关联漏洞
描述
Cisco ASA CVE-2018-0101 PoC script.
介绍
# About
Cisco ASA CVE-2018-0101 PoC script.
# [Description](https://github.com/MikeHorn-git/CVE-2018-0101#resources)
A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code.
# Installation
```bash
git clone https://github.com/MikeHorn-git/CVE-2018-0101.git
cd CVE-2018-0101/
python3 -m venv .venv
source .venv/bin/activate
pip install -r requirements.txt
```
# Usage
```bash
usage: CVE-2018-0101.py [-h] -u URL [-p PORT]
Cisco ASA CVE-2018-0101 PoC script.
options:
-h, --help show this help message and exit
-u URL, --url URL Target URL
-p PORT, --port PORT Port Number (default: 80 for http, 443 for https)
```
# Resources
* [ExploitDB](https://www.exploit-db.com/exploits/43986)
* [Nist](https://nvd.nist.gov/vuln/detail/CVE-2018-0101)
* [Pastebin](https://pastebin.com/YrBcG2Ln)
文件快照
[4.0K] /data/pocs/ca4743d359a2b94b936195b6ae59d1c790ab18ec
├── [1.8K] CVE-2018-0101.py
├── [1001] README.md
└── [ 88] requirements.txt
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。