Show plain JSON{"id": "CVE-2000-0380", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2000-04-26T04:00:00.000", "references": [{"url": "http://archives.neohapsis.com/archives/bugtraq/2000-04/0261.html", "source": "cve@mitre.org"}, {"url": "http://www.cisco.com/warp/public/707/ioshttpserver-pub.shtml", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/1302", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/1154", "source": "cve@mitre.org"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2000-04/0261.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.cisco.com/warp/public/707/ioshttpserver-pub.shtml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/1302", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/1154", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82B6315D-7BEF-419F-9B93-3CF669E986D1"}, {"criteria": "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8026B11-6144-467F-8094-F4F73CD37526"}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(4\\)f1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17DE2319-19D9-4C02-80B4-0A6AAD853867"}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82BFEABB-6E90-4A24-BBE3-2BDB524028A0"}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\)p:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F169E322-3D72-4F86-BD5F-74589E5DD823"}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "047F9781-38B8-488C-B999-A3CA6BDB639C"}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E3586C0-64AF-4584-8F56-7E0756B4A521"}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B784C9F-79EE-4D08-9D03-985EC7E378FE"}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFBA8825-442E-4CAD-A9B2-4DD8546F35F9"}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(17\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F106D24F-7EDD-4A52-9A3A-F25E6EEC1870"}, {"criteria": "cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DC1411B-4E7E-4F57-B025-9FE27B09C7AC"}, {"criteria": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF"}, {"criteria": "cpe:2.3:o:cisco:ios:11.3\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A6F8329-15C7-4FED-A61D-5AF4F3A33976"}, {"criteria": "cpe:2.3:o:cisco:ios:11.3\\(1\\)ed:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD13732A-DAE0-4D5B-9DAC-6D2CF391220D"}, {"criteria": "cpe:2.3:o:cisco:ios:11.3\\(1\\)t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A53DE80A-5865-4514-BE14-BA5992EE7BDA"}, {"criteria": "cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "655BB9C1-BA90-452E-A9C8-9B1E15B99650"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE210B04-7ECD-419C-9258-0F619A353A8A"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B467741-B277-4128-9804-E13ED23FD310"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E7EE856-9CE7-49FD-8ADC-05C580CD54A7"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77DDC99D-8B73-452C-94A7-A9A48F2F379B"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5145C737-2D5E-4BD4-BA9F-66ED2887A4DB"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C48466C4-5A1E-4C71-8822-32D387B36B8B"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08E23131-D207-4D98-96D5-2B71FF792604"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7109585-1433-4940-B7C9-C561DEAF1498"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A0D82E1-CCF7-429B-A637-479E839EAE3C"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F1B2747-4A9C-44FC-BBA8-39E338B30417"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5BB7513-C232-4B4F-BE68-972B05086ABD"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA263B60-E7C0-4374-96DF-6E4EB9C16743"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECCE69A3-41C6-4893-86D4-7F264352C8A9"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA654CE6-82C3-43D0-BAED-70E88A740BF1"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "387FCCC1-B05D-4493-9F05-BAC5A0E57F15"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4EB360F-7BAE-4BB5-BB55-E3FFC567A1E4"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA7F94E8-86FC-456B-A7BB-57953F67F754"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}