cvelist/2003/0xxx/CVE-2003-0512.json

82 lines
2.8 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 00:45:07 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-0512",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 00:45:07 +00:00
"lang": "eng",
"value": "Cisco IOS 12.2 and earlier generates a \"% Login invalid\" message instead of prompting for a password when an invalid username is provided, which allows remote attackers to identify valid usernames on the system and conduct brute force password guessing, as reported for the Aironet Bridge."
2017-10-16 12:31:07 -04:00
}
2019-03-18 00:45:07 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.vigilante.com/inetsecurity/advisories/VIGILANTE-2003002.htm",
"refsource": "MISC",
"url": "http://www.vigilante.com/inetsecurity/advisories/VIGILANTE-2003002.htm"
},
{
"name": "20030724 Enumerating Locally Defined Users in Cisco IOS",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sn-20030724-ios-enum.shtml"
},
{
"name": "oval:org.mitre.oval:def:5824",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5824"
},
{
"name": "20030728 Cisco Aironet AP1100 Valid Account Disclosure Vulnerability",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0056.html"
},
{
"name": "VU#886796",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/886796"
}
]
}
}