Show plain JSON{"id": "CVE-2001-1475", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2001-01-18T05:00:00.000", "references": [{"url": "http://www.kb.cert.org/vuls/id/665372", "tags": ["Patch", "US Government Resource"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6490", "source": "cve@mitre.org"}, {"url": "http://www.kb.cert.org/vuls/id/665372", "tags": ["Patch", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6490", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "SSH before 2.0, when using RC4 and password authentication, allows remote attackers to replay messages until a new server key (VK) is generated."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE"}, {"criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E"}, {"criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944"}, {"criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3"}, {"criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8"}, {"criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA"}, {"criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40"}, {"criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}