VAR-200005-0033
Vulnerability from variot - Updated: 2025-04-03 22:42The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command. This information is comprised of access lists among other things. The help system itself does not list these items as being available via the 'show' commands yet none the less it will execute them. The message which detailed this vulnerability to the Bugtraq mailing list is attached in the 'Credit' section of this vulnerability entry. It is suggested that you read it if this vulnerability affects your infrastructure
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200005-0033",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ios",
"scope": "eq",
"trust": 1.9,
"vendor": "cisco",
"version": "11.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "11.1\\(13\\)ia"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "11.1\\(15\\)ca"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "11.1\\(17\\)cc"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "11.1\\(13\\)ca"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "11.1\\(16\\)"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "11.1\\(13\\)"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "11.1\\(16\\)aa"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "11.1\\(16\\)ia"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "11.1\\(13\\)aa"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "9.14"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "12.0"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "11.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(2\\)xc"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.2\\(8\\)p"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.2\\(8\\)sa3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(4\\)t"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.2\\(9\\)xa"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(7\\)t"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(4\\)s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(4\\)"
},
{
"model": "router 2600",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0t"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.2\\(8\\)"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(1\\)w"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(1\\)xe"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(6\\)"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.2\\(17\\)"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.2\\(8\\)sa1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.2\\(9\\)p"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.2\\(10\\)"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(1\\)xa3"
},
{
"model": "router 7500",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(2\\)"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(2\\)xd"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(5\\)"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(1\\)xb"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0db"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(8\\)"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.2\\(10\\)bc"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(2\\)xg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.2\\(8\\)sa5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(9\\)s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(5\\)t1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(3\\)t2"
},
{
"model": "router 7200",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.2\\(4\\)f1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.2p"
},
{
"model": "router 2500",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "router 4000",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.0\\(2\\)xf"
},
{
"model": "router 3600",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.1\\(17\\)ct"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.7"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.6"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.5"
},
{
"model": "ios t",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.4"
},
{
"model": "ios s",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.4"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.4"
},
{
"model": "ios t2",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.3"
},
{
"model": "ios xg",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.2"
},
{
"model": "ios xf",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.2"
},
{
"model": "ios xd",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.2"
},
{
"model": "ios xc",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.1"
},
{
"model": "ios xb",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.1"
},
{
"model": "ios xa3",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.1"
},
{
"model": "ios w",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0.1"
},
{
"model": "ios bc",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.2.10"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.2.10"
},
{
"model": "ios xa",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.2.9"
},
{
"model": "ios p",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.2.9"
},
{
"model": "ios sa5",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.2.8"
},
{
"model": "ios sa3",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.2.8"
},
{
"model": "ios sa1",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.2.8"
},
{
"model": "ios p",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.2.8"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.2.8"
},
{
"model": "ios f1",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.2.4"
},
{
"model": "ios ct",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.1.17"
},
{
"model": "ios cc",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.1.17"
},
{
"model": "ios ia",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.1.16"
},
{
"model": "ios aa",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.1.16"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.1.16"
},
{
"model": "ios ca",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.1.15"
},
{
"model": "ios ia",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.1.13"
},
{
