Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-5528

EPSS 61.50% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-5528

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Unified Communications Manager 目录遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Unified Communications Manager(CUCM,Unified CM,CallManager)是美国思科(Cisco)公司的一款统一通信系统中的呼叫处理组件。该组件提供了一种可扩展、可分布和高可用的企业IP电话呼叫处理解决方案。 CUCM中的Tomcat服务器的管理Web界面中存在目录遍历漏洞,该漏洞源于程序没有正确过滤用户提交的输入。远程经过授权的攻击者可通过提供一系列目录遍历字符利用该漏洞读取任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-5528

#POC DescriptionSource LinkShenlong Link
1A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2013/CVE-2013-5528.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-5528

Please Login to view more intelligence information

Same Patch Batch · n/a · 2013-10-11 · 24 CVEs total

CVE-2013-6079MostGear Soft Easy LAN Folder Share 缓冲区溢出漏洞
CVE-2013-5533Cisco 9900 Unified IP电话image-upgrade功能命令注入漏洞
CVE-2013-5532Cisco 9900 IP电话Web应用程序接口缓冲区溢出漏洞
CVE-2013-5028Kwok Information Server SQL注入漏洞
CVE-2013-4306MediaWiki CheckUser扩展跨站请求伪造漏洞
CVE-2013-4305Mediawiki SyntaxHighlight GeSHi扩展跨站脚本漏洞
CVE-2013-3687Ovislink多款Airlive IP Cameras 备份文件信息泄露漏洞
CVE-2013-3686Airlive WL-2600CAM IP Camera 信息泄露漏洞
CVE-2013-2581TP-LINK TL-SC3171 IP Camera 远程安全绕过漏洞
CVE-2013-2580TP-LINK TL-SC3171 IP Camera 任意文件上传漏洞
CVE-2013-2579TP-LINK TL-SC3171 IP Camera 远程命令注入漏洞
CVE-2013-2578TP-LINK TL-SC3171 IP Cameras 多个远程命令注入漏洞
CVE-2007-6755Dual Elliptic Curve Deterministic Random Bit Generation 安全漏洞
CVE-2013-4388VideoLAN VLC Media Player 缓冲区溢出漏洞
CVE-2013-4377Qemu 释放后重用漏洞
CVE-2013-4319Adaptive TORQUE Resource Manager 提权漏洞
CVE-2013-4255Condor 多个远程拒绝服务漏洞
CVE-2013-4203Ruby 代码注入漏洞
CVE-2013-4173Xymon 目录遍历漏洞
CVE-2013-4167CMS Made Simple 跨站脚本漏洞

Showing top 20 of 24 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2013-5528

No comments yet


Leave a comment