 Advisory: ASPDOTNETSTOREFRONT Improper Session Validation</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3206">3206</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/365559">20040609 [FULL DISCLOSURE] ASPDOTNETSTOREFRONT Improper Session Validation</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10506">10506</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16377">aspdotnetstorefront-improper-validation(16377)</ref>
    </refs>
    <vuln_soft>
      <prod name="aspdotnetstorefront" vendor="aspdotnetstorefront">
        <vers num="3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2700" seq="2004-2700" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="9.0" CVSS_base_score="9.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Unrestricted file upload vulnerability in AspDotNetStorefront 3.3 allows remote authenticated administrators to upload arbitrary files with executable extensions via admin/images.aspx.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0230.html">20040609 ASPDOTNETSTOREFRONT ASPDOTNETSTOREFRONT Improper Upload Validation</ref>
    </refs>
    <vuln_soft>
      <prod name="aspdotnetstorefront" vendor="aspdotnetstorefront">
        <vers num="3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2701" seq="2004-2701" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in signin.aspx for AspDotNetStorefront 3.3 allows remote attackers to inject arbitrary web script or HTML via the returnurl parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0129.html">20040609 [FULL DISCLOSURE] ASPDOTNETSTOREFRONT Cross-Site Scripting Vulnerability</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0229.html">20040609 [FULL DISCLOSURE] ASPDOTNETSTOREFRONT Cross-Site Scripting Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10507">10507</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16426">aspdotnetstorefront-signin-xss(16426)</ref>
    </refs>
    <vuln_soft>
      <prod name="aspdotnetstorefront" vendor="aspdotnetstorefront">
        <vers num="3.3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2702" seq="2004-2702" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in login_up.php3 in Plesk 7.0 and 7.1 Reloaded allows remote attackers to inject arbitrary web script or HTML via the login_name parameter.  NOTE: this might be the same vector as CVE-2006-6451.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/1022.html">20040824 XSS in Plesk 7.1 Reloaded</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/1031.html">20040824 Re: [Full-Disclosure] XSS in Plesk 7.1 Reloaded</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-12/0554.html">20041223 Plesk 7 Cross-Site Scripting</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011042">1011042</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11024">11024</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17085">plesk-loginname-xss(17085)</ref>
    </refs>
    <vuln_soft>
      <prod name="plesk" vendor="swsoft">
        <vers num="7.0"/>
        <vers num="7.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2703" seq="2004-2703" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Clearswift MIMEsweeper 5.0.5, when it has been upgraded from MAILsweeper for SMTP version 4.3 or MAILsweeper Business Suite I or II, allows remote attackers to bypass scanning by including encrypted data in a mail message, which causes the message to be marked as "Clean" instead of "Encrypted".</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://download.mimesweeper.com/www/TechnicalDocumentation/MSWSMTP505UpdateReadMe.htm">http://download.mimesweeper.com/www/TechnicalDocumentation/MSWSMTP505UpdateReadMe.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11669">11669</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18035">mimesweeper-smtp-scan-bypass(18035)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailsweeper_business_suite_i" vendor="clearswift">
        <vers num=""/>
      </prod>
      <prod name="mailsweeper_business_suite_ii" vendor="clearswift">
        <vers num=""/>
      </prod>
      <prod name="mailsweeper_for_smtp" vendor="clearswift">
        <vers num="4.3"/>
      </prod>
      <prod name="mimesweeper_for_web" vendor="clearswift">
        <vers num="5.0.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2704" seq="2004-2704" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Hastymail 1.0.1 and earlier (stable) and 1.1 and earlier (development) does not send the "attachment" parameter in the Content-Disposition field for attachments, which causes the attachment to be rendered inline by Internet Explorer when the victim clicks the download link, which facilitates cross-site scripting (XSS) and possibly other attacks.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0322.html">20040824 Hastymail security update</ref>
      <ref source="CONFIRM" url="http://hastymail.sourceforge.net/security.php" patch="1">http://hastymail.sourceforge.net/security.php</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011054">1011054</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11022" patch="1">11022</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17091">hastymail-html-script-execution(17091)</ref>
    </refs>
    <vuln_soft>
      <prod name="hastymail" vendor="hastymail">
        <vers num="1.0.1" prev="1"/>
        <vers num="1.1" prev="1"/>
      </prod>
      <prod name="ie" vendor="microsoft">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2705" seq="2004-2705" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Player vs. Player Gaming Network (PvPGN) before 1.6.4 allows remote attackers to obtain attributes of arbitrary accounts, including the password hash, via certain statsreq packets.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forums.pvpgn.org/index.php/topic,2655.0.html">http://forums.pvpgn.org/index.php/topic,2655.0.html</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011050">1011050</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11035">11035</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17094">pvpgn-statsreq-info-disclosure(17094)</ref>
    </refs>
    <vuln_soft>
      <prod name="pvpgn" vendor="pvpgn">
        <vers num="1.6.0"/>
        <vers num="1.6.1"/>
        <vers num="1.6.2"/>
        <vers num="1.6.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2706" seq="2004-2706" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Gyach Enhanced (Gyach-E) before 1.0.4 allows remote attackers to cause a denial of service (crash) via conference packets with error messages.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php" patch="1">http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php</ref>
    </refs>
    <vuln_soft>
      <prod name="gyach_enhanced" vendor="phrozensmoke">
        <vers num="1.0.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2707" seq="2004-2707" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in Gyach Enhanced (Gyach-E) before 1.0.5 have unknown impact and attack vectors related to "several security flaws," probably related to buffer overflows in HTTP server responses.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011058">1011058</ref>
      <ref source="CONFIRM" url="http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php" patch="1">http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10975" patch="1">10975</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17096">gyach-enhanced-dos(17096)</ref>
    </refs>
    <vuln_soft>
      <prod name="gyach_enhanced" vendor="phrozensmoke">
        <vers num="1.0.4" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2708" seq="2004-2708" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Gyach Enhanced (Gyach-E) before 1.0.0 stores passwords in plaintext, which allows attackers to obtain user passwords by reading the configuration file.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php" patch="1">http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php</ref>
    </refs>
    <vuln_soft>
      <prod name="gyach_enhanced" vendor="phrozensmoke">
        <vers num="1.0.0_pre" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2709" seq="2004-2709" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the strip_html_tags method for Gyach Enhanced (Gyach-E) before 1.0.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown vectors involving HTML tags.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php" patch="1">http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php</ref>
    </refs>
    <vuln_soft>
      <prod name="gyach_enhanced" vendor="phrozensmoke">
        <vers num="1.0.3" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2710" seq="2004-2710" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Gyach Enhanced (Gyach-E) before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to (1) sending certain typing statuses or (2) setting the chat room status bar to the current chat room name.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php" patch="1">http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php</ref>
    </refs>
    <vuln_soft>
      <prod name="gyach_enhanced" vendor="phrozensmoke">
        <vers num="1.0.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2711" seq="2004-2711" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple buffer overflows in Gyach Enhanced (Gyach-E) before 1.0.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "avatar retrieval."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php" patch="1">http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php</ref>
    </refs>
    <vuln_soft>
      <prod name="gyach_enhanced" vendor="phrozensmoke">
        <vers num="1.0.1" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2712" seq="2004-2712" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in Gyach Enhanced (Gyach-E) before 1.0.0-SneakPeek-3 allows remote attackers to cause a denial of service (crash) via unspecified vectors related to "URL data."</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php" patch="1">http://www.phrozensmoke.com/projects/pyvoicechat/changelog.php</ref>
    </refs>
    <vuln_soft>
      <prod name="gyach_enhanced" vendor="phrozensmoke">
        <vers num="1.0.0_sneakpeek_2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2713" seq="2004-2713" published="2004-12-31" modified="2017-07-28" severity="Low" CVSS_version="2.0" CVSS_score="1.9" CVSS_base_score="1.9" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">** DISPUTED **  Zone Alarm Pro 1.0 through 5.1 gives full access to %windir%\Internet Logs\* to the EVERYONE group, which allows local users to cause a denial of service by modifying the folder contents or permissions. NOTE: this issue has been disputed by the vendor, who claims that it does not affect product functionality since the same information is also saved in a protected file.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-08/0389.html">20040825 Check Point - Zone Labs Division - Response to "Weak Default Permissions Vulnerability"</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0871.html">20040819 Unsecure file permission of ZoneAlarm pro.</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0883.html">20040820 Re: Unsecure file permission of ZoneAlarm pro.</ref>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0933.html">20040821 Re: Unsecure file permission of ZoneAlarm pro.</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17099">zonealarm-insecure-file-permission(17099)</ref>
    </refs>
    <vuln_soft>
      <prod name="zonealarm" vendor="zonelabs">
        <vers num="1.0" edition=":pro"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2714" seq="2004-2714" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.0" CVSS_base_score="6.0" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Window Maker 0.80.2 and earlier allows attackers to perform unknown actions via format string specifiers in a font specification in WMGLOBAL, probably a format string vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011918">1011918</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11512" patch="1">11512</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17845">windowmaker-wmglobal-improper-validation(17845)</ref>
    </refs>
    <vuln_soft>
      <prod name="windowmaker" vendor="windowmaker">
        <vers num="0.20.1.3"/>
        <vers num="0.52.2"/>
        <vers num="0.53"/>
