First published: Wed May 03 2000(Updated: )
The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.0\(5\) | |
Cisco IOS | =12.0\(6\) | |
Cisco IOS | =12.0\(5\)t1 | |
Cisco IOS | =11.1\(15\)ca | |
Cisco IOS | =12.0\(1\)w | |
Cisco IOS | =11.1\(13\) | |
Cisco IOS | =11.1\(16\)aa | |
Cisco IOS | =11.1\(13\)ia | |
Cisco IOS | =12.0\(1\)xb | |
Cisco IOS | =12.0\(2\)xd | |
Cisco IOS | =12.0\(2\) | |
Cisco IOS | =11.2\(8\)sa3 | |
Cisco IOS | =12.0\(9\)s | |
Cisco IOS | =11.2\(8\)p | |
Cisco IOS | =12.0\(2\)xg | |
Cisco IOS | =11.1\(16\) | |
Cisco IOS | =11.1\(13\)ca | |
Cisco IOS | =12.0t | |
Cisco IOS | =12.0\(1\)xe | |
Cisco IOS | =11.2\(4\)f1 | |
Cisco IOS | =12.0\(7\)t | |
Cisco IOS | =11.2\(8\)sa1 | |
Cisco IOS | =11.2p | |
Cisco IOS | =12.0db | |
Cisco IOS | =12.0\(2\)xf | |
Cisco IOS | =11.2 | |
Cisco IOS | =11.1\(17\)cc | |
Cisco IOS | =12.0\(4\)t | |
Cisco IOS | =12.0\(4\) | |
Cisco IOS | =11.2\(8\) | |
Cisco IOS | =9.14 | |
Cisco IOS | =11.1\(17\)ct | |
Cisco IOS | =12.0\(1\)xa3 | |
Cisco IOS | =11.1\(13\)aa | |
Cisco IOS | =12.0\(2\)xc | |
Cisco IOS | =11.2\(8\)sa5 | |
Cisco IOS | =12.0\(8\) | |
Cisco IOS | =11.2\(9\)p | |
Cisco IOS | =12.0s | |
Cisco IOS | =11.2\(10\)bc | |
Cisco IOS | =12.0 | |
Cisco IOS | =11.2\(17\) | |
Cisco IOS | =11.1\(16\)ia | |
Cisco IOS | =11.1 | |
Cisco IOS | =12.0\(3\)t2 | |
Cisco IOS | =12.0\(4\)s | |
Cisco IOS | =11.2\(10\) | |
Cisco IOS | =11.2\(9\)xa | |
Cisco Router 2500 | ||
Cisco Router 3600 | ||
Cisco Router 7500 | ||
Cisco Router 4000 | ||
Cisco Router 2600 | ||
Cisco Router 7200 | ||
=9.14 | ||
=11.1 | ||
=11.1\(13\) | ||
=11.1\(13\)aa | ||
=11.1\(13\)ca | ||
=11.1\(13\)ia | ||
=11.1\(15\)ca | ||
=11.1\(16\) | ||
=11.1\(16\)aa | ||
=11.1\(16\)ia | ||
=11.1\(17\)cc | ||
=11.1\(17\)ct | ||
=11.2 | ||
=11.2\(4\)f1 | ||
=11.2\(8\) | ||
=11.2\(8\)p | ||
=11.2\(8\)sa1 | ||
=11.2\(8\)sa3 | ||
=11.2\(8\)sa5 | ||
=11.2\(9\)p | ||
=11.2\(9\)xa | ||
=11.2\(10\) | ||
=11.2\(10\)bc | ||
=11.2\(17\) | ||
=11.2p | ||
=12.0 | ||
=12.0\(1\)w | ||
=12.0\(1\)xa3 | ||
=12.0\(1\)xb | ||
=12.0\(1\)xe | ||
=12.0\(2\) | ||
=12.0\(2\)xc | ||
=12.0\(2\)xd | ||
=12.0\(2\)xf | ||
=12.0\(2\)xg | ||
=12.0\(3\)t2 | ||
=12.0\(4\) | ||
=12.0\(4\)s | ||
=12.0\(4\)t | ||
=12.0\(5\) | ||
=12.0\(5\)t1 | ||
=12.0\(6\) | ||
=12.0\(7\)t | ||
=12.0\(8\) | ||
=12.0\(9\)s | ||
=12.0db | ||
=12.0s | ||
=12.0t | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.