cvelist/2016/1xxx/CVE-2016-1345.json
2019-03-18 00:15:45 +00:00

77 lines
2.4 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-1345",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco FireSIGHT System Software 5.4.0 through 6.0.1 and ASA with FirePOWER Services 5.4.0 through 6.0.0.1 allow remote attackers to bypass malware protection via crafted fields in HTTP headers, aka Bug ID CSCux22726."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1035437",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035437"
},
{
"name": "20160330 Cisco Firepower Malware Block Bypass Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160330-fp"
},
{
"name": "1035439",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035439"
},
{
"name": "1035438",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035438"
}
]
}
}