cvelist/2019/15xxx/CVE-2019-15022.json
Chandan 926e737e32
Update URLs to new Palo Alto Networks advisory website.
We recently updated our security advisory website. This commit replaces links to our old website with new simplified URls.
2020-02-14 13:30:31 -08:00

62 lines
1.9 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-15022",
"ASSIGNER": "psirt@paloaltonetworks.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Palo Alto Networks Zingbox Inspector",
"version": {
"version_data": [
{
"version_value": "Zingbox Inspector, versions 1.294 and earlier."
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "ARP Spoofing"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://security.paloaltonetworks.com/CVE-2019-15022",
"url": "https://security.paloaltonetworks.com/CVE-2019-15022"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A security vulnerability exists in Zingbox Inspector versions 1.294 and earlier, that allows for the Inspector to be susceptible to ARP spoofing."
}
]
}
}