mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-09 23:27:33 +02:00
30 lines
1.5 KiB
Markdown
30 lines
1.5 KiB
Markdown
### [CVE-2016-1291](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1291)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Cisco Prime Infrastructure 1.2.0 through 2.2(2) and Cisco Evolved Programmable Network Manager (EPNM) 1.2 allow remote attackers to execute arbitrary code via crafted deserialized data in an HTTP POST request, aka Bug ID CSCuw03192.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-remcode
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
|
|
- https://github.com/AlexisRippin/java-deserialization-exploits
|
|
- https://github.com/BrittanyKuhn/javascript-tutorial
|
|
- https://github.com/Coalfire-Research/java-deserialization-exploits
|
|
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
|
|
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
|
|
- https://github.com/R0B1NL1N/Java_Deserialization_exploits
|
|
- https://github.com/R0B1NL1N/java-deserialization-exploits
|
|
- https://github.com/Shadowshusky/java-deserialization-exploits
|
|
- https://github.com/klausware/Java-Deserialization-Cheat-Sheet
|
|
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
|
- https://github.com/orgTestCodacy11KRepos110MB/repo-5832-java-deserialization-exploits
|
|
|