CVE-2001-0537 (GCVE-0-2001-0537)
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-08 04:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:21:38.680Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "CA-2001-14",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.cert.org/advisories/CA-2001-14.html"
},
{
"name": "20010629 Re: Cisco Security Advisory: IOS HTTP authorization vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/4.3.2.7.2.20010629095801.0c3e6a70%40brussels.cisco.com"
},
{
"name": "20010627 IOS HTTP authorization vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/IOS-httplevel-pub.html"
},
{
"name": "20010702 ios-http-auth.sh",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/20010703011650.60515.qmail%40web14910.mail.yahoo.com"
},
{
"name": "20010702 Cisco IOS HTTP Configuration Exploit",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/1601227034.20010702112207%40olympos.org"
},
{
"name": "578",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/578"
},
{
"name": "20010702 Cisco device HTTP exploit...",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/Pine.LNX.3.96.1010702134611.22995B-100000%40Lib-Vai.lib.asu.edu"
},
{
"name": "L-106",
"tags": [
"third-party-advisory",
"government-resource",
"x_refsource_CIAC",
"x_transferred"
],
"url": "http://www.ciac.org/ciac/bulletins/l-106.shtml"
},
{
"name": "2936",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/2936"
},
{
"name": "cisco-ios-admin-access(6749)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6749"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2001-06-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-03-02T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "CA-2001-14",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.cert.org/advisories/CA-2001-14.html"
},
{
"name": "20010629 Re: Cisco Security Advisory: IOS HTTP authorization vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/4.3.2.7.2.20010629095801.0c3e6a70%40brussels.cisco.com"
},
{
"name": "20010627 IOS HTTP authorization vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/IOS-httplevel-pub.html"
},
{
"name": "20010702 ios-http-auth.sh",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/20010703011650.60515.qmail%40web14910.mail.yahoo.com"
},
{
"name": "20010702 Cisco IOS HTTP Configuration Exploit",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/1601227034.20010702112207%40olympos.org"
},
{
"name": "578",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/578"
},
{
"name": "20010702 Cisco device HTTP exploit...",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/Pine.LNX.3.96.1010702134611.22995B-100000%40Lib-Vai.lib.asu.edu"
},
{
"name": "L-106",
"tags": [
"third-party-advisory",
"government-resource",
"x_refsource_CIAC"
],
"url": "http://www.ciac.org/ciac/bulletins/l-106.shtml"
},
{
"name": "2936",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/2936"
},
{
"name": "cisco-ios-admin-access(6749)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6749"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2001-0537",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "CA-2001-14",
"refsource": "CERT",
"url": "http://www.cert.org/advisories/CA-2001-14.html"
},
{
"name": "20010629 Re: Cisco Security Advisory: IOS HTTP authorization vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/4.3.2.7.2.20010629095801.0c3e6a70@brussels.cisco.com"
},
{
"name": "20010627 IOS HTTP authorization vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/IOS-httplevel-pub.html"
},
{
"name": "20010702 ios-http-auth.sh",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/20010703011650.60515.qmail@web14910.mail.yahoo.com"
},
{
"name": "20010702 Cisco IOS HTTP Configuration Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/1601227034.20010702112207@olympos.org"
},
{
"name": "578",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/578"
},
{
"name": "20010702 Cisco device HTTP exploit...",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/Pine.LNX.3.96.1010702134611.22995B-100000@Lib-Vai.lib.asu.edu"
},
{
"name": "L-106",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/l-106.shtml"
},
{
"name": "2936",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2936"
},
{
"name": "cisco-ios-admin-access(6749)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6749"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2001-0537",
"datePublished": "2002-03-09T05:00:00",
"dateReserved": "2001-06-28T00:00:00",
"dateUpdated": "2024-08-08T04:21:38.680Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2001-0537\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2001-07-21T04:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8783C0A-990A-4B79-8BF9-64E425DA585E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11B3630E-6ED6-4A8F-8FBC-AA68E81490F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3db:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"046D8679-38F8-4DC9-82A7-2562DE0495F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3ha:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92509012-2DA2-4045-9AE4-4D8681F64D2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3ma:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C993003-8B99-4CFF-8546-888E8C5D8FEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3na:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80AEA6F5-907D-493F-AB07-971D13BC1CAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"655BB9C1-BA90-452E-A9C8-9B1E15B99650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A747DB2-A031-470F-8EA5-F37FBE175D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F86F790-6247-42F2-9487-3D60A2842F52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1423776F-1C73-4872-81F6-29C411B6E545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC5E6E9-E639-424B-963D-2760B2C38D8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(10\\\\)w5\\\\(18g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77D178AF-15CB-4352-8193-741F8B49688A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(14\\\\)w5\\\\(20\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BC109F5-0907-4CDB-90BD-61788921DABC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12434A88-88C6-4749-981F-E2B4D725F48F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F7CF26C-AEAA-42D7-8136-56E77E73DCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A4864A2-D6BB-4E2A-9AA4-519EE0732D16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C398460-3F38-4AA7-A4B1-FD8A01588DB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"793F494D-F6BD-4B23-92BE-83B9DD9D4A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B6B0C2F-2FBE-4422-AD30-305100C595CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBEA01D2-B985-4575-AF00-144CE2E3024D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7F94E8-86FC-456B-A7BB-57953F67F754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8B5CC91-144D-4818-871E-E6120A7E1050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23E5F43E-20DA-4C5C-B8C5-1A5512CA07B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1050ACB3-E5B2-4710-910B-F3DF4B49907F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ABE71F9-17D4-47C4-A762-18CC8716E477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