Vulnerabilites related to cisco - router_7200
cve-2000-0345
Vulnerability from cvelistv5
Published
2000-05-18 04:00
Modified
2024-08-08 05:14
Severity ?
EPSS score ?
Summary
The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/1161 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail%40securityfocus.com | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:14:21.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1161", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1161" }, { "name": "20000502 Possible issue with Cisco on-line help?", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000502222246.28423.qmail%40securityfocus.com" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-05-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The on-line help system options in Cisco routers allows non-privileged users without \"enabled\" access to obtain sensitive information via the show command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1161", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1161" }, { "name": "20000502 Possible issue with Cisco on-line help?", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000502222246.28423.qmail%40securityfocus.com" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0345", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The on-line help system options in Cisco routers allows non-privileged users without \"enabled\" access to obtain sensitive information via the show command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1161", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1161" }, { "name": "20000502 Possible issue with Cisco on-line help?", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000502222246.28423.qmail@securityfocus.com" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0345", "datePublished": "2000-05-18T04:00:00", "dateReserved": "2000-05-11T00:00:00", "dateUpdated": "2024-08-08T05:14:21.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0578
Vulnerability from cvelistv5
Published
2010-03-25 20:31
Modified
2024-08-07 00:52
Severity ?
EPSS score ?
Summary
The IKE implementation in Cisco IOS 12.2 through 12.4 on Cisco 7200 and 7301 routers with VAM2+ allows remote attackers to cause a denial of service (device reload) via a malformed IKE packet, aka Bug ID CSCtb13491.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/38932 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1023741 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee5.shtml | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/57148 | vdb-entry, x_refsource_XF | |
http://osvdb.org/63182 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/39057 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2010/0709 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:52:19.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38932", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/38932" }, { "name": "1023741", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023741" }, { "name": "20100324 Cisco IOS Software IPsec Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee5.shtml" }, { "name": "ciscoios-vpn-dos(57148)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57148" }, { "name": "63182", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/63182" }, { "name": "39057", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39057" }, { "name": "ADV-2010-0709", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0709" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-03-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The IKE implementation in Cisco IOS 12.2 through 12.4 on Cisco 7200 and 7301 routers with VAM2+ allows remote attackers to cause a denial of service (device reload) via a malformed IKE packet, aka Bug ID CSCtb13491." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "38932", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/38932" }, { "name": "1023741", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023741" }, { "name": "20100324 Cisco IOS Software IPsec Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee5.shtml" }, { "name": "ciscoios-vpn-dos(57148)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57148" }, { "name": "63182", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/63182" }, { "name": "39057", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39057" }, { "name": "ADV-2010-0709", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0709" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2010-0578", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IKE implementation in Cisco IOS 12.2 through 12.4 on Cisco 7200 and 7301 routers with VAM2+ allows remote attackers to cause a denial of service (device reload) via a malformed IKE packet, aka Bug ID CSCtb13491." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38932", "refsource": "BID", "url": "http://www.securityfocus.com/bid/38932" }, { "name": "1023741", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023741" }, { "name": "20100324 Cisco IOS Software IPsec Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee5.shtml" }, { "name": "ciscoios-vpn-dos(57148)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57148" }, { "name": "63182", "refsource": "OSVDB", "url": "http://osvdb.org/63182" }, { "name": "39057", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39057" }, { "name": "ADV-2010-0709", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0709" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2010-0578", "datePublished": "2010-03-25T20:31:00", "dateReserved": "2010-02-10T00:00:00", "dateUpdated": "2024-08-07T00:52:19.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2010-03-25 21:00
Modified
2024-11-21 01:12
Severity ?
Summary
The IKE implementation in Cisco IOS 12.2 through 12.4 on Cisco 7200 and 7301 routers with VAM2+ allows remote attackers to cause a denial of service (device reload) via a malformed IKE packet, aka Bug ID CSCtb13491.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 12.2sb | |
cisco | ios | 12.2sca | |
cisco | ios | 12.2scb | |
cisco | ios | 12.2scc | |
cisco | ios | 12.2sra | |
cisco | ios | 12.3t | |
cisco | ios | 12.3xe | |
cisco | ios | 12.3xj | |
cisco | ios | 12.3xr | |
cisco | ios | 12.3xu | |
cisco | ios | 12.3xw | |
cisco | ios | 12.3xx | |
cisco | ios | 12.3yf | |
cisco | ios | 12.3yg | |
cisco | ios | 12.3yk | |
cisco | ios | 12.3yq | |
cisco | ios | 12.3ys | |
cisco | ios | 12.3yu | |
cisco | ios | 12.3yx | |
cisco | ios | 12.3za | |
cisco | ios | 12.4 | |
cisco | ios | 12.4gc | |
cisco | ios | 12.4ja | |
cisco | ios | 12.4jda | |
cisco | ios | 12.4jdc | |
cisco | ios | 12.4jdd | |
cisco | ios | 12.4jk | |
cisco | ios | 12.4jl | |
cisco | ios | 12.4jma | |
cisco | ios | 12.4jmb | |
cisco | ios | 12.4jx | |
cisco | ios | 12.4md | |
cisco | ios | 12.4mda | |
cisco | ios | 12.4mr | |
cisco | ios | 12.4sw | |
cisco | ios | 12.4t | |
cisco | ios | 12.4xa | |
cisco | ios | 12.4xb | |
cisco | ios | 12.4xc | |
cisco | ios | 12.4xd | |
cisco | ios | 12.4xe | |
cisco | ios | 12.4xf | |
cisco | ios | 12.4xg | |
cisco | ios | 12.4xj | |
cisco | ios | 12.4xk | |
cisco | ios | 12.4xl | |
cisco | ios | 12.4xm | |
cisco | ios | 12.4xn | |
cisco | ios | 12.4xp | |
cisco | ios | 12.4xq | |
cisco | ios | 12.4xr | |
cisco | ios | 12.4xt | |
cisco | ios | 12.4xv | |
cisco | ios | 12.4xw | |
cisco | ios | 12.4xy | |
cisco | ios | 12.4xz | |
cisco | ios | 12.4ya | |
cisco | ios | 12.4yb | |
cisco | ios | 12.4yd | |
cisco | ios | 12.4ye | |
cisco | ios | 12.4yg | |
cisco | 7200_router | * | |
cisco | 7301_router | * | |
cisco | router_7200 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:12.2sb:*:*:*:*:*:*:*", "matchCriteriaId": "ADBDC6C0-961B-441D-8C34-AACE0902057E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sca:*:*:*:*:*:*:*", "matchCriteriaId": "140C7C99-1B50-431C-B55C-DFF308E7ECF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2scb:*:*:*:*:*:*:*", "matchCriteriaId": "65213862-01D0-4B1D-8C76-B19D083BF460", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2scc:*:*:*:*:*:*:*", "matchCriteriaId": "F157AA25-A1BD-47BE-ABFF-149C490D9E94", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sra:*:*:*:*:*:*:*", "matchCriteriaId": "A892B3F0-5A31-4086-8AB5-F06E68588EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*", "matchCriteriaId": "C0C3B413-76F7-413B-A51F-29834F9DE722", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*", "matchCriteriaId": "A5688D88-A550-43EB-8854-2E132EC71156", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*", "matchCriteriaId": "CEF3B2A9-027B-4141-B0FB-D31A2C918CF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*", "matchCriteriaId": "E0A5760A-9FFE-4941-B2BD-7DD54B1E1B37", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*", "matchCriteriaId": "FB74F350-37F8-48DF-924E-415E51932163", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*", "matchCriteriaId": "E618BF54-56DC-40FC-A515-3BFB4366F823", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*", "matchCriteriaId": "A1976E53-85A6-494F-B8AC-847E7988850C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*", "matchCriteriaId": "C46B66D6-1BF1-4DCA-868F-BADE3CB96063", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*", "matchCriteriaId": "CA88C064-898F-4C0D-A266-D7B3509C28A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*", "matchCriteriaId": "1DF4D0E3-8015-4D6F-8364-B6EEAAE67971", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DF12B-2A20-4AC5-8EC5-729008D87736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*", "matchCriteriaId": "6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*", "matchCriteriaId": "B0AB8F07-AF43-4202-9908-F9A1DF6FFC03", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*", "matchCriteriaId": "2958873B-A0AB-4EAF-A5CF-8423739FAB07", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3za:*:*:*:*:*:*:*", "matchCriteriaId": "3870C62F-D086-419C-A0E6-815E9ED5DE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", "matchCriteriaId": "9D4D8C72-E7BB-40BF-9AE5-622794D63E09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4gc:*:*:*:*:*:*:*", "matchCriteriaId": "89B19F2B-1D89-42FC-89A7-737D8109EB1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*", "matchCriteriaId": "4EB2B390-A39F-4082-BBCB-712BDD95886D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*", "matchCriteriaId": "5F782741-0F18-4FBC-9D00-AAABB8BC6A10", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jdc:*:*:*:*:*:*:*", "matchCriteriaId": "CA60D334-B2F6-4F34-9EE1-C8F45DB3C441", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jdd:*:*:*:*:*:*:*", "matchCriteriaId": "FD178B67-B9E7-4725-B553-E5ACBCE296D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*", "matchCriteriaId": "ACB11851-BCF8-485B-91F9-6A39B2354826", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*", "matchCriteriaId": "65C61F77-6CDE-4CCA-B2DB-B76C6B5F8152", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*", "matchCriteriaId": "3DFE3FC0-79BC-4549-98BA-235A53719F82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*", "matchCriteriaId": "4691CEAD-47F1-4A97-84A4-72B794D3F714", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*", "matchCriteriaId": "B4A28452-000C-4BBB-A34E-1AA63D69925D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*", "matchCriteriaId": "A2222EED-6CB2-4D18-8AF5-FAE55BC6213F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4mda:*:*:*:*:*:*:*", "matchCriteriaId": "237F6EDD-AB47-4768-9C75-C0B03E23696B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*", "matchCriteriaId": "C7414D32-88A1-416E-A717-3F47B6D1BE74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*", "matchCriteriaId": "370DC543-AC01-4B91-88C7-60C323E35929", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*", "matchCriteriaId": "BEAD7398-D1B2-47FB-952D-8C3162D5A363", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*", "matchCriteriaId": "99235FFB-4439-40B2-ADBD-B08E5DBBCCB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*", "matchCriteriaId": "C1797E4E-E15C-4148-9B3D-4FF6D1D815AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*", "matchCriteriaId": "544BD924-2CBD-4130-BBD3-5AD084C85FE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*", "matchCriteriaId": "6B78181E-E1D1-4C25-85DE-CA46BBF21765", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*", "matchCriteriaId": "C1F36C3D-E9A2-41A1-BE71-4D8B00D228E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*", "matchCriteriaId": "7D1CD80F-E898-41CE-8A86-28C2F48B928A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*", "matchCriteriaId": "9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*", "matchCriteriaId": "BF610051-1638-4C1B-9864-11E34EFC4DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*", "matchCriteriaId": "78260223-50C0-48F8-9A65-AE67489E602C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*", "matchCriteriaId": "18E39462-4CEE-4C29-8B60-50E05FCF3E91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*", "matchCriteriaId": "3FF16123-CCA0-4ECD-9B8C-AC1534C3F244", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*", "matchCriteriaId": "CC7454AF-7610-4CD3-BD2B-95A6C3283811", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*", "matchCriteriaId": "AB633E6C-025C-4B31-ABE7-8318C813376B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*", "matchCriteriaId": "CEA9218D-E7A5-4F98-83E7-2FD6E138D5CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*", "matchCriteriaId": "AC90BE87-EB54-46F8-A1FD-8F4E553C69F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*", "matchCriteriaId": "DFED1FFB-899D-4A48-9CCA-0B8737AE1408", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*", "matchCriteriaId": "883FA166-2973-42BA-842D-28FBDBFEAC4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*", "matchCriteriaId": "4362045B-7065-4FF9-A977-B3DA7894F831", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