mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
77 lines
2.7 KiB
JSON
77 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secure@intel.com",
|
|
"ID": "CVE-2016-8006",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Authentication bypass vulnerability in Enterprise Security Manager (ESM) and License Manager (LM) in Intel Security McAfee Security Information and Event Management (SIEM) 9.6.0 MR3 allows an administrator to make changes to other SIEM users' information including user passwords without supplying the current administrator password a second time via the GUI or GUI terminal commands."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://www.narthar.it/DOC/McAfee_SIEM_9.6_Authentication_bypass_vulnerability.html",
|
|
"refsource": "MISC",
|
|
"url": "https://www.narthar.it/DOC/McAfee_SIEM_9.6_Authentication_bypass_vulnerability.html"
|
|
},
|
|
{
|
|
"name": "https://kc.mcafee.com/corporate/index?page=content&id=KB87744",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://kc.mcafee.com/corporate/index?page=content&id=KB87744"
|
|
},
|
|
{
|
|
"name": "95313",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/95313"
|
|
},
|
|
{
|
|
"name": "http://www.quantumleap.it/mcafee-siem-esm-esmrec-authentication-bypass-vulnerability/",
|
|
"refsource": "MISC",
|
|
"url": "http://www.quantumleap.it/mcafee-siem-esm-esmrec-authentication-bypass-vulnerability/"
|
|
}
|
|
]
|
|
}
|
|
} |