cvelist/2011/0xxx/CVE-2011-0951.json
2019-03-18 00:15:00 +00:00

87 lines
2.8 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0951",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web-based management interface in Cisco Secure Access Control System (ACS) 5.1 before 5.1.0.44.6 and 5.2 before 5.2.0.26.3 allows remote attackers to change arbitrary user passwords via unspecified vectors, aka Bug ID CSCtl77440."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "43924",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43924"
},
{
"name": "1025271",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025271"
},
{
"name": "ADV-2011-0821",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0821"
},
{
"name": "20110330 Cisco Secure Access Control System Unauthorized Password Change Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b74117.shtml"
},
{
"name": "cisco-acs-interface-security-bypass(66471)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66471"
},
{
"name": "47093",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47093"
}
]
}
}