*", "matchCriteriaId": "BC27E79D-6B4B-4839-9664-DFE821C45C2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*", "matchCriteriaId": "4963A243-74FA-43AD-9645-C9FAD527A6E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*", "matchCriteriaId": "31C6EACA-35BE-4032-93DA-5F738AEE0F4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4yb:*:*:*:*:*:*:*", "matchCriteriaId": "E67621EA-25D8-47C2-ADEA-512E38F2FFE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4yd:*:*:*:*:*:*:*", "matchCriteriaId": "94E1421B-2B86-41B2-9288-59780E081337", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4ye:*:*:*:*:*:*:*", "matchCriteriaId": "51A5F5FF-6BC4-4A1E-B9F1-BD47096D30B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.4yg:*:*:*:*:*:*:*", "matchCriteriaId": "6D910556-9518-45C5-9891-1541760B0920", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:7200_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "60DEA083-B9BC-42DB-A4F7-986A5A185DE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:7301_router:*:*:*:*:*:*:*:*", "matchCriteriaId": "89C870CD-288F-41EF-BDC3-90953A81AFFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:router_7200:*:*:*:*:*:*:*:*", "matchCriteriaId": "637F3047-DF5B-481D-8595-B54B076A5CD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IKE implementation in Cisco IOS 12.2 through 12.4 on Cisco 7200 and 7301 routers with VAM2+ allows remote attackers to cause a denial of service (device reload) via a malformed IKE packet, aka Bug ID CSCtb13491." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en la implementaci\u00f3n IKE en Cisco IOS v12.2 a la v12.4 en routers Cisco 7200 y 7301 con VAM2+, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de un mensaje IKE mal formado. Tambi\u00e9n conocido como Bug ID CSCtb13491." } ], "evaluatorComment": "Per:http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee5.shtml\r\n\r\n\u0027IPsec is an IP security feature that provides robust authentication and encryption of IP packets. IKE is a key management protocol standard that is used with the IPsec standard.\r\n\r\nIKE is a hybrid protocol that implements the Oakley and SKEME key exchanges inside the Internet Security Association and Key Management Protocol (ISAKMP) framework. (ISAKMP, Oakley, and SKEME are security protocols that are implemented by IKE.). More information on IKE is available at the following link:\r\n\r\nhttp://www.cisco.com/en/US/docs/ios/sec_secure_connectivity/configuration/guide/sec_key_exch_ipsec.html\r\n\r\nA vulnerability exists in the Cisco IOS Software implementation of IKE where a malformed packet may cause a device running Cisco IOS Software to reload. Only Cisco 7200 Series and Cisco 7301 routers running Cisco IOS software with a VPN Acceleration Module 2+ (VAM2+) installed are affected.\r\n\r\nThis vulnerability is documented in Cisco Bug ID CSCtb13491 ( registered customers only) and has been assigned CVE ID CVE-2010-0578.\u0027", "id": "CVE-2010-0578", "lastModified": "2024-11-21T01:12:29.387", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-03-25T21:00:00.733", "references": [ { "source": "psirt@cisco.com", "url": "http://osvdb.org/63182" }, { "source": "psirt@cisco.com", "url": "http://secunia.com/advisories/39057" }, { "source": "psirt@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee5.shtml" }, { "source": "psirt@cisco.com", "url": "http://www.securityfocus.com/bid/38932" }, { "source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id?1023741" }, { "source": "psirt@cisco.com", "url": "http://www.vupen.com/english/advisories/2010/0709" }, { "source": "psirt@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/63182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/39057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee5.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/38932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/0709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57148" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-05-03 04:00
Modified
2024-11-20 23:32
Severity ?
