Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "82B6315D-7BEF-419F-9B93-3CF669E986D1", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "E8026B11-6144-467F-8094-F4F73CD37526", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(4\\)f1:*:*:*:*:*:*:*", "matchCriteriaId": "17DE2319-19D9-4C02-80B4-0A6AAD853867", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "82BFEABB-6E90-4A24-BBE3-2BDB524028A0", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\)p:*:*:*:*:*:*:*", "matchCriteriaId": "F169E322-3D72-4F86-BD5F-74589E5DD823", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*", "matchCriteriaId": "047F9781-38B8-488C-B999-A3CA6BDB639C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*", "matchCriteriaId": "3E3586C0-64AF-4584-8F56-7E0756B4A521", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B784C9F-79EE-4D08-9D03-985EC7E378FE", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*", "matchCriteriaId": "FFBA8825-442E-4CAD-A9B2-4DD8546F35F9", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "F106D24F-7EDD-4A52-9A3A-F25E6EEC1870", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*", "matchCriteriaId": "0DC1411B-4E7E-4F57-B025-9FE27B09C7AC", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2A6F8329-15C7-4FED-A61D-5AF4F3A33976", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.3\\(1\\)ed:*:*:*:*:*:*:*", "matchCriteriaId": "CD13732A-DAE0-4D5B-9DAC-6D2CF391220D", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.3\\(1\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "A53DE80A-5865-4514-BE14-BA5992EE7BDA", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*", "matchCriteriaId": "655BB9C1-BA90-452E-A9C8-9B1E15B99650", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*", "matchCriteriaId": "53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*", "matchCriteriaId": "AE210B04-7ECD-419C-9258-0F619A353A8A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*", "matchCriteriaId": "3B467741-B277-4128-9804-E13ED23FD310", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*", "matchCriteriaId": "5E7EE856-9CE7-49FD-8ADC-05C580CD54A7", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "77DDC99D-8B73-452C-94A7-A9A48F2F379B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*", "matchCriteriaId": "5145C737-2D5E-4BD4-BA9F-66ED2887A4DB", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*", "matchCriteriaId": "C48466C4-5A1E-4C71-8822-32D387B36B8B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*", "matchCriteriaId": "08E23131-D207-4D98-96D5-2B71FF792604", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*", "matchCriteriaId": "1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*", "matchCriteriaId": "E7109585-1433-4940-B7C9-C561DEAF1498", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "1A0D82E1-CCF7-429B-A637-479E839EAE3C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "4F1B2747-4A9C-44FC-BBA8-39E338B30417", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5BB7513-C232-4B4F-BE68-972B05086ABD", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*", "matchCriteriaId": "EA263B60-E7C0-4374-96DF-6E4EB9C16743", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "ECCE69A3-41C6-4893-86D4-7F264352C8A9", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "FA654CE6-82C3-43D0-BAED-70E88A740BF1", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "387FCCC1-B05D-4493-9F05-BAC5A0E57F15", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "C4EB360F-7BAE-4BB5-BB55-E3FFC567A1E4", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", "matchCriteriaId": "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", "matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", "matchCriteriaId": "CA7F94E8-86FC-456B-A7BB-57953F67F754", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string."}], "id": "CVE-2000-0380", "lastModified": "2025-04-03T01:03:51.193", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2000-04-26T04:00:00.000", "references": [{"source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-04/0261.html"}, {"source": "cve@mitre.org", "url": "http://www.cisco.com/warp/public/707/ioshttpserver-pub.shtml"}, {"source": "cve@mitre.org", "url": "http://www.osvdb.org/1302"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/1154"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-04/0261.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cisco.com/warp/public/707/ioshttpserver-pub.shtml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/1302"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/1154"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}