{"uuid": "5f624c9b-918e-4781-8381-da954eb36b26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1653", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/268", "content": "#exploit\nCisco Vulns. (PoCs)\n\n1. CVE-2019-1653:\nA vulnerability in the web-based management interface of Cisco Small Business RV320/RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information\nhttps://github.com/shaheemirza/CiscoSpill \n\n2. CVE-2019-1759:\nA vulnerability in ACL functionality of the Gigabit Ethernet Management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to reach the configured IP addresses on the GE Management interface (Bolt-cms 3.6.10 Csrf -&gt; xss -&gt; rce)\nhttps://github.com/r3m0t3nu11/CVE-2019-1759-csrf-js-rce \n\n3. CVE-2019-1821:\nA vulnerability in the web-based management interface of Cisco Prime Infrastructure, Cisco EPN Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying OS\nhttps://github.com/k8gege/CiscoExploit", "creation_timestamp": "2021-10-26T20:35:01.000000Z"}