Summary
The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 9.14 | |
cisco | ios | 11.1 | |
cisco | ios | 11.1\(13\) | |
cisco | ios | 11.1\(13\)aa | |
cisco | ios | 11.1\(13\)ca | |
cisco | ios | 11.1\(13\)ia | |
cisco | ios | 11.1\(15\)ca | |
cisco | ios | 11.1\(16\) | |
cisco | ios | 11.1\(16\)aa | |
cisco | ios | 11.1\(16\)ia | |
cisco | ios | 11.1\(17\)cc | |
cisco | ios | 11.1\(17\)ct | |
cisco | ios | 11.2 | |
cisco | ios | 11.2\(4\)f1 | |
cisco | ios | 11.2\(8\) | |
cisco | ios | 11.2\(8\)p | |
cisco | ios | 11.2\(8\)sa1 | |
cisco | ios | 11.2\(8\)sa3 | |
cisco | ios | 11.2\(8\)sa5 | |
cisco | ios | 11.2\(9\)p | |
cisco | ios | 11.2\(9\)xa | |
cisco | ios | 11.2\(10\) | |
cisco | ios | 11.2\(10\)bc | |
cisco | ios | 11.2\(17\) | |
cisco | ios | 11.2p | |
cisco | ios | 12.0 | |
cisco | ios | 12.0\(1\)w | |
cisco | ios | 12.0\(1\)xa3 | |
cisco | ios | 12.0\(1\)xb | |
cisco | ios | 12.0\(1\)xe | |
cisco | ios | 12.0\(2\) | |
cisco | ios | 12.0\(2\)xc | |
cisco | ios | 12.0\(2\)xd | |
cisco | ios | 12.0\(2\)xf | |
cisco | ios | 12.0\(2\)xg | |
cisco | ios | 12.0\(3\)t2 | |
cisco | ios | 12.0\(4\) | |
cisco | ios | 12.0\(4\)s | |
cisco | ios | 12.0\(4\)t | |
cisco | ios | 12.0\(5\) | |
cisco | ios | 12.0\(5\)t1 | |
cisco | ios | 12.0\(6\) | |
cisco | ios | 12.0\(7\)t | |
cisco | ios | 12.0\(8\) | |
cisco | ios | 12.0\(9\)s | |
cisco | ios | 12.0db | |
cisco | ios | 12.0s | |
cisco | ios | 12.0t | |
cisco | router_2500 | * | |
cisco | router_2600 | * | |
cisco | router_3600 | * | |
cisco | router_4000 | * | |
cisco | router_7200 | * | |
cisco | router_7500 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:9.14:*:*:*:*:*:*:*", "matchCriteriaId": "327028C0-D9F3-46A3-B2CC-4630FE18C43E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "82B6315D-7BEF-419F-9B93-3CF669E986D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "B36FF40E-EF0A-4149-A35D-8D765EBFFAE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1\\(13\\)aa:*:*:*:*:*:*:*", "matchCriteriaId": "51382DA5-4EBC-44DC-951F-32FC7AA719A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1\\(13\\)ca:*:*:*:*:*:*:*", "matchCriteriaId": "5BA2A1FD-11A3-403A-B5A6-0220CA18EC99", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1\\(13\\)ia:*:*:*:*:*:*:*", "matchCriteriaId": "3493F361-0C8A-4B66-AF6B-926E2D66BBEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1\\(15\\)ca:*:*:*:*:*:*:*", "matchCriteriaId": "841513AE-7521-4670-8438-AE5EB70F3A48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "FF3E8F79-6177-453C-99B5-BC9BC7670869", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1\\(16\\)aa:*:*:*:*:*:*:*", "matchCriteriaId": "4B244655-A6A5-40D0-A0D1-34C814DA9389", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1\\(16\\)ia:*:*:*:*:*:*:*", "matchCriteriaId": "CA064273-1A6E-4303-BAAB-F585691EF9BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1\\(17\\)cc:*:*:*:*:*:*:*", "matchCriteriaId": "0A8158E2-0DFE-479B-B085-9775FF700C85", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.1\\(17\\)ct:*:*:*:*:*:*:*", "matchCriteriaId": "29CA3070-B75D-4E56-A338-E10F5509394E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "E8026B11-6144-467F-8094-F4F73CD37526", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(4\\)f1:*:*:*:*:*:*:*", "matchCriteriaId": "17DE2319-19D9-4C02-80B4-0A6AAD853867", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "82BFEABB-6E90-4A24-BBE3-2BDB524028A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\)p:*:*:*:*:*:*:*", "matchCriteriaId": "F169E322-3D72-4F86-BD5F-74589E5DD823", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa1:*:*:*:*:*:*:*", "matchCriteriaId": "DBA5D334-6DB8-44B0-92EF-8694BBE79A9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa3:*:*:*:*:*:*:*", "matchCriteriaId": "099CFED1-0E2F-46B2-8136-BFA146EB9A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa5:*:*:*:*:*:*:*", "matchCriteriaId": "754F06BF-EB7D-4DAD-BF5D-7DF2619A7499", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*", "matchCriteriaId": "047F9781-38B8-488C-B999-A3CA6BDB639C