var-200110-0073
Vulnerability from variot

Various Intrusion Detection Systems (IDS) including (1) Cisco Secure Intrusion Detection System, (2) Cisco Catalyst 6000 Intrusion Detection System Module, (3) Dragon Sensor 4.x, (4) Snort before 1.8.1, (5) ISS RealSecure Network Sensor 5.x and 6.x before XPU 3.2, and (6) ISS RealSecure Server Sensor 5.5 and 6.0 for Windows, allow remote attackers to evade detection of HTTP attacks via non-standard "%u" Unicode encoding of ASCII characters in the requested URL. Multiple intrusion detection systems may be circumvented via %u encoding allowing intruders to launch attacks undetected. The Microsoft IIS web server supports a non-standard method of encoding web requests. If there is no webserver support for this encoding method or if it is disabled, there will be no targets to which encoded attacks can be sent. NOTE: Only RealSecure, Dragon and Snort are confirmed vulnerable. It is highly likely that IDS systems from other vendors are vulnerable as well, however we have not recieved confirmation. This record will be updated as more information becomes available regarding affected technologies. BlackICE products detect '%u' encoded requests as being invalid, but do not decode them and detect encoded attack signatures

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200110-0073",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iss",
        "version": "5.x"
      },
      {
        "model": "dragon",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "enterasys",
        "version": "4.x"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "5.5"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.0"
      },
      {
        "model": "snort",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "snort",
        "version": "1.8.1"
      },
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.x"
      },
      {
        "model": "secure intrusion detection system",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": "catalyst 6000 intrusion detection system module",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "*"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "enterasys",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "internet security",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the snort",
        "version": null
      },
      {
        "model": "project snort",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snort",
        "version": "1.8"
      },
      {
        "model": "project snort",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snort",
        "version": "1.7"
      },
      {
        "model": "project snort",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snort",
        "version": "1.6.3"
      },
      {
        "model": "project snort",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snort",
        "version": "1.6.2"
      },
      {
        "model": "project snort",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snort",
        "version": "1.6.1"
      },
      {
        "model": "project snort",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snort",
        "version": "1.6"
      },
      {
        "model": "project snort",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snort",
        "version": "1.5.2"
      },
      {
        "model": "project snort",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snort",
        "version": "1.5.1"
      },
      {
        "model": "project snort",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "snort",
        "version": "1.5"
      },
      {
        "model": "network intrusion detection",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "nfr",
        "version": "5.0"
      },
      {
        "model": "security systems realsecure server sensor win",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.0"
      },
      {
        "model": "security systems realsecure server sensor win",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "5.5.2"
      },
      {
        "model": "security systems realsecure server sensor win",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "5.5.1"
      },
      {
        "model": "security systems realsecure server sensor win",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "5.5"
      },
      {
        "model": "security systems realsecure server sensor win",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "5.0"
      },
      {
        "model": "security systems realsecure network sensor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.0"
      },
      {
        "model": "security systems realsecure network sensor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "5.5.2"
      },
      {
        "model": "security systems realsecure network sensor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "5.5.1"
      },
      {
        "model": "security systems realsecure network sensor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "5.5"
      },
      {
        "model": "security systems realsecure network sensor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "5.0"
      },
      {
        "model": "dragon ids",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "enterasys",
        "version": "4.0"
      },
      {
        "model": "secure ids network sensor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      },
      {
        "model": "secure ids host sensor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "catalyst ids module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "6000"
      },
      {
        "model": "project snort",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "snort",
        "version": "1.8.1"
      },
      {
        "model": "security systems realsecure server sensor win",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.0.1"
      },
      {
        "model": "dragon ids",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "enterasys",
        "version": "5.0"
      },
      {
        "model": "associates etrust intrusion detection",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.5"
      },
      {
        "model": "associates etrust intrusion detection",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "computer",
        "version": "1.4.5"
      },
      {
        "model": "secure ids network sensor s6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "3.0"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#548515"
      },
      {
        "db": "BID",
        "id": "3292"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200110-136"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cisco:secure_intrusion_detection_system:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:iss:realsecure_network_sensor:5.x:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:iss:realsecure_network_sensor:6.x:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:iss:realsecure_server_sensor:5.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:iss:realsecure_server_sensor:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:snort:snort:1.8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:catalyst_6000_intrusion_detection_system_module:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:enterasys:dragon:4.x:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-0669"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Credited to \u0027hsj\u0027 as being used in proof of concept code for an unrelated vulnerability.\n\nFurther research conducted by eEye Digital Security.",
