2017-10-16 12:31:07 -04:00
{
2019-03-18 05:47:46 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "psirt@cisco.com" ,
"ID" : "CVE-2016-1418" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2017-10-16 12:31:07 -04:00
{
2019-03-18 05:47:46 +00:00
"lang" : "eng" ,
"value" : "Cisco Aironet Access Point Software 8.2(100.0) on 1830e, 1830i, 1850e, 1850i, 2800, and 3800 access points allows local users to obtain Linux root access via crafted CLI command parameters, aka Bug ID CSCuy64037."
2017-10-16 12:31:07 -04:00
}
2019-03-18 05:47:46 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "1036042" ,
"refsource" : "SECTRACK" ,
"url" : "http://www.securitytracker.com/id/1036042"
} ,
{
"name" : "20160606 Cisco Aironet Access Points Command-Line Interpreter Linux Shell Command Injection Vulnerability" ,
"refsource" : "CISCO" ,
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160606-aap"
}
]
}
}