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*", "matchCriteriaId": "3E3586C0-64AF-4584-8F56-7E0756B4A521", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B784C9F-79EE-4D08-9D03-985EC7E378FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*", "matchCriteriaId": "FFBA8825-442E-4CAD-A9B2-4DD8546F35F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "F106D24F-7EDD-4A52-9A3A-F25E6EEC1870", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*", "matchCriteriaId": "0DC1411B-4E7E-4F57-B025-9FE27B09C7AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*", "matchCriteriaId": "53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*", "matchCriteriaId": "AE210B04-7ECD-419C-9258-0F619A353A8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*", "matchCriteriaId": "3B467741-B277-4128-9804-E13ED23FD310", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*", "matchCriteriaId": "5E7EE856-9CE7-49FD-8ADC-05C580CD54A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "77DDC99D-8B73-452C-94A7-A9A48F2F379B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*", "matchCriteriaId": "5145C737-2D5E-4BD4-BA9F-66ED2887A4DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*", "matchCriteriaId": "C48466C4-5A1E-4C71-8822-32D387B36B8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*", "matchCriteriaId": "08E23131-D207-4D98-96D5-2B71FF792604", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*", "matchCriteriaId": "1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*", "matchCriteriaId": "E7109585-1433-4940-B7C9-C561DEAF1498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A0D82E1-CCF7-429B-A637-479E839EAE3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "4F1B2747-4A9C-44FC-BBA8-39E338B30417", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5BB7513-C232-4B4F-BE68-972B05086ABD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*", "matchCriteriaId": "EA263B60-E7C0-4374-96DF-6E4EB9C16743", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "ECCE69A3-41C6-4893-86D4-7F264352C8A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "FA654CE6-82C3-43D0-BAED-70E88A740BF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "387FCCC1-B05D-4493-9F05-BAC5A0E57F15", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "C4EB360F-7BAE-4BB5-BB55-E3FFC567A1E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", "matchCriteriaId": "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", "matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", "matchCriteriaId": "CA7F94E8-86FC-456B-A7BB-57953F67F754", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:router_2500:*:*:*:*:*:*:*:*", "matchCriteriaId": "317EF7FA-B744-487C-AEB6-4516CF03F9B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:router_2600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3B03AEF-EACD-4B3D-AA1E-EADC344C02BE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:router_3600:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0460513-094F-4F99-B0EB-7AA484D21920", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:router_4000:*:*:*:*:*:*:*:*", "matchCriteriaId": "446980C5-E512-475C-B255-86A8726A67D2", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:router_7200:*:*:*:*:*:*:*:*", "matchCriteriaId": "637F3047-DF5B-481D-8595-B54B076A5CD7", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:router_7500:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA7F3C4B-378B-4431-B4AF-09D95354363E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The on-line help system options in Cisco routers allows non-privileged users without \"enabled\" access to obtain sensitive information via the show command." } ], "id": "CVE-2000-0345", "lastModified": "2024-11-20T23:32:17.483", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-05-03T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1161" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000502222246.28423.qmail%40securityfocus.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000502222246.28423.qmail%40securityfocus.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }