Abstract This specification describes a method for locating host metadata as well as information about individual resources controlled by the host.
Status of This Memo This is an Internet Standards Track document.
CVE IDs CVEnew Twitter Feed Other Updates & Feeds Request a CVE ID Contact a CVE Numbering Authority (CNA) Contact Primary CNA (MITRE) – CVE Request web form Reservation Guidelines CVE LIST (all existing CVE IDs) Downloads Search CVE List Search Tips View Entire CVE List (html) Reference Key/Maps NVD Advanced CVE Search CVE ID Scoring Calculator CVE Numbering Authorities Participating CNAs Documentation for CNAs Requesting CVE IDs from CNAs Become a CNA The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN. CVE and the CVE logo are registered trademarks and CVE-Compatible is a trademark of The MITRE Corporation.
Disclaimer: The entry creation date may reflect when the CVE-ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
This document is a product of the Internet Engineering Task Force (IETF). It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG).
Attempt to publish Actual results: Content Views cannot contain multiple Kickstart trees with the same version and architecture.
Attention Linux users: Please read specific information in the FAQs for Linux operating systems.
Attention Windows 10 users: Please read specific information in the FAQs for Windows 10 operating systems.
JRD Document Format ...................................12 Appendix B. Acknowledgments .......................................15 Normative References ..............................................15 Web-based protocols often require the discovery of host policy or metadata, where "host" is not a single resource but the entity controlling the collection of resources identified by Uniform Resource Identifiers (URIs) with a common URI host [RFC3986], which can be served by one or more servers.
While web protocols have a wide range of metadata needs, they often use metadata that is concise, has simple syntax requirements, and can benefit from storing their metadata in a common location used by other related protocols.