cvelist/2006/3xxx/CVE-2006-3291.json
2019-03-18 01:21:46 +00:00

97 lines
3.1 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-3291",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web interface on Cisco IOS 12.3(8)JA and 12.3(8)JA1, as used on the Cisco Wireless Access Point and Wireless Bridge, reconfigures itself when it is changed to use the \"Local User List Only (Individual Passwords)\" setting, which removes all security and password configurations and allows remote attackers to access the system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "18704",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18704"
},
{
"name": "cisco-ap-browser-unauth-access(27437)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27437"
},
{
"name": "20060628 Access Point Web-browser Interface Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060628-ap.shtml"
},
{
"name": "26878",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26878"
},
{
"name": "1016399",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016399"
},
{
"name": "ADV-2006-2584",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2584"
},
{
"name": "VU#544484",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/544484"
},
{
"name": "20860",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20860"
}
]
}
}