        <vers num="0.60"/>
        <vers num="0.60.0"/>
        <vers num="0.61"/>
        <vers num="0.61.1"/>
        <vers num="0.62"/>
        <vers num="0.62.1"/>
        <vers num="0.63"/>
        <vers num="0.63.1"/>
        <vers num="0.64"/>
        <vers num="0.65"/>
        <vers num="0.65.1"/>
        <vers num="0.80"/>
        <vers num="0.80.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2715" seq="2004-2715" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">edituser.php3 in PHPMyChat 0.14.5 allow remote attackers to bypass authentication and gain administrative privileges by setting the do_not_login parameter to false.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0252.html">20040422 phpMyChat 0.14.5</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010515">1010515</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10556">10556</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16440">phpmychat-auth-bypass(16440)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmychat" vendor="php_heaven">
        <vers num="0.14.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2716" seq="2004-2716" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple SQL injection vulnerabilities in usersL.php3 in PHPMyChat 0.14.5 allow remote attackers to execute arbitrary SQL commands via the (1) sortBy, (2) sortOrder, (3) startReg, (4) U, (5) LastCheck , and (6) R parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0252.html">20040422 phpMyChat 0.14.5</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010515">1010515</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10556">10556</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16442">phpmychat-sql-injection(16442)</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmychat" vendor="php_heaven">
        <vers num="0.14.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2717" seq="2004-2717" published="2004-12-31" modified="2009-04-03" severity="Low" CVSS_version="2.0" CVSS_score="2.6" CVSS_base_score="2.6" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="4.9" CVSS_vector="(AV:N/AC:H/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Multiple directory traversal vulnerabilities in admin.php3 in PHPMyChat 0.14.5 allow remote attackers with administrative privileges to read arbitrary files via a .. (dot dot) in the (1) sheet and (2) What parameters.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0252.html">20040422 phpMyChat 0.14.5</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010515">1010515</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10556">10556</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmychat" vendor="php_heaven">
        <vers num="0.14.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2718" seq="2004-2718" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">PHPMyChat 0.14.5 does not remove or protect setup.php3 after installation, which allows attackers to obtain sensitive information including database passwords via a direct request.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/6D00S0KC0S.html">http://www.securiteam.com/unixfocus/6D00S0KC0S.html</ref>
    </refs>
    <vuln_soft>
      <prod name="phpmychat" vendor="php_heaven">
        <vers num="0.14.5"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2719" seq="2004-2719" published="2004-12-31" modified="2017-10-10" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the UrlToLocal function in PunyLib.dll of Foxmail 5.0.300 allows remote attackers to execute arbitrary code via a mail message with a long From field, a different issue than CVE-2005-0339.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BID" url="http://www.securityfocus.com/bid/9954">9954</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15640">foxmail-punylib-bo(15640)</ref>
      <ref source="EXPLOIT-DB" url="https://www.exploit-db.com/exploits/164">164</ref>
    </refs>
    <vuln_soft>
      <prod name="foxmail" vendor="foxmail">
        <vers num="5.0.300"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2720" seq="2004-2720" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in register.asp in Snitz Forums 2000 3.4.04 and earlier allows remote attackers to inject arbitrary web script or HTML via javascript events in the Email parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://forum.snitz.com/forum/topic.asp?TOPIC_ID=53360">http://forum.snitz.com/forum/topic.asp?TOPIC_ID=53360</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3200">3200</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010524" patch="1">1010524</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/366309">20040617 XSS in Snitz Forum 2000</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10564" patch="1">10564</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16444">snitz-input-validation-xss(16444)</ref>
    </refs>
    <vuln_soft>
      <prod name="snitz_forums_2000" vendor="snitz_communications">
        <vers num="3.4.04" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2721" seq="2004-2721" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">The CheckGroup function in openSkat VTMF before 2.1 generates public key pairs in which the "p" variable might not be prime, which allows remote attackers to determine the private key and decrypt messages.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://freshmeat.net/projects/openskat/?branch_id=36295&amp;release_id=178549" patch="1">http://freshmeat.net/projects/openskat/?branch_id=36295&amp;release_id=178549</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012181">1012181</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11667" patch="1">11667</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18049">openskat-vtmf-weak-encryption(18049)</ref>
    </refs>
    <vuln_soft>
      <prod name="openskat" vendor="heiko_stamer">
        <vers num="2.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2722" seq="2004-2722" published="2004-12-31" modified="2017-07-28" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">** DISPUTED **  Nessus 2.0.10a stores account passwords in plaintext in .nessusrc files, which allows local users to obtain passwords.  NOTE: the original researcher reports that the vendor has disputed this issue.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-03/1363.html">20040326 Nessus stores credentials in plain text</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009575">1009575</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15644">nessus-nessusrc-plaintext-password(15644)</ref>
    </refs>
    <vuln_soft>
      <prod name="nessus" vendor="nessus">
        <vers num="2.0.10a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2723" seq="2004-2723" published="2004-12-31" modified="2017-07-28" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">NessusWX 1.4.4 stores account passwords in plaintext in .session files, which allows local users to obtain passwords.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://seclists.org/fulldisclosure/2004/Mar/1343.html">20040327 NessusWX stores credentials in plain text</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1009577">1009577</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9993">9993</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/15641">nessuswx-sessionfiles-plaintext-password(15641)</ref>
    </refs>
    <vuln_soft>
      <prod name="nessuswx" vendor="nessus">
        <vers num="1.4.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2724" seq="2004-2724" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="7.1" CVSS_base_score="7.1" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:C)">
    <desc>
      <descript source="cve">LionMax Software Chat Anywhere 2.72a allows remote attackers to cause a denial of service (server crash and client CPU consumption) via a username beginning with percent (%) followed by a null character.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/1183.html">20040827 DoS in Chat Anywhere 2.72a</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011080">1011080</ref>
      <ref source="MISC" url="http://www.autistici.org/fdonato/advisory/ChatAnywhere2.72a-adv.txt">http://www.autistici.org/fdonato/advisory/ChatAnywhere2.72a-adv.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17148">chat-anywhere-username-dos(17148)</ref>
    </refs>
    <vuln_soft>
      <prod name="chat_anywhere" vendor="lionmax_software">
        <vers num="2.72a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2725" seq="2004-2725" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Multiple cross-site scripting (XSS) vulnerabilities in Aztek Forum 4.0 allow remote attackers to inject arbitrary web script or HTML via (1) the search parameter in (a) search.php, (2) the email parameter in (b) subscribe.php, and (3) the return and (4) title parameters in (c) forum_2.php.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012213">1012213</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11654">11654</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18057">aztek-forum-xss(18057)</ref>
    </refs>
    <vuln_soft>
      <prod name="aztek_forum" vendor="aztek_forum">
        <vers num="4.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2726" seq="2004-2726" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">HTTPMail service in MailEnable Professional 1.18 does not properly handle arguments to the Authorization header, which allows remote attackers to cause a denial of service (null dereference and application crash).  NOTE: This is a different vulnerability than CVE-2005-1348.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-05/0159.html">20040516 RE: Remote Buffer Overflow in MailEnable HTTPMail</ref>
      <ref source="MISC" url="http://www.oliverkarow.de/research/MailWebHTTPAuthCrash.txt">http://www.oliverkarow.de/research/MailWebHTTPAuthCrash.txt</ref>
    </refs>
    <vuln_soft>
      <prod name="mailenable" vendor="mailenable">
        <vers num="1.18" edition=":professional"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2727" seq="2004-2727" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in MEHTTPS (HTTPMail) of MailEnable Professional 1.5 through 1.7 allows remote attackers to cause a denial of service (application crash) via a long HTTP GET request.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010107">1010107</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10312" patch="1">10312</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2005/0383">ADV-2005-0383</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16114">mailenable-enabled-mehttps-dos(16114)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16115">mailenable-disabled-mehttps-bo(16115)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailenable" vendor="mailenable">
        <vers num="1.5"/>
        <vers num="1.6"/>
        <vers num="1.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2728" seq="2004-2728" published="2004-12-31" modified="2017-07-28" severity="Low" CVSS_version="2.0" CVSS_score="3.5" CVSS_base_score="3.5" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="6.8" CVSS_vector="(AV:N/AC:M/Au:S/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">Buffer overflow in the FTP server of Hummingbird Connectivity 7.1 and 9.0 allows remote, authenticated users to cause a denial of service (application crash) via a long argument to the XCWD command.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011942">1011942</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11542">11542</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17855">hummingbird-xwcd-dos(17855)</ref>
    </refs>
    <vuln_soft>
      <prod name="connectivity" vendor="hummingbird">
        <vers num="7.1"/>
        <vers num="9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2729" seq="2004-2729" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Inetd32 Administration Tool of Hummingbird Connectivity 7.1 and 9.0 allows local users to execute arbitrary code by changing the program for handling incoming connections.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011942">1011942</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11539">11539</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17854">hummingbird-inetd32-gain-privileges(17854)</ref>
    </refs>
    <vuln_soft>
      <prod name="connectivity" vendor="hummingbird">
