CVE-2001-0537 (GCVE-0-2001-0537)
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-08 04:21
Severity ?
CWE
  • n/a
Summary
HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.
References
cve@mitre.orghttp://www.cert.org/advisories/CA-2001-14.htmlExploit, Patch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.ciac.org/ciac/bulletins/l-106.shtml
cve@mitre.orghttp://www.cisco.com/warp/public/707/IOS-httplevel-pub.htmlExploit, Patch, Vendor Advisory
cve@mitre.orghttp://www.osvdb.org/578
cve@mitre.orghttp://www.securityfocus.com/archive/1/1601227034.20010702112207%40olympos.org
cve@mitre.orghttp://www.securityfocus.com/archive/1/20010703011650.60515.qmail%40web14910.mail.yahoo.com
cve@mitre.orghttp://www.securityfocus.com/archive/1/4.3.2.7.2.20010629095801.0c3e6a70%40brussels.cisco.com
cve@mitre.orghttp://www.securityfocus.com/archive/1/Pine.LNX.3.96.1010702134611.22995B-100000%40Lib-Vai.lib.asu.edu
cve@mitre.orghttp://www.securityfocus.com/bid/2936Exploit, Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/6749
af854a3a-2127-422b-91ae-364da2661108http://www.cert.org/advisories/CA-2001-14.htmlExploit, Patch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.ciac.org/ciac/bulletins/l-106.shtml
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/IOS-httplevel-pub.htmlExploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/578
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/1601227034.20010702112207%40olympos.org
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/20010703011650.60515.qmail%40web14910.mail.yahoo.com
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/4.3.2.7.2.20010629095801.0c3e6a70%40brussels.cisco.com
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/Pine.LNX.3.96.1010702134611.22995B-100000%40Lib-Vai.lib.asu.edu
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/2936Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/6749
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:21:38.680Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "CA-2001-14",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.cert.org/advisories/CA-2001-14.html"
          },
          {
            "name": "20010629 Re: Cisco Security Advisory: IOS HTTP authorization vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/4.3.2.7.2.20010629095801.0c3e6a70%40brussels.cisco.com"
          },
          {
            "name": "20010627 IOS HTTP authorization vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/warp/public/707/IOS-httplevel-pub.html"
          },
          {
            "name": "20010702 ios-http-auth.sh",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/20010703011650.60515.qmail%40web14910.mail.yahoo.com"
          },
          {
            "name": "20010702 Cisco IOS HTTP Configuration Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/1601227034.20010702112207%40olympos.org"
          },
          {
            "name": "578",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/578"
          },
          {
            "name": "20010702 Cisco device HTTP exploit...",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/Pine.LNX.3.96.1010702134611.22995B-100000%40Lib-Vai.lib.asu.edu"
          },
          {
            "name": "L-106",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/l-106.shtml"
          },
          {
            "name": "2936",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/2936"
          },
          {
            "name": "cisco-ios-admin-access(6749)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6749"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-06-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-03-02T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "CA-2001-14",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.cert.org/advisories/CA-2001-14.html"
        },
        {
          "name": "20010629 Re: Cisco Security Advisory: IOS HTTP authorization vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/4.3.2.7.2.20010629095801.0c3e6a70%40brussels.cisco.com"
        },
        {
          "name": "20010627 IOS HTTP authorization vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/warp/public/707/IOS-httplevel-pub.html"
        },
        {
          "name": "20010702 ios-http-auth.sh",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/20010703011650.60515.qmail%40web14910.mail.yahoo.com"
        },
        {
          "name": "20010702 Cisco IOS HTTP Configuration Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/1601227034.20010702112207%40olympos.org"
        },
        {
          "name": "578",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/578"
        },
        {
          "name": "20010702 Cisco device HTTP exploit...",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/Pine.LNX.3.96.1010702134611.22995B-100000%40Lib-Vai.lib.asu.edu"
        },
        {
          "name": "L-106",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/l-106.shtml"
        },
        {
          "name": "2936",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/2936"
        },
        {
          "name": "cisco-ios-admin-access(6749)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6749"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0537",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "CA-2001-14",
              "refsource": "CERT",
              "url": "http://www.cert.org/advisories/CA-2001-14.html"
            },
            {
              "name": "20010629 Re: Cisco Security Advisory: IOS HTTP authorization vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/4.3.2.7.2.20010629095801.0c3e6a70@brussels.cisco.com"
            },
            {
              "name": "20010627 IOS HTTP authorization vulnerability",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/warp/public/707/IOS-httplevel-pub.html"
            },
            {
              "name": "20010702 ios-http-auth.sh",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/20010703011650.60515.qmail@web14910.mail.yahoo.com"
            },
            {
              "name": "20010702 Cisco IOS HTTP Configuration Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/1601227034.20010702112207@olympos.org"
            },
            {
              "name": "578",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/578"
            },
            {
              "name": "20010702 Cisco device HTTP exploit...",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/Pine.LNX.3.96.1010702134611.22995B-100000@Lib-Vai.lib.asu.edu"
            },
            {
              "name": "L-106",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/l-106.shtml"
            },
            {
              "name": "2936",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/2936"
            },
            {
              "name": "cisco-ios-admin-access(6749)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6749"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0537",
    "datePublished": "2002-03-09T05:00:00",
    "dateReserved": "2001-06-28T00:00:00",
    "dateUpdated": "2024-08-08T04:21:38.680Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2001-0537\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2001-07-21T04:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8783C0A-990A-4B79-8BF9-64E425DA585E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11B3630E-6ED6-4A8F-8FBC-AA68E81490F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3db:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"046D8679-38F8-4DC9-82A7-2562DE0495F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3ha:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92509012-2DA2-4045-9AE4-4D8681F64D2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3ma:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C993003-8B99-4CFF-8546-888E8C5D8FEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3na:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80AEA6F5-907D-493F-AB07-971D13BC1CAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"655BB9C1-BA90-452E-A9C8-9B1E15B99650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A747DB2-A031-470F-8EA5-F37FBE175D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F86F790-6247-42F2-9487-3D60A2842F52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1423776F-1C73-4872-81F6-29C411B6E545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC5E6E9-E639-424B-963D-2760B2C38D8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(10\\\\)w5\\\\(18g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77D178AF-15CB-4352-8193-741F8B49688A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(14\\\\)w5\\\\(20\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BC109F5-0907-4CDB-90BD-61788921DABC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12434A88-88C6-4749-981F-E2B4D725F48F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F7CF26C-AEAA-42D7-8136-56E77E73DCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A4864A2-D6BB-4E2A-9AA4-519EE0732D16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C398460-3F38-4AA7-A4B1-FD8A01588DB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"793F494D-F6BD-4B23-92BE-83B9DD9D4A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B6B0C2F-2FBE-4422-AD30-305100C595CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBEA01D2-B985-4575-AF00-144CE2E3024D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7F94E8-86FC-456B-A7BB-57953F67F754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8B5CC91-144D-4818-871E-E6120A7E1050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23E5F43E-20DA-4C5C-B8C5-1A5512CA07B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1050ACB3-E5B2-4710-910B-F3DF4B49907F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ABE71F9-17D4-47C4-A762-18CC8716E477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7977DA9F-41DE-4482-B0CD-896EEEFB5689\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D0A8D1D-ED94-4A2E-ACC5-0408C2C9FCFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADAB898-7728-4C14-B69A-7B8B06AFC894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDBE69A0-85B1-423B-88FB-CDA80E9186EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C14C28A4-91C1-4AE0-8A14-8E98A569F7B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54424787-34AC-410D-985F-511ADB2BB144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70F54F0C-AC91-4CB7-9FEB-257F03547864\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6A0D017-F26F-4429-891E-C7E1C66B6588\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A3DFAEC-4534-4A8D-9886-0723F57C7A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5451772-87D4-42E2-8F48-D137670DA3E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D162976F-87A3-42BF-8C9F-A981B14F4673\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2606209-91BE-4BEB-A163-0D3873A033FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43581A57-418A-4A35-ACF2-1380A8DA8A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC17E231-9256-4600-A33B-238E7E83CF85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6D5468-BB6A-4665-964F-D8F636359CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0082D5-CE3E-433A-84E9-1311C8B7899A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EB78A4-B386-4FCB-A21F-BD2B2EFC9616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA6FFE33-2891-48E5-9D0C-C52F88B2D76C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDEF6AED-4477-4AAC-9759-1996B77DFEE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9427851-B0DC-4CE6-8BFA-60619D1DC87C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D07DD94-0925-4FEE-9565-5F36B9AAF448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC3A67F5-05C6-4097-A88E-0A0F165C12EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7126E176-D739-4102-8F10-1EEB8C6A219D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46FF39C5-CC37-4573-BB18-36254D38509B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4A85892-C3AB-4920-A949-A71BD0332D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6330829-9A7B-479D-B38B-BC64148EC172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF9F1E38-3482-4EAC-8654-EBC004B9344B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"752C3C6B-910D-4153-A162-DF255F60306B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1BBE2FF-5DAE-447A-9C3D-3F48B24AECA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297FAD97-60C0-473D-A18D-03657B81B7E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AD4A33B-B13E-40C6-B47F-A406ACC6664F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E488E6E-87F0-4292-B97B-31087FDB4655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D199CB1-A2A3-4678-9503-C5B61281755C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19952DC6-1186-4754-BB1E-BA1D78A19C96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"441CB9D6-5EDB-457B-B59E-D48B01AEAF5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28097F62-B51F-4A3B-BB31-6FA67E8C8B5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E8AF76-0A1D-4BAE-BF10-D63080352E6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A11AF3F-C82F-4431-9CF1-84FDAD388D04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B674647-4438-4450-9DCA-25184D4E2682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E5CC41-1344-4A65-A653-8012ACE2CF2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FB7128-CF11-4903-97D7-418403A03CD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63EFB20A-78E2-4BA1-B87C-BB74E8982D99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A273401-9394-4BC3-879C-DE3EFC09B3F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DABF911-FCDF-4095-A95D-4BB73628FCA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77886493-C30E-439E-BBB4-3D34A8938378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7813F511-CF6D-487F-9D1C-7A6CF85AD724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"677DC4B6-8B3D-4A0D-9934-743FD7494DF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E272881F-0804-4190-A21D-3D0B9A774F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B12B39FE-3E7B-4D96-8CD4-0D57C50A786A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F084DA16-24CB-41D1-92B7-C6E0499AAD10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA979D75-F60E-45F8-B99C-1402DC8CFCDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194F0AB1-92E6-4CE3-A5A1-904BF75F05D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"884753D4-3AF0-4723-9D51-26BA7B4CA533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF3601D-DF44-4A10-A424-8E97C65A36A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC38BD6C-9823-4D2A-8BE2-60AABE3C4932\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BB103ED-B170-4193-84CD-4C59F4D6A10A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BC49F2-3DCB-45F0-9030-13F6415EE178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84900BB3-B49F-448A-9E04-FE423FBCCC4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAC6758B-C6EE-45CB-AC2D-28C4AE709DD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AB8E66C-A16F-4CC5-9FDF-AE274FF035EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"746DDC61-3981-4E93-A7EE-C120E0265485\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4628FDA0-4260-4493-92C9-4574E5EC06A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B40548F-3914-4227-9E4C-F1B34071C069\"}]}]}],\"references\":[{\"url\":\"http://www.cert.org/advisories/CA-2001-14.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.ciac.org/ciac/bulletins/l-106.shtml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cisco.com/warp/public/707/IOS-httplevel-pub.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/578\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/1601227034.20010702112207%40olympos.org\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/20010703011650.60515.qmail%40web14910.mail.yahoo.com\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/4.3.2.7.2.20010629095801.0c3e6a70%40brussels.cisco.com\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/Pine.LNX.3.96.1010702134611.22995B-100000%40Lib-Vai.lib.asu.edu\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/2936\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/6749\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cert.org/advisories/CA-2001-14.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.ciac.org/ciac/bulletins/l-106.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/warp/public/707/IOS-httplevel-pub.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/578\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/1601227034.20010702112207%40olympos.org\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/20010703011650.60515.qmail%40web14910.mail.yahoo.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/4.3.2.7.2.20010629095801.0c3e6a70%40brussels.cisco.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/Pine.LNX.3.96.1010702134611.22995B-100000%40Lib-Vai.lib.asu.edu\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/2936\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/6749\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…