    "sources": [
      {
        "db": "BID",
        "id": "3292"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200110-136"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2001-0669",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-3478",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2001-0669",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#548515",
            "trust": 0.8,
            "value": "13.13"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200110-136",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-3478",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#548515"
      },
      {
        "db": "VULHUB",
        "id": "VHN-3478"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200110-136"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Various Intrusion Detection Systems (IDS) including (1) Cisco Secure Intrusion Detection System, (2) Cisco Catalyst 6000 Intrusion Detection System Module, (3) Dragon Sensor 4.x, (4) Snort before 1.8.1, (5) ISS RealSecure Network Sensor 5.x and 6.x before XPU 3.2, and (6) ISS RealSecure Server Sensor 5.5 and 6.0 for Windows, allow remote attackers to evade detection of HTTP attacks via non-standard \"%u\" Unicode encoding of ASCII characters in the requested URL. Multiple intrusion detection systems may be circumvented via %u encoding allowing intruders to launch attacks undetected. The Microsoft IIS web server supports a non-standard method of encoding web requests.  If there is no webserver support for this encoding method or if it is disabled, there will be no targets to which encoded attacks can be sent. \n**NOTE**: Only RealSecure, Dragon and Snort are confirmed vulnerable.  It is highly likely that IDS systems from other vendors are vulnerable as well, however we have not recieved confirmation.  This record will be updated as more information becomes available regarding affected technologies. \nBlackICE products detect \u0027%u\u0027 encoded requests as being invalid, but do not decode them and detect encoded attack signatures",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-0669"
      },
      {
        "db": "CERT/CC",
        "id": "VU#548515"
      },
      {
        "db": "BID",
        "id": "3292"
      },
      {
        "db": "VULHUB",
        "id": "VHN-3478"
      }
    ],
    "trust": 1.98
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-3478",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-3478"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "3292",
        "trust": 2.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#548515",
        "trust": 2.5
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0669",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200110-136",
        "trust": 0.7
      },
      {
        "db": "CISCO",
        "id": "20010905 CISCO SECURE INTRUSION DETECTION SYSTEM SIGNATURE OBFUSCATION VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "ISS",
        "id": "20010905 MULTIPLE VENDOR IDS UNICODE BYPASS VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20010905 %U ENCODING IDS BYPASS VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-74940",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "21100",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-3478",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#548515"
      },
      {
        "db": "VULHUB",
        "id": "VHN-3478"
      },
      {
        "db": "BID",
        "id": "3292"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200110-136"
      }
    ]
  },
  "id": "VAR-200110-0073",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-3478"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:53:57.096000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2001-0669"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://www.cisco.com/warp/public/707/cisco-intrusion-detection-obfuscation-vuln-pub.shtml"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/3292"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/548515"
      },
      {
        "trust": 1.7,
        "url": "http://xforce.iss.net/alerts/advise95.php"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=99972950200602\u0026w=2"
      },
      {
        "trust": 0.8,
        "url": "http://www.eeye.com/html/research/advisories/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.iss.net/db_data/xpu/rs.php"
      },
      {
        "trust": 0.8,
        "url": "http://www.iss.net/eval/eval.php"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=99972950200602\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://www.enterasys.com/ids/"
      },
      {
        "trust": 0.3,
        "url": "http://www.eeye.com"
      },
      {
        "trust": 0.3,
        "url": "http://www.iss.net/securing_e-business/security_products/intrusion_detection/"
      },
      {
        "trust": 0.3,
        "url": "http://www.nfr.com/products/nid/"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/index.shtml"
      },
      {
        "trust": 0.3,
        "url": "http://www.snort.org"
      },
      {
        "trust": 0.3,
        "url": "http://www.iss.net/xforce"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=99972950200602\u0026amp;w=2"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#548515"
      },
      {
        "db": "VULHUB",
        "id": "VHN-3478"
      },
      {
        "db": "BID",
        "id": "3292"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200110-136"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#548515"
      },
      {
        "db": "VULHUB",
        "id": "VHN-3478"
      },
      {
        "db": "BID",
        "id": "3292"
      },
      {
        "db": "NVD",
        "id": "CVE-2001-0669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200110-136"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2001-09-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#548515"
      },
      {
        "date": "2001-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-3478"
      },
      {
        "date": "2001-09-05T00:00:00",
        "db": "BID",
        "id": "3292"
      },
      {
        "date": "2001-10-30T05:00:00",
        "db": "NVD",
        "id": "CVE-2001-0669"
      },
      {
        "date": "2001-10-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200110-136"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-10-30T00:00:00",
        "db": "CERT/CC",
        "id": "VU#548515"
      },
      {
        "date": "2016-10-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-3478"
      },
      {
        "date": "2001-09-05T00:00:00",
        "db": "BID",
        "id": "3292"
      },
      {
        "date": "2016-10-18T02:11:41.187000",
        "db": "NVD",
        "id": "CVE-2001-0669"
      },
      {
        "date": "2006-08-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200110-136"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200110-136"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple intrusion detection systems may be circumvented via %u encoding",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#548515"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "wrong environmental conditions",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200110-136"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.