cvelist/2006/5xxx/CVE-2006-5660.json
2019-03-18 00:08:21 +00:00

97 lines
3.1 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5660",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Security Agent Management Center (CSAMC) 5.1 before 5.1.0.79 does not properly handle certain LDAP error messages, which allows remote attackers to bypass authentication requirements via an empty password when using an external LDAP server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-csamc-auth-bypass(29955)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29955"
},
{
"name": "22684",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22684"
},
{
"name": "20061101 Cisco Security Agent Management Center LDAP Administrator Authentication Bypass",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807726f7.shtml"
},
{
"name": "30169",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/30169"
},
{
"name": "ADV-2006-4308",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4308"
},
{
"name": "20852",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20852"
},
{
"name": "1017148",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017148"
},
{
"name": "VU#778648",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/778648"
}
]
}
}