Cisco UCS Manager version 2.2(1d) remote command execution exploit. An unspecified CGI script in Cisco FX-OS before 1.1.2 on Firepower 9000 devices and Cisco Unified Computing System (UCS) Manager before 2.2(4b), 2.2(5) before 2.2(5a), and 3.0 before 3.0(2e) allows remote attackers to execute arbitrary shell commands via a crafted HTTP request, aka Bug ID CSCur90888.
483ae8252192dee26cf8c9814dc78eb9
Cisco RV110W version 1.2.1.7 vpn_account denial of service proof of concept exploit.
22bfead549943dbe0007ce4ce4a7b6f5
Cisco ASA version 9.14.1.10 and FTD version 6.6.0.1 path traversal exploit. Original discovery of this vulnerability is attributed to 3ndG4me in October of 2020.
7cf23b4f5854a2f296a17705db8fae41
Cisco 7937G suffers from denial of service and privilege escalation vulnerabilities.
f210efc45d545be62045827b6fd91890
Cisco ASA and FTD version 9.6.4.42 suffer from a path traversal vulnerability.
48f25de33c55a08e792d3ab4713f7f58
The installer component of Cisco AnyConnect Secure Mobility Client for Windows prior to 4.8.02042 is vulnerable to path traversal and allows local attackers to create/overwrite files in arbitrary locations with system level privileges. The installer component of Cisco AnyConnect Secure Mobility Client for Windows prior to 4.9.00086 is vulnerable to a DLL hijacking and allows local attackers to execute code on the affected machine with with system level privileges. Both attacks consist in sending a specially crafted IPC request to the TCP port 62522 on the loopback device, which is exposed by the Cisco AnyConnect Secure Mobility Agent service.
6dab51a6758b6569e7dba4af74f482ed
Two denial of service exploits for Cisco 7937G versions SIP-1-4-5-7 and below.
5534c1f0e1f875aee45b3734baba6fdb
Cisco 7947G versions SIP-1-4-5-7 and below privilege escalation exploit.
50b203b494ce1d079936d6dbb4a3f309
This exploit is an all-in-one tool that leverages vulnerabilities described in CVE-2020-16139, CVE-2020-16138, and CVE-2020-16137 against Cisco 7937G devices versions SIP-1-4-5-7 and below.
9eb60ef20d0f3abf883446a0c58b2d27
THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
7a2f54980ce44aff0cc047fb75751dba
Cisco Adaptive Security Appliance Software version 9.7 unauthenticated arbitrary file deletion exploit.
2053bb9eac204ac9b709cb174adc0f1d
This Python script checks whether the target server is vulnerable to CVE-2020-3452, a vulnerability in Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) products that can allow for remote file disclosure.
ce6d90fc11286f40ae29b48e9bcc545d
The installer component of Cisco AnyConnect Secure Mobility Client for Windows prior to version 4.8.02042 is vulnerable to path traversal and allows local attackers to create/overwrite files in arbitrary locations with system level privileges. The attack consists in sending a specially crafted IPC request to the TCP port 62522 on the loopback device, which is exposed by the Cisco AnyConnect Secure Mobility Agent service. This service will then launch the vulnerable installer component (vpndownloader), which copies itself to an arbitrary location before being executed with system privileges. Since vpndownloader is also vulnerable to DLL hijacking, a specially crafted DLL (dbghelp.dll) is created at the same location vpndownloader will be copied to get code execution with system privileges. This exploit has been successfully tested against Cisco AnyConnect Secure Mobility Client versions 4.5.04029, 4.5.05030 and 4.7.04056 on Windows 10 version 1909 (x64) and Windows 7 SP1 (x86).
0ce466f922be78b19e5b1169c13ef711
This Metasploit module exploits an authentication bypass and directory traversals in Cisco UCS Director versions prior to 6.7.4.0 to leak the administrator's REST API key and execute a Cloupia script containing an arbitrary root command. Note that the primary functionality of this module is to leverage the Cloupia script interpreter to execute code. This functionality is part of the application's intended operation and considered a "foreverday." The authentication bypass and directory traversals only get us there. If you already have an API key, you may set it in the API_KEY option. The LEAK_FILE option may be set if you wish to leak the API key from a different absolute path, but normally this isn't advisable. Tested on Cisco's VMware distribution of 6.7.3.0.
a3283617421910d08a845659be600c53
Cisco Digital Network Architecture Center version 1.3.1.4 suffers from a persistent cross site scripting vulnerability.
feb8e9e65a6290bd7cb40a92790b9e16
Cisco AnyConnect Secure Mobility Client for Windows version 4.8.01090 suffer from a privilege escalation vulnerability due to insecure handling of path names.
e5a3959bc7c5608c73bf90960397d443
Cisco IP Phone version 11.7 denial of service proof of concept exploit.
9ae93c7c36b4741bda68dc135166ed33
Cisco Unified Contact Center Express suffers from a privilege escalation vulnerability.
614b86f032bbc9466892166a5a1742b9
Cisco Data Center Network Manager version 11.2.1 remote command injection exploit.
f78d9a450e8dddba0757fc613e10da7a
Cisco Data Center Network Manager version 11.2.1 suffers from a remote SQL injection vulnerability.
e52727f67ec73f54a1870891d9e11891
Cisco Data Center Network Manager version 11.2 remote code execution exploit.
ebfd0aee7d0a59ad770e679268463c0e
Armis has discovered five critical, zero-day vulnerabilities in various implementations of the Cisco Discovery Protocol (CDP) that can allow remote attackers to completely take over devices.
7757dbb411e6c03282748d0e682b3406
Debian Linux Security Advisory 4607-1 - Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP in openconnect, an open client for Cisco AnyConnect, Pulse and GlobalProtect VPN. A malicious HTTP server (after having accepted its identity certificate), can provide bogus chunk lengths for chunked HTTP encoding and cause a heap-based buffer overflow.
6cbb058b70a03ea1bda3ffe2cb05aeaa
Cisco DCNM JBoss version 10.4 suffers from a credential leakage vulnerability.
f2b2bc3ee27fbddf61de2d091386e2bd
Cisco WLC 2504 version 8.9 suffers from a denial of service vulnerability.
9215aa968b49d3b98e32f665f3d9a9ea