7977DA9F-41DE-4482-B0CD-896EEEFB5689\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D0A8D1D-ED94-4A2E-ACC5-0408C2C9FCFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADAB898-7728-4C14-B69A-7B8B06AFC894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDBE69A0-85B1-423B-88FB-CDA80E9186EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C14C28A4-91C1-4AE0-8A14-8E98A569F7B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54424787-34AC-410D-985F-511ADB2BB144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70F54F0C-AC91-4CB7-9FEB-257F03547864\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6A0D017-F26F-4429-891E-C7E1C66B6588\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A3DFAEC-4534-4A8D-9886-0723F57C7A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5451772-87D4-42E2-8F48-D137670DA3E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D162976F-87A3-42BF-8C9F-A981B14F4673\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2606209-91BE-4BEB-A163-0D3873A033FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43581A57-418A-4A35-ACF2-1380A8DA8A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC17E231-9256-4600-A33B-238E7E83CF85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6D5468-BB6A-4665-964F-D8F636359CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0082D5-CE3E-433A-84E9-1311C8B7899A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EB78A4-B386-4FCB-A21F-BD2B2EFC9616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA6FFE33-2891-48E5-9D0C-C52F88B2D76C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDEF6AED-4477-4AAC-9759-1996B77DFEE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9427851-B0DC-4CE6-8BFA-60619D1DC87C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D07DD94-0925-4FEE-9565-5F36B9AAF448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC3A67F5-05C6-4097-A88E-0A0F165C12EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7126E176-D739-4102-8F10-1EEB8C6A219D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46FF39C5-CC37-4573-BB18-36254D38509B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4A85892-C3AB-4920-A949-A71BD0332D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6330829-9A7B-479D-B38B-BC64148EC172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF9F1E38-3482-4EAC-8654-EBC004B9344B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"752C3C6B-910D-4153-A162-DF255F60306B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1BBE2FF-5DAE-447A-9C3D-3F48B24AECA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297FAD97-60C0-473D-A18D-03657B81B7E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AD4A33B-B13E-40C6-B47F-A406ACC6664F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E488E6E-87F0-4292-B97B-31087FDB4655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D199CB1-A2A3-4678-9503-C5B61281755C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19952DC6-1186-4754-BB1E-BA1D78A19C96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"441CB9D6-5EDB-457B-B59E-D48B01AEAF5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28097F62-B51F-4A3B-BB31-6FA67E8C8B5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E8AF76-0A1D-4BAE-BF10-D63080352E6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A11AF3F-C82F-4431-9CF1-84FDAD388D04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B674647-4438-4450-9DCA-25184D4E2682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E5CC41-1344-4A65-A653-8012ACE2CF2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FB7128-CF11-4903-97D7-418403A03CD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63EFB20A-78E2-4BA1-B87C-BB74E8982D99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A273401-9394-4BC3-879C-DE3EFC09B3F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DABF911-FCDF-4095-A95D-4BB73628FCA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77886493-C30E-439E-BBB4-3D34A8938378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7813F511-CF6D-487F-9D1C-7A6CF85AD724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"677DC4B6-8B3D-4A0D-9934-743FD7494DF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E272881F-0804-4190-A21D-3D0B9A774F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B12B39FE-3E7B-4D96-8CD4-0D57C50A786A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F084DA16-24CB-41D1-92B7-C6E0499AAD10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA979D75-F60E-45F8-B99C-1402DC8CFCDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194F0AB1-92E6-4CE3-A5A1-904BF75F05D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"884753D4-3AF0-4723-9D51-26BA7B4CA533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF3601D-DF44-4A10-A424-8E97C65A36A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC38BD6C-9823-4D2A-8BE2-60AABE3C4932\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BB103ED-B170-4193-84CD-4C59F4D6A10A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BC49F2-3DCB-45F0-9030-13F6415EE178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84900BB3-B49F-448A-9E04-FE423FBCCC4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAC6758B-C6EE-45CB-AC2D-28C4AE709DD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AB8E66C-A16F-4CC5-9FDF-AE274FF035EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"746DDC61-3981-4E93-A7EE-C120E0265485\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4628FDA0-4260-4493-92C9-4574E5EC06A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B40548F-3914-4227-9E4C-F1B34071C069\"}]}]}],\"references\":[{\"url\":\"http://www.cert.org/advisories/CA-2001-14.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.ciac.org/ciac/bulletins/l-106.shtml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cisco.com/warp/public/707/IOS-httplevel-pub.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/578\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/1601227034.20010702112207%40olympos.org\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/20010703011650.60515.qmail%40web14910.mail.yahoo.com\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/4.3.2.7.2.20010629095801.0c3e6a70%40brussels.cisco.com\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/Pine.LNX.3.96.1010702134611.22995B-100000%40Lib-Vai.lib.asu.edu\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/2936\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/6749\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cert.org/advisories/CA-2001-14.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.ciac.org/ciac/bulletins/l-106.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/warp/public/707/IOS-httplevel-pub.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/578\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/1601227034.20010702112207%40olympos.org\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/20010703011650.60515.qmail%40web14910.mail.yahoo.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/4.3.2.7.2.20010629095801.0c3e6a70%40brussels.cisco.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/Pine.LNX.3.96.1010702134611.22995B-100000%40Lib-Vai.lib.asu.edu\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/2936\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/6749\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…