        <vers num="7.1"/>
        <vers num="9.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2730" seq="2004-2730" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.6" CVSS_base_score="4.6" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Sysinternals PsTools before 2.05, including (1) PsExec before 1.54, (2) PsGetsid before 1.41, (3) PsInfo before 1.61, (4) PsKill before 1.03, (5) PsList before 1.26, (6) PsLoglist before 2.51, (7) PsPasswd before 1.21, (8) PsService before 2.12, (9) PsSuspend before 1.05, and (10) PsShutdown before 2.32, does not properly disconnect from remote IPC$ and ADMIN$ shares, which allows local users to access the shares with elevated privileges by using the existing share mapping.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010737">1010737</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10759" patch="1">10759</ref>
      <ref source="MISC" url="http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=28304">http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=28304</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16743">pstools-gain-admin-access(16743)</ref>
    </refs>
    <vuln_soft>
      <prod name="psexec" vendor="microsoft">
        <vers num="1.53" prev="1"/>
      </prod>
      <prod name="psgetsid" vendor="microsoft">
        <vers num="1.40" prev="1"/>
      </prod>
      <prod name="psinfo" vendor="microsoft">
        <vers num="1.60" prev="1"/>
      </prod>
      <prod name="pskill" vendor="microsoft">
        <vers num="1.02" prev="1"/>
      </prod>
      <prod name="pslist" vendor="microsoft">
        <vers num="1.25" prev="1"/>
      </prod>
      <prod name="psloglist" vendor="microsoft">
        <vers num="2.50" prev="1"/>
      </prod>
      <prod name="pspasswd" vendor="microsoft">
        <vers num="1.20" prev="1"/>
      </prod>
      <prod name="psservice" vendor="microsoft">
        <vers num="2.11" prev="1"/>
      </prod>
      <prod name="psshutdown" vendor="microsoft">
        <vers num="2.31" prev="1"/>
      </prod>
      <prod name="pssuspend" vendor="microsoft">
        <vers num="1.04" prev="1"/>
      </prod>
      <prod name="sysinternals_pstools" vendor="microsoft">
        <vers num="2.04" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2731" seq="2004-2731" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.4" CVSS_base_score="4.4" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="3.4" CVSS_vector="(AV:L/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function or (2) a negative buffer size to the copyin function.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-06/0463.html">20040629 linux kernel Sbus PROM driver multiple integer overflows</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010617">1010617</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2008/dsa-1503">DSA-1503</ref>
      <ref source="MISC" url="http://www.securiteam.com/unixfocus/5GP0515DFW.html">http://www.securiteam.com/unixfocus/5GP0515DFW.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10632">10632</ref>
    </refs>
    <vuln_soft>
      <prod name="linux_kernel" vendor="linux">
        <vers num="2.4.0" edition="test1"/>
        <vers num="2.4.0" edition="test10"/>
        <vers num="2.4.0" edition="test11"/>
        <vers num="2.4.0" edition="test12"/>
        <vers num="2.4.0" edition="test2"/>
        <vers num="2.4.0" edition="test3"/>
        <vers num="2.4.0" edition="test4"/>
        <vers num="2.4.0" edition="test5"/>
        <vers num="2.4.0" edition="test6"/>
        <vers num="2.4.0" edition="test7"/>
        <vers num="2.4.0" edition="test8"/>
        <vers num="2.4.0" edition="test9"/>
        <vers num="2.4.1"/>
        <vers num="2.4.2"/>
        <vers num="2.4.3" edition="pre3"/>
        <vers num="2.4.4"/>
        <vers num="2.4.5"/>
        <vers num="2.4.6"/>
        <vers num="2.4.7"/>
        <vers num="2.4.8"/>
        <vers num="2.4.9"/>
        <vers num="2.4.9_pre5"/>
        <vers num="2.4.10"/>
        <vers num="2.4.11" edition="pre3"/>
        <vers num="2.4.12"/>
        <vers num="2.4.13"/>
        <vers num="2.4.14"/>
        <vers num="2.4.15"/>
        <vers num="2.4.16"/>
        <vers num="2.4.17"/>
        <vers num="2.4.18" edition="pre1"/>
        <vers num="2.4.18" edition="pre2"/>
        <vers num="2.4.18" edition="pre3"/>
        <vers num="2.4.18" edition="pre4"/>
        <vers num="2.4.18" edition="pre5"/>
        <vers num="2.4.18" edition="pre6"/>
        <vers num="2.4.18" edition="pre7"/>
        <vers num="2.4.18" edition="pre8"/>
        <vers num="2.4.18" edition="pre9"/>
        <vers num="2.4.19" edition="pre1"/>
        <vers num="2.4.19" edition="pre2"/>
        <vers num="2.4.19" edition="pre3"/>
        <vers num="2.4.19" edition="pre4"/>
        <vers num="2.4.19" edition="pre5"/>
        <vers num="2.4.19" edition="pre6"/>
        <vers num="2.4.20"/>
        <vers num="2.4.21" edition="pre1"/>
        <vers num="2.4.21" edition="pre4"/>
        <vers num="2.4.21" edition="pre7"/>
        <vers num="2.4.22" edition="pre10"/>
        <vers num="2.4.23" edition="pre9"/>
        <vers num="2.4.23_ow2"/>
        <vers num="2.4.24"/>
        <vers num="2.4.24_ow1"/>
        <vers num="2.4.25"/>
        <vers num="2.4.26"/>
        <vers num="2.4.27" edition="pre1"/>
        <vers num="2.4.27" edition="pre2"/>
        <vers num="2.4.27" edition="pre3"/>
        <vers num="2.4.27" edition="pre4"/>
        <vers num="2.4.27" edition="pre5"/>
        <vers num="2.4.28"/>
        <vers num="2.4.29" edition="rc1"/>
        <vers num="2.4.29" edition="rc2"/>
        <vers num="2.4.30" edition="rc2"/>
        <vers num="2.4.30" edition="rc3"/>
        <vers num="2.4.31" edition="pre1"/>
        <vers num="2.4.32" edition="pre1"/>
        <vers num="2.4.32" edition="pre2"/>
        <vers num="2.4.33" edition="pre1"/>
        <vers num="2.4.33.2"/>
        <vers num="2.4.33.3"/>
        <vers num="2.4.33.4"/>
        <vers num="2.4.33.5"/>
        <vers num="2.4.34" edition="rc3"/>
        <vers num="2.4.34.1"/>
        <vers num="2.4.34.2"/>
        <vers num="2.4.35"/>
        <vers num="2.4.35.2"/>
        <vers num="2.6.0"/>
        <vers num="2.6.1"/>
        <vers num="2.6.2"/>
        <vers num="2.6.3"/>
        <vers num="2.6.4"/>
        <vers num="2.6.5"/>
        <vers num="2.6.6"/>
        <vers num="2.6.7"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2732" seq="2004-2732" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">nbmember.cgi in Netbilling 2.0 allows remote attackers to obtain sensitive information via the cmd=test option, which can be leveraged to determine the access key.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011881">1011881</ref>
      <ref source="MISC" url="http://web.archive.org/web/20041106200147/http://www.it-helpnet.de/bugless/bugs.php?mode=show&amp;id=8&amp;SID=">http://web.archive.org/web/20041106200147/http://www.it-helpnet.de/bugless/bugs.php?mode=show&amp;id=8&amp;SID=</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11504">11504</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17865">netbilling-information-disclosure(17865)</ref>
    </refs>
    <vuln_soft>
      <prod name="netbilling" vendor="netbilling">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2733" seq="2004-2733" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:P)">
    <desc>
      <descript source="cve">Web Wiz Forums 7.7a uses invalid logic to determine user privileges, which allows remote attackers to (1) block arbitrary IP addresses via pop_up_ip_blocking.asp or (2) modify topics via pop_up_topic_admin.asp.</descript>
    </desc>
    <loss_types>
      <avail/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://archives.neohapsis.com/archives/fulldisclosure/2004-04/1119.html">20040430 Critical bug in Web Wiz Forum</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010012">1010012</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10255">10255</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16030">webwizforums-popuptopicadmin-modify(16030)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16031">webwizforums-unauth-ip-blocking(16031)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_wiz_forums" vendor="webwiz">
        <vers num="7.7" edition="a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2734" seq="2004-2734" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">webadmin-apache.conf in Novell Web Manager of Novell NetWare 6.5 uses an uppercase Alias tag with an inconsistent lowercase directory tag for a volume, which allows remote attackers to bypass access control to the WEB-INF folder.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot admin="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011012">1011012</ref>
      <ref source="CONFIRM" url="http://support.novell.com/cgi-bin/search/searchtid.cgi?/10094233.htm">http://support.novell.com/cgi-bin/search/searchtid.cgi?/10094233.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11000">11000</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/40478">novell-webadminapache-security-bypass(40478)</ref>
    </refs>
    <vuln_soft>
      <prod name="netware" vendor="novell">
        <vers num="6.5" edition="sp1"/>
        <vers num="6.5" edition="sp1.1a"/>
        <vers num="6.5" edition="sp1.1b"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2735" seq="2004-2735" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in P4DB 2.01 and earlier allows remote attackers to inject arbitrary web script or HTML via (1) SET_PREFERENCES parameter in SetPreferences.cgi; (2) BRANCH parameter in branchView.cgi; (3) FSPC and (4) COMPLETE parameters in changeByUsers.cgi; (5) FSPC, (6) LABEL, (7) EXLABEL, (8) STATUS, (9) MAXCH, (10) FIRSTCH, (11) CHOFFSETDISP, (12) SEARCHDESC, (13) SEARCH_INVERT, (14) USER, (15) GROUP, and (16) CLIENT parameters in changeList.cgi; (17) CH parameter in changeView.cgi; (18) USER parameter in clientList.cgi; (19) CLIENT parameter in clientView.cgi; (20) FSPC parameter in depotTreeBrowser.cgi; (21) FSPC parameter in depotStats.cgi; (22) FSPC, (23) REV, (24) ACT, (25) FSPC2, (26) REV2, (27) CH, and (28) CONTEXT parameters in fileDiffView.cgi; (29) FSPC and (30) REV parameters in fileDownLoad.cgi; (31) FSPC, (32) LISTLAB, and (33) SHOWBRANCH parameters in fileLogView.cgi; (34) FSPC and (35) LABEL parameters in fileSearch.cgi; (36) FSPC, (37) REV, and (38) FORCE parameters in fileViewer.cgi; (39) FSPC parameter in filesChangedSince.cgi; (40) GROUP parameter in groupView.cgi; (41) TYPE, (42) FSPC, and (43) REV parameters in htmlFileView.cgi; (44) CMD parameter in javaDataView.cgi; (45) JOBVIEW and (46) FLD parameters in jobList.cgi; (47) JOB parameter in jobView.cgi; (48) LABEL1 and (49) LABEL2 parameters in labelDiffView.cgi; (50) LABEL parameter in labelView.cgi; (51) FSPC parameter in searchPattern.cgi; (52) TYPE, (53) FSPC, and (54) REV parameters in specialFileView.cgi; (55) GROUPSONLY parameter in userList.cgi; or (56) USER parameter in userView.cgi.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-05/0046.html">20040505 Multiple vulnerabilities in P4DB</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1010078">1010078</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10286">10286</ref>
      <ref source="MISC" url="http://www.weak.org/~jammer/p4db_v2.01_patch_4.txt" patch="1">http://www.weak.org/~jammer/p4db_v2.01_patch_4.txt</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16070">p4db-url-xss(16070)</ref>
    </refs>
    <vuln_soft>
      <prod name="p4db" vendor="fredric_fredricson">
        <vers num="2.01" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2736" seq="2004-2736" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Polar HelpDesk 3.0 allows remote attackers to bypass authentication by setting the UserId and UserType values in a cookie.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5OP0K0ADGA.html">http://www.securiteam.com/windowsntfocus/5OP0K0ADGA.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10775">10775</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16778">polar-helpdesk-weak-security(16778)</ref>
    </refs>
    <vuln_soft>
      <prod name="helpdesk" vendor="polar_software">
        <vers num="3.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2737" seq="2004-2737" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in problist.asp in NetSupport DNA HelpDesk 1.01 allows remote attackers to execute arbitrary SQL commands via the where parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://www.securiteam.com/windowsntfocus/5PP0L0ADGE.html">http://www.securiteam.com/windowsntfocus/5PP0L0ADGE.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10772">10772</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16782">dnahelpdesk-problistasp-sql-injection(16782)</ref>
    </refs>
    <vuln_soft>
      <prod name="dna_helpdesk" vendor="netsupport">
        <vers num="1.01"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2738" seq="2004-2738" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in check_user_id.php in ZeroBoard 4.1pl4 and earlier allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="FULLDISC" url="http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030224.html">20041223 STG Security Advisory: [SSA-20041220-16] PHP source injection and cross-site scripting vulnerabilities in ZeroBoard</ref>
      <ref source="BUGTRAQ" url="http://marc.info/?l=bugtraq&amp;m=110391024404947&amp;w=2">20041224 STG Security Advisory: [SSA-20041220-16] PHP source injection and cross-site scripting vulnerabilities in ZeroBoard</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012677">1012677</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12103">12103</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18680">zeroboard-checkuserid-xss(18680)</ref>
    </refs>
    <vuln_soft>
      <prod name="zeroboard" vendor="zeroboard">
        <vers num="4.1_pl2"/>
        <vers num="4.1_pl3"/>
        <vers num="4.1_pl4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2739" seq="2004-2739" published="2004-12-31" modified="2017-07-28" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The setup routine (setup.php) in PHProjekt 4.2.1 and earlier allows remote attackers to modify system configuration via unknown attack vectors.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012369">1012369</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-06.xml">GLSA-200412-06</ref>
      <ref source="SUSE" url="http://www.novell.com/linux/security/advisories/2004_04_sr.html">SuSE-SR:2004:004</ref>
      <ref source="CONFIRM" url="http://www.phprojekt.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=189&amp;mode=thread&amp;order=0">http://www.phprojekt.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=189&amp;mode=thread&amp;order=0</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11797">11797</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18320">phprojekt-setup-command-execution(18320)</ref>
    </refs>
    <vuln_soft>
      <prod name="phprojekt" vendor="phprojekt">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.1"/>
        <vers num="2.1a"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="2.4a"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.1a"/>
        <vers num="3.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2740" seq="2004-2740" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">PHP remote file inclusion vulnerability in authform.inc.php in PHProjekt 4.2.3 and earlier allows remote attackers to include arbitrary PHP code via a URL in the path_pre parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012708">1012708</ref>
      <ref source="GENTOO" url="http://www.gentoo.org/security/en/glsa/glsa-200412-27.xml">GLSA-200412-27</ref>
      <ref source="CONFIRM" url="http://www.phprojekt.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=193">http://www.phprojekt.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=193</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12116">12116</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18683">phprojekt-pathpre-file-include(18683)</ref>
    </refs>
    <vuln_soft>
      <prod name="phprojekt" vendor="phprojekt">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.1"/>
        <vers num="2.1a"/>
        <vers num="2.2"/>
        <vers num="2.3"/>
        <vers num="2.4"/>
        <vers num="2.4a"/>
        <vers num="3.0"/>
        <vers num="3.1"/>
        <vers num="3.1a"/>
        <vers num="3.2"/>
        <vers num="4.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2741" seq="2004-2741" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the "help window" (help.php) in Horde Application Framework 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) module, (2) topic, or (3) module parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://cvs.horde.org/diff.php/horde/templates/help/index.inc?r1=1.9.2.4&amp;r2=1.9.2.5&amp;ty=u">http://cvs.horde.org/diff.php/horde/templates/help/index.inc?r1=1.9.2.4&amp;r2=1.9.2.5&amp;ty=u</ref>
      <ref source="MLIST" url="http://lists.horde.org/archives/announce/2004/000107.html" patch="1">[horde-announce] 20041026 Horde 2.2.7 (final)</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011959">1011959</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11546">11546</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17881">horde-help-window-xss(17881)</ref>
    </refs>
    <vuln_soft>
      <prod name="application_framework" vendor="horde">
        <vers num="2.0"/>
        <vers num="2.1"/>
        <vers num="2.1.3"/>
        <vers num="2.2"/>
        <vers num="2.2.1"/>
        <vers num="2.2.3"/>
        <vers num="2.2.4"/>
        <vers num="2.2.4_rc1"/>
        <vers num="2.2.5"/>
        <vers num="2.2.6"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2742" seq="2004-2742" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the report viewer in Crystal Enterprise 8.5, 9, and 10 allows remote attackers to inject arbitrary web script or HTML via script in the URL to a report (RPT) file.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1012703">1012703</ref>
      <ref source="CONFIRM" url="http://support.businessobjects.com/library/kbase/articles/c2016559.asp" patch="1">http://support.businessobjects.com/library/kbase/articles/c2016559.asp</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/12107" patch="1">12107</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/18684">crystal-enterprise-report-xss(18684)</ref>
    </refs>
    <vuln_soft>
      <prod name="crystal_enterprise" vendor="businessobjects">
        <vers num="8.5" edition=":aix"/>
        <vers num="8.5" edition=":solaris"/>
        <vers num="8.5" edition=":windows"/>
        <vers num="9" edition=":windows"/>
        <vers num="10" edition=":aix"/>
        <vers num="10" edition=":hpux"/>
        <vers num="10" edition=":linux"/>
        <vers num="10" edition=":solaris"/>
        <vers num="10" edition=":windows"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2743" seq="2004-2743" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.4" CVSS_base_score="6.4" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">upload.cgi in Mega Upload Progress Bar before 1.45 allows remote attackers to copy or overwrite arbitrary files via unspecified parameters related to names of uploaded files.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011960">1011960</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=277989">http://sourceforge.net/project/shownotes.php?release_id=277989</ref>
      <ref source="CONFIRM" url="http://www.raditha.com/blog/archives/000547.html" patch="1">http://www.raditha.com/blog/archives/000547.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11547">11547</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17882">megaupload-upload(17882)</ref>
    </refs>
    <vuln_soft>
      <prod name="mega_upload_progress_bar" vendor="raditha_dissanayake">
        <vers num="1.30"/>
        <vers num="1.35"/>
        <vers num="1.43"/>
        <vers num="1.44"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2744" seq="2004-2744" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Unspecified vulnerability in Tincan Limited PHPlist before 2.8.12 has unknown impact and attack vectors, related to a "security update release."</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011958">1011958</ref>
      <ref source="CONFIRM" url="http://sourceforge.net/project/shownotes.php?release_id=277981" patch="1">http://sourceforge.net/project/shownotes.php?release_id=277981</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17883">phplist(17883)</ref>
    </refs>
    <vuln_soft>
      <prod name="mailing_list_manager" vendor="phplist">
        <vers num="2.8.11" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2745" seq="2004-2745" published="2004-12-31" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.8" CVSS_base_score="7.8" CVSS_impact_subscore="6.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Anteco Visual Technologies OwnServer 1.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in a URL.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3329">3329</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/350421/30/21610/threaded">20040120 OwnServer 1.0 Directory Transversal Vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9461">9461</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008800">1008800</ref>
    </refs>
    <vuln_soft>
      <prod name="ownserver" vendor="anteco_visual_technologies">
        <vers num="1.0" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2746" seq="2004-2746" published="2004-12-31" modified="2018-10-19" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in adminlogin.asp in XTREME ASP Photo Gallery 2.0 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3346">3346</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008745">1008745</ref>
      <ref source="CONFIRM" url="http://www.pensacolawebdesigns.com/xtremeasp/readmore.asp" patch="1">http://www.pensacolawebdesigns.com/xtremeasp/readmore.asp</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/350028/30/21640/threaded">20040115 Xtreme ASP Photo Gallery</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9438">9438</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14860">xtremeaspphotogallery-or-sql-injection(14860)</ref>
    </refs>
    <vuln_soft>
      <prod name="xtremeasp_photogallery" vendor="pensacola_web_designs">
        <vers num="2.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2747" seq="2004-2747" published="2004-12-31" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in Pablo Software Solutions Quick 'n Easy FTP Server 1.77, and possibly earlier versions, allows remote authenticated users to determine the existence of arbitrary files via a .. (dot dot) in the DEL command, which triggers different error messages depending on whether the file exists or not.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/350224/30/21640/threaded">20040118 Pablo Sofware Solutions FTP server can detect if a file exists outside the FTP root directory</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9443" patch="1">9443</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008756">1008756</ref>
    </refs>
    <vuln_soft>
      <prod name="quick_n_easy_ftp_server" vendor="pablo_software_solutions">
        <vers num="1.77"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2748" seq="2004-2748" published="2004-12-31" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">viewreport.pl in NetIQ WebTrends Reporting Center Enterprise Edition 6.1a allows remote attackers to determine the installation path via an invalid profileid parameter, which leaks the pathname in an error message.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3354">3354</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/350419/30/21610/threaded">20040120 WebTrends Reporting Center Path Disclosure vulnerability</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9460">9460</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008799">1008799</ref>
    </refs>
    <vuln_soft>
      <prod name="reporting_center" vendor="webtrends">
        <vers num="6.1a"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2749" seq="2004-2749" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in wra/public/wralogin in 2Wire Gateway, possibly as used in HomePortal and other product lines, allows remote attackers to read arbitrary files via a .. (dot dot) in the return parameter.  NOTE: this issue was reported as XSS, but this might be a terminology error.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archives.neohapsis.com/archives/bugtraq/2004-01/0179.html">20040120 2Wire-Gateway Cross Site Scripting and Directory Transversal bug in SSL Form</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008798">1008798</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9463">9463</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14894">homeportal-wralogin-directory-traversal(14894)</ref>
    </refs>
    <vuln_soft>
      <prod name="homeportal" vendor="2wire">
        <vers num="100s"/>
        <vers num="100w"/>
        <vers num="1000"/>
        <vers num="1000s"/>
        <vers num="1000sw"/>
        <vers num="1000w"/>
        <vers num="1500w"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2750" seq="2004-2750" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Directory traversal vulnerability in browser.php in JBrowser 1.0 through 2.1 allows remote attackers to read arbitrary files via the directory parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008909">1008909</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9535" patch="1">9535</ref>
    </refs>
    <vuln_soft>
      <prod name="jbrowser" vendor="jbrowser">
        <vers num="1.0"/>
        <vers num="2.0"/>
        <vers num="2.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2751" seq="2004-2751" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in the members_list module in PostNuke 0.726, and possibly earlier, allows remote attackers to execute arbitrary SQL commands via the sortby parameter.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="VULNWATCH" url="http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0117.html">20030309 Postnuke v 0.723 SQL injection and directory traversing</ref>
      <ref source="CONFIRM" url="http://community.postnuke.com/Article2535.htm" patch="1">http://community.postnuke.com/Article2535.htm</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008629">1008629</ref>
      <ref source="BUGTRAQ" url="http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2004-01/0015.html" patch="1">20040102 PostNuke Issues (0.726 &amp;&amp; Possibly Older)</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/11500">postnuke-memberslist-sql-injection(11500)</ref>
    </refs>
    <vuln_soft>
      <prod name="postnuke" vendor="postnuke_software_foundation">
        <vers num="0.722"/>
        <vers num="0.723"/>
        <vers num="0.726"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2752" seq="2004-2752" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the Downloads module in PostNuke up to 0.726, and possibly later versions, allows remote attackers to inject arbitrary HTML and web script via the ttitle parameter in a viewdownloaddetails action.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008629" patch="1">1008629</ref>
      <ref source="BUGTRAQ" url="http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2004-01/0015.html">20040102 PostNuke Issues (0.726 &amp;&amp; Possibly Older)</ref>
    </refs>
    <vuln_soft>
      <prod name="postnuke" vendor="postnuke_software_foundation">
        <vers num="0.726"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2753" seq="2004-2753" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="5.6" CVSS_base_score="5.6" CVSS_impact_subscore="7.8" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:C)">
    <desc>
      <descript source="cve">Unspecified vulnerability in SharedX in HP-UX B.11.00, B.11.11, and B.11.22 allows local users to access unspecified files or cause a denial of service via unknown vectors related to handling of "files in a potentially insecure manner."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="CIAC" url="http://www.ciac.org/ciac/bulletins/o-058.shtml">O-058</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9420" patch="1">9420</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008712">1008712</ref>
      <ref source="HP" url="http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0401-307">SSRT3476</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14838">hp-sharedx-insecure-files(14838)</ref>
    </refs>
    <vuln_soft>
      <prod name="hp-ux" vendor="hp">
        <vers num="11.00"/>
        <vers num="11.11"/>
        <vers num="11.22"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2754" seq="2004-2754" published="2004-12-31" modified="2008-09-05" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">SQL injection vulnerability in SSI.php in YaBB SE 1.5.4, 1.5.3, and possibly other versions before 1.5.5 allows remote attackers to execute arbitrary SQL commands via the ID_MEMBER parameter to the (1) recentTopics and (2) welcome functions.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SREASON" url="http://securityreason.com/securityalert/3371">3371</ref>
      <ref source="MISC" url="http://sourceforge.net/project/shownotes.php?release_id=210608&amp;group_id=57105" patch="1">http://sourceforge.net/project/shownotes.php?release_id=210608&amp;group_id=57105</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/350244">20040119 Yabb SE SQL Injection</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9449" patch="1">9449</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/id?1008764">1008764</ref>
      <ref source="MISC" url="http://www.yabbse.org/community/index.php?thread=27122">http://www.yabbse.org/community/index.php?thread=27122</ref>
    </refs>
    <vuln_soft>
      <prod name="yabb_se" vendor="yabb">
        <vers num="0.8"/>
        <vers num="1.1.3"/>
        <vers num="1.4.1"/>
        <vers num="1.5.0"/>
        <vers num="1.5.1"/>
        <vers num="1.5.1_rc1"/>
        <vers num="1.5.2"/>
        <vers num="1.5.3"/>
        <vers num="1.5.4"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2755" seq="2004-2755" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Symantec Web Security 2.5, 3.0.0, and 3.0.1 before build 62 allows remote attackers to inject arbitrary web script or HTML via the query string in blocked URLs that are listed in (1) error or (2) block page messages.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://securityresponse.symantec.com/avcenter/security/Content/2004.01.13.html">http://securityresponse.symantec.com/avcenter/security/Content/2004.01.13.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9418">9418</ref>
      <ref source="SECTRACK" url="http://www.securitytracker.com/alerts/2004/Jan/1008711.html">1008711</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14825">symantec-websecurity-blocked-xss(14825)</ref>
    </refs>
    <vuln_soft>
      <prod name="web_security" vendor="symantec">
        <vers num="2.5"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2756" seq="2004-2756" published="2004-12-31" modified="2008-09-05" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in viewtopic.php in Xoops 2.x, possibly 2 through 2.0.5, allows remote attackers to inject arbitrary web script or HTML via the (1) forum and (2) topic_id parameters.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008849">1008849</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9497">9497</ref>
    </refs>
    <vuln_soft>
      <prod name="xoops" vendor="xoops">
        <vers num="2.0"/>
        <vers num="2.0.1"/>
        <vers num="2.0.2"/>
        <vers num="2.0.3"/>
        <vers num="2.0.5"/>
        <vers num="2.0.5.1"/>
        <vers num="2.0.5.2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2757" seq="2004-2757" published="2004-12-31" modified="2017-07-28" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in the failed login page in Novell iChain before 2.2 build 2.2.113 and 2.3 First Customer Ship (FCS) allows remote attackers to inject arbitrary web script or HTML via url parameter.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://support.novell.com/cgi-bin/search/searchtid.cgi?/10080762.htm">http://support.novell.com/cgi-bin/search/searchtid.cgi?/10080762.htm</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/9412">9412</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14873">ichain-url-xss(14873)</ref>
    </refs>
    <vuln_soft>
      <prod name="ichain" vendor="novell">
        <vers num="2.2" prev="1" edition="sp1"/>
        <vers num="2.2" prev="1" edition="sp1a"/>
        <vers num="2.2" prev="1" edition="sp2"/>
        <vers num="2.2" prev="1" edition="sp3"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2758" seq="2004-2758" published="2004-12-31" modified="2017-08-07" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">Multiple unspecified vulnerabilities in the H.323 protocol implementation for Sun SunForum 3.2 and 3D 1.0 allow remote attackers to cause a denial of service (segmentation fault and process crash), as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1008749">1008749</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101429-1">101429</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57476-1">57476</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-200181-1">200181</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000135.1-1">1000135</ref>
      <ref source="CERT" url="http://www.cert.org/advisories/CA-2004-01.html">CA-2004-01</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/749342">VU#749342</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/14173">C07h2250v4-attacktool-malformed-packets(14173)</ref>
    </refs>
    <vuln_soft>
      <prod name="sunforum" vendor="sun">
        <vers num="3.2"/>
        <vers num="3d_1.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2759" seq="2004-2759" published="2004-12-31" modified="2017-08-07" severity="Low" CVSS_version="2.0" CVSS_score="2.1" CVSS_base_score="2.1" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Shared Sun StorEdge QFS and SAM-QFS file systems, as used in Utilization Suite 4.0 through 4.1 and Performance Suite 4.0 through 4.1, might allow local users to read portions of deleted files by accessing data within sparse files.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101527-1">101527</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-200184-1">200184</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/11559">11559</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/17901">storedge-deleted-obtain-info(17901)</ref>
    </refs>
    <vuln_soft>
      <prod name="storedge_qfs" vendor="sun">
        <vers num=""/>
      </prod>
      <prod name="storedge_sam-qfs" vendor="sun">
        <vers num=""/>
      </prod>
      <prod name="storeedge_performance_suite" vendor="sun">
        <vers num="4.0"/>
        <vers num="4.1"/>
      </prod>
      <prod name="storeedge_utilization_suite" vendor="sun">
        <vers num="4.0"/>
        <vers num="4.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2760" seq="2004-2760" published="2004-12-31" modified="2009-01-29" severity="Medium" CVSS_version="2.0" CVSS_score="6.8" CVSS_base_score="6.8" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">sshd in OpenSSH 3.5p1, when PermitRootLogin is disabled, immediately closes the TCP connection after a root login attempt with the correct password, but leaves the connection open after an attempt with an incorrect password, which makes it easier for remote attackers to guess the password by observing the connection state, a different vulnerability than CVE-2003-0190.  NOTE: it could be argued that in most environments, this does not cross privilege boundaries without requiring leverage of a separate vulnerability.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
      <sec_prot other="1"/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="BUGTRAQ" url="http://archive.cert.uni-stuttgart.de/bugtraq/2004/04/msg00162.html">20040412 BID 7482, bug in OpenSSH (Still in FreeBSD-STABLE)</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4100">4100</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/360198">20040413 Re: Fwd: [BID 7482, bug in OpenSSH (Still in FreeBSD-STABLE)]</ref>
    </refs>
    <vuln_soft>
      <prod name="openssh" vendor="openbsd">
        <vers num="3.5"/>
        <vers num="3.5p1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2761" seq="2004-2761" published="2009-01-05" modified="2018-10-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of MD5 in the signature algorithm of an X.509 certificate.</descript>
    </desc>
    <impacts>
      <impact source="nvd">There are four significant mitigating factors.

1) Most enterprise-class certificates, such as VeriSign’s Extended Validation SSL Certificates use the still secure SHA-1 hash function. 

2) Certificates already issued with MD5 signatures are not at risk.  The exploit only affects new certificate acquisitions. 

3) CAs are quickly moving to replace MD5 with SHA-1.  For example, VeriSign was planning to phase out MD5 by the end of January 2009.  The date was pushed up due to the December proof of concept.  On December 31, 2008, RapidSSL certificates shipped with SHA-1 digital signatures. 

4)The researchers did not release the under-the-hood specifics of how the exploit was executed. 

Source - http://www.techrepublic.com/blog/it-security/the-new-md5-ssl-exploit-is-not-the-end-of-civilization-as-we-know-it/?tag=nl.e036</impact>
    </impacts>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="http://blog.mozilla.com/security/2008/12/30/md5-weaknesses-could-lead-to-certificate-forgery/">http://blog.mozilla.com/security/2008/12/30/md5-weaknesses-could-lead-to-certificate-forgery/</ref>
      <ref source="MISC" url="http://blogs.technet.com/swi/archive/2008/12/30/information-regarding-md5-collisions-problem.aspx">http://blogs.technet.com/swi/archive/2008/12/30/information-regarding-md5-collisions-problem.aspx</ref>
      <ref source="SREASON" url="http://securityreason.com/securityalert/4866">4866</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1024697">1024697</ref>
      <ref source="CISCO" url="http://www.cisco.com/en/US/products/products_security_response09186a0080a5d24a.html">20090115 MD5 Hashes May Allow for Certificate Spoofing</ref>
      <ref source="MISC" url="http://www.doxpara.com/research/md5/md5_someday.pdf">http://www.doxpara.com/research/md5/md5_someday.pdf</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/836068" adv="1">VU#836068</ref>
      <ref source="MISC" url="http://www.microsoft.com/technet/security/advisory/961509.mspx" adv="1" patch="1">http://www.microsoft.com/technet/security/advisory/961509.mspx</ref>
      <ref source="MISC" url="http://www.phreedom.org/research/rogue-ca/">http://www.phreedom.org/research/rogue-ca/</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/499685/100/0/threaded">20081230 MD5 Considered Harmful Today: Creating a rogue CA certificate</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/33065">33065</ref>
      <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-740-1">USN-740-1</ref>
      <ref source="MISC" url="http://www.win.tue.nl/hashclash/rogue-ca/">http://www.win.tue.nl/hashclash/rogue-ca/</ref>
      <ref source="MISC" url="http://www.win.tue.nl/hashclash/SoftIntCodeSign/">http://www.win.tue.nl/hashclash/SoftIntCodeSign/</ref>
      <ref source="MISC" url="https://blogs.verisign.com/ssl-blog/2008/12/on_md5_vulnerabilities_and_mit.php">https://blogs.verisign.com/ssl-blog/2008/12/on_md5_vulnerabilities_and_mit.php</ref>
      <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=648886">https://bugzilla.redhat.com/show_bug.cgi?id=648886</ref>
      <ref source="CONFIRM" url="https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935">https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935</ref>
      <ref source="CONFIRM" url="https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888">https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888</ref>
      <ref source="MISC" url="https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02">https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02</ref>
      <ref source="REDHAT" url="https://rhn.redhat.com/errata/RHSA-2010-0837.html">RHSA-2010:0837</ref>
      <ref source="REDHAT" url="https://rhn.redhat.com/errata/RHSA-2010-0838.html">RHSA-2010:0838</ref>
      <ref source="CONFIRM" url="https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&amp;docId=emr_na-hpesbhf03814en_us">https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&amp;docId=emr_na-hpesbhf03814en_us</ref>
      <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00096.html">FEDORA-2009-1276</ref>
    </refs>
    <vuln_soft>
      <prod name="md5" vendor="ietf">
        <vers num="-"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2762" seq="2004-2762" published="2009-03-31" modified="2017-08-16" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">The server in IBM Tivoli Storage Manager (TSM) 4.2.x on MVS, 5.1.9.x before 5.1.9.1, 5.1.x before 5.1.10, 5.2.2.x before 5.2.2.3, 5.2.x before 5.2.3, 5.3.x before 5.3.0, and 6.x before 6.1, when the HTTP communication method is enabled, allows remote attackers to cause a denial of service (daemon crash or hang) via unspecified HTTP traffic, as demonstrated by the IBM port scanner 1.3.1.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1021946">1021946</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/34285">34285</ref>
      <ref source="VUPEN" url="http://www.vupen.com/english/advisories/2009/0881" adv="1">ADV-2009-0881</ref>
      <ref source="CONFIRM" url="http://www-01.ibm.com/support/docview.wss?uid=swg21246076">http://www-01.ibm.com/support/docview.wss?uid=swg21246076</ref>
      <ref source="CONFIRM" url="http://www-01.ibm.com/support/docview.wss?uid=swg21375360">http://www-01.ibm.com/support/docview.wss?uid=swg21375360</ref>
      <ref source="AIXAPAR" url="http://www-1.ibm.com/support/docview.wss?uid=swg1IC39395" adv="1">IC39395</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/49535">tsm-http-dos(49535)</ref>
    </refs>
    <vuln_soft>
      <prod name="tivoli_storage_manager" vendor="ibm">
        <vers num="4.2"/>
        <vers num="4.2.1"/>
        <vers num="4.2.2"/>
        <vers num="4.2.3"/>
        <vers num="4.2.4"/>
        <vers num="5.1.0"/>
        <vers num="5.1.1"/>
        <vers num="5.1.5"/>
        <vers num="5.1.6"/>
        <vers num="5.1.7"/>
        <vers num="5.1.8"/>
        <vers num="5.1.9"/>
        <vers num="5.2.0"/>
        <vers num="5.2.1"/>
        <vers num="5.2.2"/>
        <vers num="5.3"/>
        <vers num="6.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2763" seq="2004-2763" published="2009-06-01" modified="2009-06-02" severity="Medium" CVSS_version="2.0" CVSS_score="5.8" CVSS_base_score="5.8" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">The default configuration of Sun ONE/iPlanet Web Server 4.1 SP1 through SP12 and 6.0 SP1 through SP5 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://archive.cert.uni-stuttgart.de/uniras/2004/02/msg00007.html">50603</ref>
      <ref source="MISC" url="http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf">http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf</ref>
      <ref source="CERT-VN" url="http://www.kb.cert.org/vuls/id/867593">VU#867593</ref>
    </refs>
    <vuln_soft>
      <prod name="iplanet_web_server" vendor="sun">
        <vers num="4.1" edition="sp1:enterprise"/>
        <vers num="4.1" edition="sp10:enterprise"/>
        <vers num="4.1" edition="sp11:enterprise"/>
        <vers num="4.1" edition="sp12:enterprise"/>
        <vers num="4.1" edition="sp2:enterprise"/>
        <vers num="4.1" edition="sp3:enterprise"/>
        <vers num="4.1" edition="sp4:enterprise"/>
        <vers num="4.1" edition="sp5:enterprise"/>
        <vers num="4.1" edition="sp6:enterprise"/>
        <vers num="4.1" edition="sp7:enterprise"/>
        <vers num="4.1" edition="sp8:enterprise"/>
        <vers num="4.1" edition="sp9:enterprise"/>
        <vers num="6.0" edition="sp1"/>
        <vers num="6.0" edition="sp2"/>
        <vers num="6.0" edition="sp3"/>
        <vers num="6.0" edition="sp4"/>
        <vers num="6.0" edition="sp5"/>
      </prod>
      <prod name="one_web_server" vendor="sun">
        <vers num="4.1" edition="sp1"/>
        <vers num="4.1" edition="sp10"/>
        <vers num="4.1" edition="sp11"/>
        <vers num="4.1" edition="sp12"/>
        <vers num="4.1" edition="sp2"/>
        <vers num="4.1" edition="sp3"/>
        <vers num="4.1" edition="sp4"/>
        <vers num="4.1" edition="sp5"/>
        <vers num="4.1" edition="sp6"/>
        <vers num="4.1" edition="sp7"/>
        <vers num="4.1" edition="sp8"/>
        <vers num="4.1" edition="sp9"/>
        <vers num="6.0" edition="sp3"/>
        <vers num="6.0" edition="sp4"/>
        <vers num="6.0" edition="sp5"/>
        <vers num="6.1" edition="sp1"/>
        <vers num="6.1" edition="sp2"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2764" seq="2004-2764" published="2009-06-02" modified="2018-10-30" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">Sun SDK and Java Runtime Environment (JRE) 1.4.2 through 1.4.2_04, 1.4.1 through 1.4.1_07, and 1.4.0 through 1.4.0_04 allows untrusted applets and unprivileged servlets to gain privileges and read data from other applets via unspecified vectors related to classes in the XSLT processor, aka "XML sniffing."</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="SUNALERT" url="http://archive.cert.uni-stuttgart.de/uniras/2004/08/msg00007.html">57613</ref>
      <ref source="HP" url="http://groups.google.com/group/comp.security.unix/tree/browse_frm/month/2004-10/fe63f1daa9689d50?rnum=161&amp;_done=%2Fgroup%2Fcomp.security.unix%2Fbrowse_frm%2Fmonth%2F2004-10%3Ffwc%3D1%26#doc_29036353582c690d">SSRT4806</ref>
      <ref source="SECTRACK" url="http://securitytracker.com/id?1011661">1011661</ref>
      <ref source="BUGTRAQ" url="http://www.securityfocus.com/archive/1/371208">20040808 Java XSLT security advisory addendum</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/10844">10844</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/16864">sun-xslt-applet-gain-privileges(16864)</ref>
    </refs>
    <vuln_soft>
      <prod name="jre" vendor="sun">
        <vers num="1.4.0"/>
        <vers num="1.4.0_01" edition=":linux"/>
        <vers num="1.4.0_01" edition=":solaris"/>
        <vers num="1.4.0_01" edition=":windows"/>
        <vers num="1.4.0_02" edition=":linux"/>
        <vers num="1.4.0_02" edition=":solaris"/>
        <vers num="1.4.0_02" edition=":windows"/>
        <vers num="1.4.0_03" edition=":linux"/>
        <vers num="1.4.0_03" edition=":solaris"/>
        <vers num="1.4.0_03" edition=":windows"/>
        <vers num="1.4.0_04" edition=":linux"/>
        <vers num="1.4.0_04" edition=":solaris"/>
        <vers num="1.4.0_04" edition=":windows"/>
        <vers num="1.4.1" edition=":linux"/>
        <vers num="1.4.1" edition=":solaris"/>
        <vers num="1.4.1" edition=":windows"/>
        <vers num="1.4.1" edition="update1"/>
        <vers num="1.4.1" edition="update2"/>
        <vers num="1.4.1" edition="update3:linux"/>
        <vers num="1.4.1" edition="update3:solaris"/>
        <vers num="1.4.1" edition="update3:windows"/>
        <vers num="1.4.1" edition="update4"/>
        <vers num="1.4.1" edition="update7"/>
        <vers num="1.4.1_01" edition=":linux"/>
        <vers num="1.4.1_01" edition=":solaris"/>
        <vers num="1.4.1_01" edition=":windows"/>
        <vers num="1.4.1_02" edition=":linux"/>
        <vers num="1.4.1_02" edition=":solaris"/>
        <vers num="1.4.1_02" edition=":windows"/>
        <vers num="1.4.1_03" edition=":linux"/>
        <vers num="1.4.1_03" edition=":solaris"/>
        <vers num="1.4.1_03" edition=":windows"/>
        <vers num="1.4.1_04" edition=":linux"/>
        <vers num="1.4.1_04" edition=":solaris"/>
        <vers num="1.4.1_04" edition=":windows"/>
        <vers num="1.4.1_05" edition=":linux"/>
        <vers num="1.4.1_05" edition=":solaris"/>
        <vers num="1.4.1_05" edition=":windows"/>
        <vers num="1.4.1_06" edition=":linux"/>
        <vers num="1.4.1_06" edition=":solaris"/>
        <vers num="1.4.1_06" edition=":windows"/>
        <vers num="1.4.1_07" edition=":linux"/>
        <vers num="1.4.1_07" edition=":solaris"/>
        <vers num="1.4.1_07" edition=":windows"/>
        <vers num="1.4.2" edition=":linux"/>
        <vers num="1.4.2" edition=":solaris"/>
        <vers num="1.4.2" edition=":windows"/>
        <vers num="1.4.2" edition="update1:linux"/>
        <vers num="1.4.2" edition="update1:solaris"/>
        <vers num="1.4.2" edition="update1:windows"/>
        <vers num="1.4.2" edition="update2:linux"/>
        <vers num="1.4.2" edition="update2:solaris"/>
        <vers num="1.4.2" edition="update2:windows"/>
        <vers num="1.4.2" edition="update3:linux"/>
        <vers num="1.4.2" edition="update3:solaris"/>
        <vers num="1.4.2" edition="update3:windows"/>
        <vers num="1.4.2" edition="update4:linux"/>
        <vers num="1.4.2" edition="update4:solaris"/>
        <vers num="1.4.2" edition="update4:windows"/>
        <vers num="1.4.2" edition="update5:linux"/>
        <vers num="1.4.2" edition="update5:solaris"/>
        <vers num="1.4.2" edition="update5:windows"/>
        <vers num="1.4.2_1"/>
        <vers num="1.4.2_2"/>
        <vers num="1.4.2_3"/>
        <vers num="1.4.2_4"/>
        <vers num="1.4.2_5"/>
        <vers num="1.4.2_6"/>
        <vers num="1.4.2_7"/>
        <vers num="1.4.2_8"/>
        <vers num="1.4.2_9"/>
        <vers num="1.4.2_10"/>
        <vers num="1.4.2_11"/>
        <vers num="1.4.2_12"/>
        <vers num="1.4.2_13"/>
        <vers num="1.4.2_14"/>
        <vers num="1.4.2_15"/>
        <vers num="1.4.2_21"/>
      </prod>
      <prod name="sdk" vendor="sun">
        <vers num="1.4.0"/>
        <vers num="1.4.0_01"/>
        <vers num="1.4.0_02"/>
        <vers num="1.4.0_03"/>
        <vers num="1.4.0_04"/>
        <vers num="1.4.1"/>
        <vers num="1.4.1_01"/>
        <vers num="1.4.1_02"/>
        <vers num="1.4.1_03"/>
        <vers num="1.4.1_04"/>
        <vers num="1.4.1_05"/>
        <vers num="1.4.1_06"/>
        <vers num="1.4.1_07"/>
        <vers num="1.4.2"/>
        <vers num="1.4.2_01"/>
        <vers num="1.4.2_02"/>
        <vers num="1.4.2_03"/>
        <vers num="1.4.2_04"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2765" seq="2004-2765" published="2010-01-28" modified="2010-01-31" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:P/A:N)">
    <desc>
      <descript source="cve">Cross-site scripting (XSS) vulnerability in Webmail in Sun ONE Messaging Server 6.1 and iPlanet Messaging Server 5.2 before 5.2hf2.02, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via a crafted e-mail message, a different vulnerability than CVE-2005-2022 and CVE-2006-5486.</descript>
    </desc>
    <loss_types>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sunsolve.sun.com/search/document.do?assetkey=1-21-116568-56-1" patch="1">http://sunsolve.sun.com/search/document.do?assetkey=1-21-116568-56-1</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201601-1" adv="1" patch="1">201601</ref>
    </refs>
    <vuln_soft>
      <prod name="iplanet_messaging_server" vendor="sun">
        <vers num="5.2"/>
      </prod>
      <prod name="one_messaging_server" vendor="sun">
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2766" seq="2004-2766" published="2010-01-28" modified="2010-01-31" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Webmail in Sun ONE Messaging Server 6.1 and iPlanet Messaging Server 5.2 before 5.2hf2.02 allows remote attackers to obtain unspecified "access" to e-mail via a crafted e-mail message, related to a "session hijacking" issue, a different vulnerability than CVE-2005-2022 and CVE-2006-5486.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://sunsolve.sun.com/search/document.do?assetkey=1-21-116568-55-1" patch="1">http://sunsolve.sun.com/search/document.do?assetkey=1-21-116568-55-1</ref>
      <ref source="SUNALERT" url="http://sunsolve.sun.com/search/document.do?assetkey=1-66-201180-1" adv="1" patch="1">201180</ref>
    </refs>
    <vuln_soft>
      <prod name="iplanet_messaging_server" vendor="sun">
        <vers num="5.2"/>
      </prod>
      <prod name="one_messaging_server" vendor="sun">
        <vers num="6.1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2767" seq="2004-2767" published="2010-04-05" modified="2010-04-06" severity="Medium" CVSS_version="2.0" CVSS_score="4.3" CVSS_base_score="4.3" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.6" CVSS_vector="(AV:N/AC:M/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">NWFTPD.nlm before 5.04.25 in the FTP server in Novell NetWare does not promptly close DS sessions, which allows remote attackers to cause a denial of service (connection slot exhaustion) by establishing many FTP sessions that persist for the lifetime of a DS session.</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.novell.com/support/viewContent.do?externalId=3238588&amp;sliceId=1" adv="1">http://www.novell.com/support/viewContent.do?externalId=3238588&amp;sliceId=1</ref>
    </refs>
    <vuln_soft>
      <prod name="netware_ftp_server" vendor="novell">
        <vers num=""/>
      </prod>
      <prod name="netware" vendor="novell">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2768" seq="2004-2768" published="2010-06-08" modified="2017-08-16" severity="High" CVSS_version="2.0" CVSS_score="7.2" CVSS_base_score="7.2" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">dpkg 1.9.21 does not properly reset the metadata of a file during replacement of the file in a package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid file, (2) setgid file, or (3) device, a related issue to CVE-2010-2059.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://lists.jammed.com/ISN/2003/12/0056.html">[isn] 20031215 The mysteriously persistently exploitable program explained.</ref>
      <ref source="MISC" url="http://www.hackinglinuxexposed.com/articles/20031214.html">http://www.hackinglinuxexposed.com/articles/20031214.html</ref>
      <ref source="CONFIRM" url="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=225692">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=225692</ref>
      <ref source="MISC" url="https://bugzilla.redhat.com/show_bug.cgi?id=598775">https://bugzilla.redhat.com/show_bug.cgi?id=598775</ref>
      <ref source="XF" url="https://exchange.xforce.ibmcloud.com/vulnerabilities/59428">dpkg-setgid-privilege-escalation(59428)</ref>
    </refs>
    <vuln_soft>
      <prod name="dpkg" vendor="debian">
        <vers num="1.9.21"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2769" seq="2004-2769" published="2010-07-02" modified="2010-07-06" severity="Medium" CVSS_version="2.0" CVSS_score="4.0" CVSS_base_score="4.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="8.0" CVSS_vector="(AV:N/AC:L/Au:S/C:P/I:N/A:N)">
    <desc>
      <descript source="cve">Cerberus FTP Server before 4.0.3.0 allows remote authenticated users to list hidden files, even when the "Display hidden files" option is enabled, via the (1) MLSD or (2) MLST commands.</descript>
    </desc>
    <loss_types>
      <conf/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://www.cerberusftp.com/phpBB3/viewtopic.php?f=4&amp;t=644" adv="1">http://www.cerberusftp.com/phpBB3/viewtopic.php?f=4&amp;t=644</ref>
      <ref source="CONFIRM" url="http://www.cerberusftp.com/releasenotes.html">http://www.cerberusftp.com/releasenotes.html</ref>
      <ref source="BID" url="http://www.securityfocus.com/bid/41285">41285</ref>
    </refs>
    <vuln_soft>
      <prod name="ftp_server" vendor="cerberusftp">
        <vers num="1.0" edition="-"/>
        <vers num="1.1"/>
        <vers num="1.2"/>
        <vers num="1.03"/>
        <vers num="1.5"/>
        <vers num="1.6" edition="beta"/>
        <vers num="1.7"/>
        <vers num="1.22"/>
        <vers num="1.71"/>
        <vers num="2.0" edition="beta1"/>
        <vers num="2.0" edition="beta2"/>
        <vers num="2.0" edition="beta3"/>
        <vers num="2.0" edition="beta4"/>
        <vers num="2.1"/>
        <vers num="2.2" edition="beta1"/>
        <vers num="2.2" edition="beta2"/>
        <vers num="2.2" edition="beta3"/>
        <vers num="2.02" edition="beta"/>
        <vers num="2.3"/>
        <vers num="2.4" edition="beta1"/>
        <vers num="2.4" edition="beta2"/>
        <vers num="2.4" edition="beta3"/>
        <vers num="2.11" edition="beta"/>
        <vers num="2.11" edition="beta2"/>
        <vers num="2.15" edition="beta"/>
        <vers num="2.16"/>
        <vers num="2.21"/>
        <vers num="2.22"/>
        <vers num="2.23" edition="beta"/>
        <vers num="2.31"/>
        <vers num="2.32"/>
        <vers num="2.41"/>
        <vers num="2.42"/>
        <vers num="2.43"/>
        <vers num="2.44"/>
        <vers num="2.45"/>
        <vers num="2.46"/>
        <vers num="2.47"/>
        <vers num="2.48"/>
        <vers num="2.49"/>
        <vers num="2.50"/>
        <vers num="3.0"/>
        <vers num="3.0.1"/>
        <vers num="3.0.2"/>
        <vers num="3.0.3"/>
        <vers num="3.0.4"/>
        <vers num="3.0.5"/>
        <vers num="3.0.6"/>
        <vers num="3.0.7"/>
        <vers num="3.0.7.1"/>
        <vers num="3.0.8"/>
        <vers num="3.1"/>
        <vers num="3.1.0.3"/>
        <vers num="3.1.0.4"/>
        <vers num="3.1.0.5"/>
        <vers num="3.1.1"/>
        <vers num="3.1.2"/>
        <vers num="3.1.3"/>
        <vers num="3.1.3.1"/>
        <vers num="3.1.4"/>
        <vers num="4.0.0"/>
        <vers num="4.0.0.6"/>
        <vers num="4.0.0.8"/>
        <vers num="4.0.0.9"/>
        <vers num="4.0.0.11"/>
        <vers num="4.0.1"/>
        <vers num="4.0.1.1"/>
        <vers num="4.0.2"/>
        <vers num="4.0.2.2" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2770" seq="2004-2770" published="2011-09-25" modified="2011-09-28" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2011-3389.  Reason: This candidate is a duplicate of CVE-2011-3389.  Notes: All CVE users should reference CVE-2011-3389 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
      <descript source="nvd">Per http://ekoparty.org/2011/juliano-rizzo.php, 'Our exploit abuses a vulnerability present in the SSL/TLS implementation of major Web browsers at the time of writing.'

The current configuration includes released versions of major browsers. List 
subject to change based on additional information as it becomes available.
</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-2771" seq="2004-2771" published="2014-12-24" modified="2014-12-29" severity="High" CVSS_version="2.0" CVSS_score="7.5" CVSS_base_score="7.5" CVSS_impact_subscore="6.4" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:P/I:P/A:P)">
    <desc>
      <descript source="cve">The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://linux.oracle.com/errata/ELSA-2014-1999.html">http://linux.oracle.com/errata/ELSA-2014-1999.html</ref>
      <ref source="REDHAT" url="http://rhn.redhat.com/errata/RHSA-2014-1999.html">RHSA-2014:1999</ref>
      <ref source="MLIST" url="http://seclists.org/oss-sec/2014/q4/1066">[oss-security] 20141216 mailx issues (CVE-2004-2771, CVE-2014-7844)</ref>
      <ref source="DEBIAN" url="http://www.debian.org/security/2014/dsa-3105">DSA-3105</ref>
      <ref source="CONFIRM" url="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278748">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278748</ref>
    </refs>
    <vuln_soft>
      <prod name="bsd_mailx" vendor="bsd_mailx_project">
        <vers num="8.1.2" prev="1"/>
      </prod>
      <prod name="mailx" vendor="heirloom">
        <vers num="12.5" prev="1"/>
      </prod>
      <prod name="linux" vendor="oracle">
        <vers num="6.0"/>
        <vers num="7.0"/>
      </prod>
      <prod name="enterprise_linux" vendor="redhat">
        <vers num="6.0"/>
        <vers num="7.0"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2777" seq="2004-2777" published="2015-08-04" modified="2018-03-27" severity="High" CVSS_version="2.0" CVSS_score="10.0" CVSS_base_score="10.0" CVSS_impact_subscore="10.0" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)">
    <desc>
      <descript source="cve">GE Healthcare Centricity Image Vault 3.x has a password of (1) gemnet for the administrator account, (2) webadmin for the webadmin administrator account of the ASACA DVD library, (3) an empty value for the gemsservice account of the Ultrasound Database, and possibly (4) gemnet2002 for the gemnet2002 account of the GEMNet license server, which has unspecified impact and attack vectors.  NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value.</descript>
    </desc>
    <loss_types>
      <avail/>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="CONFIRM" url="http://apps.gehealthcare.com/servlet/ClientServlet/2010564-002E.pdf?REQ=RAA&amp;DIRECTION=2010564-002&amp;FILENAME=2010564-002E.pdf&amp;FILEREV=E&amp;DOCREV_ORG=E">http://apps.gehealthcare.com/servlet/ClientServlet/2010564-002E.pdf?REQ=RAA&amp;DIRECTION=2010564-002&amp;FILENAME=2010564-002E.pdf&amp;FILEREV=E&amp;DOCREV_ORG=E</ref>
      <ref source="MISC" url="http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/">http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/</ref>
      <ref source="MISC" url="https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02">https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02</ref>
      <ref source="MISC" url="https://twitter.com/digitalbond/status/619250429751222277">https://twitter.com/digitalbond/status/619250429751222277</ref>
    </refs>
    <vuln_soft>
      <prod name="centricity_image_vault_firmware" vendor="gehealthcare">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2778" seq="2004-2778" published="2017-06-27" modified="2017-07-05" severity="Low" CVSS_version="2.0" CVSS_score="3.6" CVSS_base_score="3.6" CVSS_impact_subscore="4.9" CVSS_exploit_subscore="3.9" CVSS_vector="(AV:L/AC:L/Au:N/C:P/I:P/A:N)">
    <desc>
      <descript source="cve">Ebuild in Gentoo may change directory and file permissions depending on the order of installed packages, which allows local users to read or write to restricted directories or execute restricted commands via navigating to the affected directories, or executing the affected commands.</descript>
    </desc>
    <loss_types>
      <conf/>
      <int/>
    </loss_types>
    <range>
      <local/>
    </range>
    <refs>
      <ref source="MLIST" url="http://www.openwall.com/lists/oss-security/2017/01/28/7" adv="1">[oss-security] 20170128 Re: Gentoo: order of installed packages may result in vary directories permissions, leading to crontab not requiring cron group membership as example.</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=141619" adv="1">https://bugs.gentoo.org/show_bug.cgi?id=141619</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=396153" adv="1">https://bugs.gentoo.org/show_bug.cgi?id=396153</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=58611" adv="1">https://bugs.gentoo.org/show_bug.cgi?id=58611</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=607426" adv="1">https://bugs.gentoo.org/show_bug.cgi?id=607426</ref>
      <ref source="CONFIRM" url="https://bugs.gentoo.org/show_bug.cgi?id=607430" adv="1">https://bugs.gentoo.org/show_bug.cgi?id=607430</ref>
    </refs>
    <vuln_soft>
      <prod name="portage" vendor="gentoo">
        <vers num=""/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-2779" seq="2004-2779" published="2018-02-20" modified="2018-03-19" severity="Medium" CVSS_version="2.0" CVSS_score="5.0" CVSS_base_score="5.0" CVSS_impact_subscore="2.9" CVSS_exploit_subscore="10.0" CVSS_vector="(AV:N/AC:L/Au:N/C:N/I:N/A:P)">
    <desc>
      <descript source="cve">id3_utf16_deserialize() in utf16.c in libid3tag through 0.15.1b misparses ID3v2 tags encoded in UTF-16 with an odd number of bytes, triggering an endless loop allocating memory until an OOM condition is reached, leading to denial-of-service (DoS).</descript>
    </desc>
    <loss_types>
      <avail/>
    </loss_types>
    <range>
      <network/>
    </range>
    <refs>
      <ref source="MISC" url="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=304913" adv="1">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=304913</ref>
      <ref source="MISC" url="https://bugzilla.gnome.org/show_bug.cgi?id=162647" adv="1">https://bugzilla.gnome.org/show_bug.cgi?id=162647</ref>
      <ref source="MISC" url="https://sources.debian.org/patches/libid3tag/0.15.1b-13/10_utf16.dpatch/" adv="1" patch="1">https://sources.debian.org/patches/libid3tag/0.15.1b-13/10_utf16.dpatch/</ref>
    </refs>
    <vuln_soft>
      <prod name="libid3tag" vendor="underbit">
        <vers num="0.15.1b" prev="1"/>
      </prod>
    </vuln_soft>
  </entry>
  <entry type="CVE" name="CVE-2004-9998" seq="2004-9998" published="2004-12-31" modified="2008-09-10" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate has been used as a placeholder by multiple organizations for multiple issues, but it is invalid.  Notes: All CVE users should search CVE for the proper identifier.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
  <entry type="CVE" name="CVE-2004-9999" seq="2004-9999" published="2004-12-31" modified="2016-12-15" reject="1">
    <desc>
      <descript source="cve">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate has been used as a placeholder by multiple organizations for multiple issues, but it is invalid.  Notes: All CVE users should search CVE for the proper identifier.  All references and descriptions in this candidate have been removed to prevent accidental usage.</descript>
    </desc>
    <refs/>
  </entry>
</nvd>