cvelist/2015/0xxx/CVE-2015-0761.json

72 lines
2.2 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 02:45:12 +00:00
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-0761",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 02:45:12 +00:00
"lang": "eng",
"value": "Cisco AnyConnect Secure Mobility Client before 3.1(8009) and 4.x before 4.0(2052) on Linux does not properly implement unspecified internal functions, which allows local users to obtain root privileges via crafted vpnagent options, aka Bug ID CSCus86790."
2017-10-16 12:31:07 -04:00
}
2019-03-18 02:45:12 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "74954",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74954"
},
{
"name": "1032472",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032472"
},
{
"name": "20150602 Cisco AnyConnect Secure Mobility Client Privilege Escalation Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39158"
}
]
}
}