{"vulnerability": "CVE-2024-20356", "sightings": [{"uuid": "a5804e38-e3dc-4c85-95b9-e9cdc478fb85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20356", "type": "published-proof-of-concept", "source": "https://t.me/RedTeamFeed/273", "content": "CVE-2024-20356: Jailbreaking a Cisco appliance to run DOOM\n#nettitude\n\nThe Cisco C195 is a Cisco Email Security Appliance device. Its role is to act as an SMTP gateway on your network perimeter. This device (and the full range of appliance devices) is heavily locked down and prevents unauthorised code from running. Source: https://www.melbourneglobal.com.au/cisco-esa-c195-k9-esa-c195-email/ I recently took one of these apart in order [...]\n\nvia Nettitude Labs Blog (author: Aaron Thacker)", "creation_timestamp": "2024-04-18T14:55:08.000000Z"}, {"uuid": "d5cda04a-bbcc-4aa3-982e-bd7bb22a9eed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20356", "type": "published-proof-of-concept", "source": "https://t.me/cKure/12767", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 CVE-2024-20356: Jailbreaking a Cisco appliance to run DOOM.\n\nhttps://labs.nettitude.com/blog/cve-2024-20356-jailbreaking-a-cisco-appliance-to-run-doom/", "creation_timestamp": "2024-04-20T12:36:36.000000Z"}, {"uuid": "3725f594-cc6e-4f4d-92b1-d06e5c63381b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20356", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7342", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aA oxidized version of https://github.com/nettitude/CVE-2024-20356/blob/main/CVE-2024-20356.py\nURL\uff1ahttps://github.com/SherllyNeo/CVE_2024_20356\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-20T01:00:41.000000Z"}, {"uuid": "0f182ded-fb1c-4b2a-b725-b682b14d97f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20356", "type": "published-proof-of-concept", "source": "https://t.me/haj3imad/20800", "content": "https://github.com/nettitude/CVE-2024-20356\n\nThis is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.\n#github #exploit", "creation_timestamp": "2024-11-23T16:58:04.000000Z"}, {"uuid": "b93a4cc4-95c9-4c87-8124-1f4f83c25053", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20356", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2012", "content": "CVE-2024-20356\nJailbreaking a Cisco appliance to run DOOM\n*\n\u0421\u0430\u043c POC exploit\n*\n\u041d\u0443 \u043a\u0430\u043a \u0441\u0430\u043c DOOM \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u043b \u043d\u0430 \u0446\u0438\u0441\u043a\u0435 \u043f\u043e\u0434\u043e\u0434\u0435\u044f\u043b\u044c\u043d\u0438\u043a\u0435 \u043f\u043e\u0447\u0438\u0442\u0430\u0442\u044c \u0442\u0443\u0442\n\n#IDDQD #IDKFA", "creation_timestamp": "2024-04-22T10:03:51.000000Z"}, {"uuid": "4273cc3e-5f49-46be-93b4-f565b65909ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20356", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/684", "content": "#exploit\n1. CVE-2024-20356:\nhttps://github.com/nettitude/CVE-2024-20356\n\n2. \"Randar\" Minecraft Exploit:\nExplanation and Information\nhttps://github.com/spawnmason/randar-explanation\n\n3. CVE-2023-20198:\nCisco IOS XE\u00a0Privilege Escalation\nhttps://github.com/XiaomingX/CVE-2023-20198-poc", "creation_timestamp": "2024-12-31T06:28:27.000000Z"}, {"uuid": "9637e941-baba-4ee6-ac11-e6c931cb2d08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20356", "type": "published-proof-of-concept", "source": "Telegram/X1XGaX2zUJfZQX1mIckcJZ_9DGvp9ENiz4f48qr3xBA2ibI", "content": "", "creation_timestamp": "2024-06-05T05:24:55.000000Z"}, {"uuid": "337e1c14-8198-4aa7-9adf-15b06a9f370f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20356", "type": "published-proof-of-concept", "source": "https://t.me/ctftm/655", "content": "#exploit\n1. CVE-2024-20356:\nhttps://github.com/nettitude/CVE-2024-20356\n\n2. \"Randar\" Minecraft Exploit:\nExplanation and Information\nhttps://github.com/spawnmason/randar-explanation\n\n3. CVE-2023-20198:\nCisco IOS XE\u00a0Privilege Escalation\nhttps://github.com/XiaomingX/CVE-2023-20198-poc", "creation_timestamp": "2024-12-14T21:15:02.000000Z"}, {"uuid": "f84ad46b-2882-4ee7-bc45-553a51626ff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20356", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2349", "content": "https://labs.nettitude.com/blog/cve-2024-20356-jailbreaking-a-cisco-appliance-to-run-doom/\n\nCVE-2024-20356: Jailbreaking a Cisco appliance to run DOOM\n#\u5206\u6790 #poc", "creation_timestamp": "2024-04-20T02:10:24.000000Z"}, {"uuid": "e37c8ef5-571e-4fe4-975e-99fc698a7b91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20356", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2364", "content": "https://github.com/nettitude/CVE-2024-20356\n\nThis is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.\n#github #poc", "creation_timestamp": "2024-04-23T09:13:21.000000Z"}, {"uuid": "c997f6aa-09e1-419e-8281-e715f0f92459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20356", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11470", "content": "#exploit\n1. CVE-2024-20356:\nhttps://github.com/nettitude/CVE-2024-20356\n\n2. \"Randar\" Minecraft Exploit:\nExplanation and Information\nhttps://github.com/spawnmason/randar-explanation\n\n3. CVE-2023-20198:\nCisco IOS XE\u00a0Privilege Escalation\nhttps://github.com/XiaomingX/CVE-2023-20198-poc", "creation_timestamp": "2024-11-25T11:41:33.000000Z"}, {"uuid": "b2f6416c-2e5a-4503-ac00-727015fe07e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20356", "type": "seen", "source": "https://t.me/Rootsec_2/5231", "content": "#exploit\n1. CVE-2024-20356:\nhttps://github.com/nettitude/CVE-2024-20356\n\n2. \"Randar\" Minecraft Exploit:\nExplanation and Information\nhttps://github.com/spawnmason/randar-explanation\n\n3. CVE-2023-20198:\nCisco IOS XE\u00a0Privilege Escalation\nhttps://github.com/XiaomingX/CVE-2023-20198-poc", "creation_timestamp": "2024-11-24T05:25:14.000000Z"}]}