mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
102 lines
3.2 KiB
JSON
102 lines
3.2 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2005-3427",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The Cisco Management Center (MC) for IPS Sensors (IPS MC) 2.1 can omit port field values while generating the Cisco IOS IPS configuration file, wich can cause some signatures to be disabled and makes it easier for attackers to escape detection."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "cisco-ios-ips-bypass-security(22926)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22926"
|
|
},
|
|
{
|
|
"name": "ADV-2005-2266",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2005/2266"
|
|
},
|
|
{
|
|
"name": "20444",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/20444"
|
|
},
|
|
{
|
|
"name": "15269",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/15269"
|
|
},
|
|
{
|
|
"name": "VU#154883",
|
|
"refsource": "CERT-VN",
|
|
"url": "http://www.kb.cert.org/vuls/id/154883"
|
|
},
|
|
{
|
|
"name": "1015133",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1015133"
|
|
},
|
|
{
|
|
"name": "20051101 Cisco IPS MC Malformed Configuration Download Vulnerability",
|
|
"refsource": "CISCO",
|
|
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20051101-ipsmc.shtml"
|
|
},
|
|
{
|
|
"name": "137",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/137"
|
|
},
|
|
{
|
|
"name": "17397",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/17397"
|
|
}
|
|
]
|
|
}
|
|
} |