Restruct [lint]

patch-1
Dwi Siswanto 2021-03-11 22:48:48 +07:00
parent c3ce5be9c6
commit fac1e178a4
1 changed files with 2 additions and 2 deletions

View File

@ -4,10 +4,11 @@ info:
name: Cisco IOS 12.2(55)SE11 Remote Code Execution name: Cisco IOS 12.2(55)SE11 Remote Code Execution
author: dwisiswant0 author: dwisiswant0
severity: critical severity: critical
tags: cve,cve2017,cisco,rce,network
reference: | reference: |
- https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/ - https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
- https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md - https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md
description: RCE exploit code is available for Cisco Catalyst 2960 switch model. This exploit is firmware dependent.
tags: cve,cve2017,cisco,rce,network
network: network:
- inputs: - inputs:
@ -18,7 +19,6 @@ network:
host: host:
- "{{Hostname}}:23" - "{{Hostname}}:23"
read-size: 1024 read-size: 1024
matchers: matchers:
- type: word - type: word
words: words: