mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
82 lines
2.5 KiB
JSON
82 lines
2.5 KiB
JSON
![]() |
{
|
||
|
"CVE_data_meta" : {
|
||
|
"ASSIGNER" : "cve@mitre.org",
|
||
|
"ID" : "CVE-2006-4430",
|
||
|
"STATE" : "PUBLIC"
|
||
|
},
|
||
|
"affects" : {
|
||
|
"vendor" : {
|
||
|
"vendor_data" : [
|
||
|
{
|
||
|
"product" : {
|
||
|
"product_data" : [
|
||
|
{
|
||
|
"product_name" : "n/a",
|
||
|
"version" : {
|
||
|
"version_data" : [
|
||
|
{
|
||
|
"version_value" : "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"vendor_name" : "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
"data_format" : "MITRE",
|
||
|
"data_type" : "CVE",
|
||
|
"data_version" : "4.0",
|
||
|
"description" : {
|
||
|
"description_data" : [
|
||
|
{
|
||
|
"lang" : "eng",
|
||
|
"value" : "The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack. NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms."
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"problemtype" : {
|
||
|
"problemtype_data" : [
|
||
|
{
|
||
|
"description" : [
|
||
|
{
|
||
|
"lang" : "eng",
|
||
|
"value" : "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"references" : {
|
||
|
"reference_data" : [
|
||
|
{
|
||
|
"url" : "http://www.securityfocus.com/archive/1/archive/1/408603/30/0/threaded"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.securityfocus.com/archive/1/archive/1/444424/100/0/threaded"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.securityfocus.com/archive/1/archive/1/444737/100/0/threaded"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.securityfocus.com/bid/19726"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|