cvelist/2012/6xxx/CVE-2012-6606.json
Chandan 926e737e32
Update URLs to new Palo Alto Networks advisory website.
We recently updated our security advisory website. This commit replaces links to our old website with new simplified URls.
2020-02-14 13:30:31 -08:00

67 lines
2.1 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-6606",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Palo Alto Networks GlobalProtect before 1.1.7, and NetConnect, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof portal servers and obtain sensitive information via a crafted certificate."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20121017 MitM-vulnerability in Palo Alto Networks GlobalProtect",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0100.html"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2012-6606",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2012-6606"
}
]
}
}