尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Cisco | Cisco Secure Email | 14.0.0-698 | - | |
| Cisco | Cisco Secure Email and Web Manager | 13.6.2-023 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | This scanner detects Cisco SEG/SEWM appliances vulnerable to CVE-2025-20393, a critical unauthenticated RCE vulnerability in Cisco AsyncOS affecting devices with Spam Quarantine feature exposed to the internet. CVSS Score: 10.0 (Critical) | https://github.com/thesystemowner/CVE-2025-20393-POC | POC详情 |
| 2 | Cisco is aware of a potential vulnerability. Cisco is currently investigating and will update these details as appropriate as more information becomes available. | https://github.com/cyberleelawat/CVE-2025-20393 | POC详情 |
| 3 | None | https://github.com/KingHacker353/CVE-2025-20393 | POC详情 |
| 4 | None | https://github.com/b1gchoi/CVE-2025-20393 | POC详情 |
| 5 | Script to detect CVE-2025-20393 for Cisco Secure Email Gateway And Cisco Secure Email and Web Manager | https://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4 | POC详情 |
| 6 | CVE-2025-20393 | https://github.com/Ashwesker/Blackash-CVE-2025-20393 | POC详情 |
| 7 | CVE-2025-20393 | https://github.com/Ashwesker/Ashwesker-CVE-2025-20393 | POC详情 |
| 8 | 🔍 Probe hosts for open Cisco Secure Email/Malware Analytics ports and CVE-2025-20393 exposure using a simple Python script. | https://github.com/MRH701/mrh701.github.io | POC详情 |
| 9 | This tool helps identify exposure to CVE-2025-20393 by checking for open TCP/6025 ports, responsive Spam Quarantine interfaces, and known post-exploitation IOCs. | https://github.com/cyberdudebivash/CYBERDUDEBIVASH-Cisco-AsyncOS-CVE-2025-20393-Scanner | POC详情 |
| 10 | CVE-2025-20393 | https://github.com/redpack-kr/Blackash-CVE-2025-20393 | POC详情 |
未找到公开 POC。
登录以生成 AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.