Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://bugzilla.quagga.net/show_bug.cgi?id=261", "name": "http://bugzilla.quagga.net/show_bug.cgi?id=261", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/17808", "name": "17808", "tags": ["Exploit", "Patch"], "refsource": "BID"}, {"url": "http://secunia.com/advisories/19910", "name": "19910", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/20137", "name": "20137", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.debian.org/security/2006/dsa-1059", "name": "DSA-1059", "tags": [], "refsource": "DEBIAN"}, {"url": "http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml", "name": "GLSA-200605-15", "tags": [], "refsource": "GENTOO"}, {"url": "http://secunia.com/advisories/20138", "name": "20138", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/20221", "name": "20221", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2006-0525.html", "name": "RHSA-2006:0525", "tags": [], "refsource": "REDHAT"}, {"url": "http://www.redhat.com/support/errata/RHSA-2006-0533.html", "name": "RHSA-2006:0533", "tags": [], "refsource": "REDHAT"}, {"url": "http://securitytracker.com/id?1016204", "name": "1016204", "tags": [], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/20420", "name": "20420", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/20421", "name": "20421", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc", "name": "20060602-01-U", "tags": [], "refsource": "SGI"}, {"url": "http://secunia.com/advisories/20782", "name": "20782", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.novell.com/linux/security/advisories/2006_17_sr.html", "name": "SUSE-SR:2006:017", "tags": [], "refsource": "SUSE"}, {"url": "http://secunia.com/advisories/21159", "name": "21159", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.osvdb.org/25224", "name": "25224", "tags": [], "refsource": "OSVDB"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26243", "name": "quagga-ripv1-information-disclosure(26243)", "tags": [], "refsource": "XF"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9985", "name": "oval:org.mitre.oval:def:9985", "tags": [], "refsource": "OVAL"}, {"url": "https://usn.ubuntu.com/284-1/", "name": "USN-284-1", "tags": [], "refsource": "UBUNTU"}, {"url": "http://www.securityfocus.com/archive/1/432823/100/0/threaded", "name": "20060503 Re: Quagga RIPD unauthenticated route injection", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/432822/100/0/threaded", "name": "20060503 Quagga RIPD unauthenticated route table broadcast", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-20"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2006-2223", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2006-05-05T19:02Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-18T16:38Z"}