Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | Cisco Adaptive Security Appliance unknown | Cisco Adaptive Security Appliance unknown | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Test CVE-2018-0296 and extract usernames | https://github.com/milo2012/CVE-2018-0296 | POC Details |
| 2 | Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information. | https://github.com/yassineaboukir/CVE-2018-0296 | POC Details |
| 3 | Cisco ASA - CVE-2018-0296 | Exploit | https://github.com/bhenner1/CVE-2018-0296 | POC Details |
| 4 | https://github.com/milo2012/CVE-2018-0296.git | https://github.com/qiantu88/CVE-2018-0296 | POC Details |
| 5 | Cisco ASA - Local File Inclusion | https://github.com/Cappricio-Securities/CVE-2018-0296 | POC Details |
| 6 | Cisco Adaptive Security Appliances (ASA) web interfaces could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software releases that the ASA will not reload, but an attacker could view sensitive system information without authentication by using directory traversal techniques. The vulnerability is due to lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition or unauthenticated disclosure of information. This vulnerability applies to IPv4 and IPv6 HTTP traffic. This vulnerability affects Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 1000V Cloud Firewall, ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCvi16029. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-0296.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2018-0336 | Cisco Prime Collaboration Provisioning 权限许可和访问控制漏洞 | |
| CVE-2018-12039 | joyplus-cms 安全漏洞 | |
| CVE-2018-12042 | Roxy Fileman 路径遍历漏洞 | |
| CVE-2018-12043 | Symphony 跨站脚本漏洞 | |
| CVE-2018-0149 | Cisco Integrated Management Controller Supervisor Software和UCS Director Software 跨站脚本漏洞 | |
| CVE-2018-0329 | Cisco Wide Area Application Services Software 信任管理问题漏洞 | |
| CVE-2018-0332 | Cisco Unified IP Phone软件资源管理错误漏洞 | |
| CVE-2018-0333 | Cisco FireSIGHT System Software 安全特征问题漏洞 | |
| CVE-2018-0334 | Cisco AnyConnect Network Access Manager和AnyConnect Secure Mobility Client 安全特征问题漏洞 | |
| CVE-2018-0335 | Cisco Prime Collaboration Provisioning 信息泄露漏洞 | |
| CVE-2018-12036 | OWASP Dependency-Check 路径遍历漏洞 | |
| CVE-2018-0338 | Cisco Unified Computing System Software 输入验证错误漏洞 | |
| CVE-2018-0339 | Cisco Identity Services Engine 跨站脚本漏洞 | |
| CVE-2018-0340 | Cisco Unified Communications Manager 跨站脚本漏洞 | |
| CVE-2018-0352 | Cisco Wide Area Application Services Software Disk Check Tool 权限许可和访问控制漏洞 | |
| CVE-2018-0354 | Cisco Unity Connection 跨站脚本漏洞 | |
| CVE-2018-0355 | Cisco Unified Communications Manager 输入验证错误漏洞 | |
| CVE-2018-0356 | Cisco WebEx 跨站脚本漏洞 | |
| CVE-2018-0357 | Cisco WebEx 跨站脚本漏洞 | |
| CVE-2018-0318 | Cisco Prime Collaboration Provisioning 信任管理漏洞 |
Showing top 20 of 39 CVEs. View all on vendor page → →
No comments yet