{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T14:21:02.038","vulnerabilities":[{"cve":{"id":"CVE-2010-0584","sourceIdentifier":"psirt@cisco.com","published":"2010-03-25T21:00:00.907","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Cisco IOS 12.4, when NAT SCCP fragmentation support is enabled, allows remote attackers to cause a denial of service (device reload) via crafted Skinny Client Control Protocol (SCCP) packets, aka Bug ID CSCsy09250."},{"lang":"es","value":"Vulnerabilidad sin especificar en  Cisco IOS v12.4, cuando NAT SCCP fragmentation support está activado, permite a atacantes remotoso provocar una denegación de servicio (recarga de dispositivo) a través de paquetes Skinny Client Control Protocol (SCCP) manipulados. También conocido como Bug ID CSCsy09250."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4gc:*:*:*:*:*:*:*","matchCriteriaId":"89B19F2B-1D89-42FC-89A7-737D8109EB1B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*","matchCriteriaId":"A2222EED-6CB2-4D18-8AF5-FAE55BC6213F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4mda:*:*:*:*:*:*:*","matchCriteriaId":"237F6EDD-AB47-4768-9C75-C0B03E23696B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*","matchCriteriaId":"370DC543-AC01-4B91-88C7-60C323E35929"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*","matchCriteriaId":"BEAD7398-D1B2-47FB-952D-8C3162D5A363"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*","matchCriteriaId":"C1F36C3D-E9A2-41A1-BE71-4D8B00D228E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*","matchCriteriaId":"7D1CD80F-E898-41CE-8A86-28C2F48B928A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*","matchCriteriaId":"9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*","matchCriteriaId":"BF610051-1638-4C1B-9864-11E34EFC4DE6"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*","matchCriteriaId":"78260223-50C0-48F8-9A65-AE67489E602C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*","matchCriteriaId":"18E39462-4CEE-4C29-8B60-50E05FCF3E91"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*","matchCriteriaId":"3FF16123-CCA0-4ECD-9B8C-AC1534C3F244"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*","matchCriteriaId":"CC7454AF-7610-4CD3-BD2B-95A6C3283811"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*","matchCriteriaId":"AB633E6C-025C-4B31-ABE7-8318C813376B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*","matchCriteriaId":"CEA9218D-E7A5-4F98-83E7-2FD6E138D5CE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*","matchCriteriaId":"AC90BE87-EB54-46F8-A1FD-8F4E553C69F0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*","matchCriteriaId":"DFED1FFB-899D-4A48-9CCA-0B8737AE1408"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*","matchCriteriaId":"883FA166-2973-42BA-842D-28FBDBFEAC4A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*","matchCriteriaId":"4362045B-7065-4FF9-A977-B3DA7894F831"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*","matchCriteriaId":"BC27E79D-6B4B-4839-9664-DFE821C45C2E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*","matchCriteriaId":"4963A243-74FA-43AD-9645-C9FAD527A6E1"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*","matchCriteriaId":"31C6EACA-35BE-4032-93DA-5F738AEE0F4A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4yb:*:*:*:*:*:*:*","matchCriteriaId":"E67621EA-25D8-47C2-ADEA-512E38F2FFE3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4yd:*:*:*:*:*:*:*","matchCriteriaId":"94E1421B-2B86-41B2-9288-59780E081337"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4ye:*:*:*:*:*:*:*","matchCriteriaId":"51A5F5FF-6BC4-4A1E-B9F1-BD47096D30B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4yg:*:*:*:*:*:*:*","matchCriteriaId":"6D910556-9518-45C5-9891-1541760B0920"}]}]}],"references":[{"url":"http://osvdb.org/63187","source":"psirt@cisco.com"},{"url":"http://secunia.com/advisories/39062","source":"psirt@cisco.com"},{"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee6.shtml","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securitytracker.com/id?1023739","source":"psirt@cisco.com"},{"url":"http://www.vupen.com/english/advisories/2010/0708","source":"psirt@cisco.com"},{"url":"http://osvdb.org/63187","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/39062","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee6.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securitytracker.com/id?1023739","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2010/0708","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}