cvelist/2001/1xxx/CVE-2001-1339.json
2019-03-17 21:57:39 +00:00

82 lines
2.5 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2001-1339",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Beck IPC GmbH IPC@CHIP telnet service does not delay or disconnect users from the service when bad passwords are entered, which makes it easier for remote attackers to conduct brute force password guessing attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#198979",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/198979"
},
{
"name": "20010524 IPC@Chip Security",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/186418"
},
{
"name": "2771",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2771"
},
{
"name": "20010602 IPC@Chip - Fixes",
"refsource": "BUGTRAQ",
"url": "http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html"
},
{
"name": "ipcchip-telnet-bruteforce-passwords(6605)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/6605.php"
}
]
}
}