"model": "ios ca",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.1.13"
},
{
"model": "ios aa",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.1.13"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.1.13"
},
{
"model": "ios 12.0t",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.0s",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.0db",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.0 s",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.0(8)"
},
{
"model": "ios 12.0 t",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.0 t1",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 11.2p",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "11.2(17)"
},
{
"model": "hsrp",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7500.0"
},
{
"model": "hsrp",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7200.0"
},
{
"model": "hsrp",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4000.0"
},
{
"model": "hsrp",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3600.0"
},
{
"model": "hsrp",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2600.0"
},
{
"model": "hsrp",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2500.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7500"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7200"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4000"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3600"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2600"
},
{
"model": null,
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2500"
}
],
"sources": [
{
"db": "BID",
"id": "1161"
},
{
"db": "CNNVD",
"id": "CNNVD-200005-023"
},
{
"db": "NVD",
"id": "CVE-2000-0345"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "This bug was discovered and documented by Fernando Montenegro fsmontenegro@iname.com and Claudio Silotto (csilotto@hotmail.com). The message detailing this vulnerability was sent to the Bugtraq mailing list on 2 May 2000.",
"sources": [
{
"db": "BID",
"id": "1161"
},
{
"db": "CNNVD",
"id": "CNNVD-200005-023"
}
],
"trust": 0.9
},
"cve": "CVE-2000-0345",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2000-0345",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 1.0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-1924",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2000-0345",
"trust": 1.0,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-200005-023",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-1924",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-1924"
},
{
"db": "CNNVD",
"id": "CNNVD-200005-023"
},
{
"db": "NVD",
"id": "CVE-2000-0345"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The on-line help system options in Cisco routers allows non-privileged users without \"enabled\" access to obtain sensitive information via the show command. This information is comprised of access lists among other things. The help system itself does not list these items as being available via the \u0027show\u0027 commands yet none the less it will execute them. \nThe message which detailed this vulnerability to the Bugtraq mailing list is attached in the \u0027Credit\u0027 section of this vulnerability entry. It is suggested that you read it if this vulnerability affects your infrastructure",
"sources": [
{
"db": "NVD",
"id": "CVE-2000-0345"
},
{
"db": "BID",
"id": "1161"
},
{
"db": "VULHUB",
"id": "VHN-1924"
}
],
"trust": 1.26
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-1924",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-1924"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "1161",
"trust": 2.0
},
{
"db": "NVD",
"id": "CVE-2000-0345",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-200005-023",
"trust": 0.7
},
{
"db": "BUGTRAQ",
"id": "20000502 POSSIBLE ISSUE WITH CISCO ON-LINE HELP?",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-1924",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-1924"
},
{
"db": "BID",
"id": "1161"
},
{
"db": "CNNVD",
"id": "CNNVD-200005-023"
},
{
"db": "NVD",
"id": "CVE-2000-0345"
}
]
},
"id": "VAR-200005-0033",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-1924"
}
],
"trust": 0.50251988
},
"last_update_date": "2025-04-03T22:42:00.846000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2000-0345"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/1161"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000502222246.28423.qmail%40securityfocus.com"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000502222246.28423.qmail@securityfocus.com"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/warp/public/707/sec_incident_response.shtml"
},
{
"trust": 0.1,
"url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026amp;msg=20000502222246.28423.qmail@securityfocus.com"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-1924"
},
{
"db": "BID",
"id": "1161"
},
{
"db": "CNNVD",
"id": "CNNVD-200005-023"
},
{
"db": "NVD",
"id": "CVE-2000-0345"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-1924"
},
{
"db": "BID",
"id": "1161"
},
{
"db": "CNNVD",
"id": "CNNVD-200005-023"
},
{
"db": "NVD",
"id": "CVE-2000-0345"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2000-05-03T00:00:00",
"db": "VULHUB",
"id": "VHN-1924"
},
{
"date": "2000-05-03T00:00:00",
"db": "BID",
"id": "1161"
},
{
"date": "2000-05-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200005-023"
},
{
"date": "2000-05-03T04:00:00",
"db": "NVD",
"id": "CVE-2000-0345"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2008-09-10T00:00:00",
"db": "VULHUB",
"id": "VHN-1924"
},
{
"date": "2009-07-11T01:56:00",
"db": "BID",
"id": "1161"
},
{
"date": "2005-10-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200005-023"
},
{
"date": "2025-04-03T01:03:51.193000",
"db": "NVD",
"id": "CVE-2000-0345"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200005-023"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Router Online Help Vulnerability",
"sources": [
{
"db": "BID",
"id": "1161"
},
{
"db": "CNNVD",
"id": "CNNVD-200005-023"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "access verification error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200005-023"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…