Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-1683

EPSS 77.84% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-1683

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The bashMail function in cms/data/skins/techjunkie/fragments/contacts/functions.php in SkyBlueCanvas CMS before 1.1 r248-04, when the pid parameter is 4, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) name, (2) email, (3) subject, or (4) message parameter to index.php.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Iconify SkyBlueCanvas‘index.php’格式化字符串漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SkyBlueCanvas CMS是Iconify公司的一套轻量级Web内容管理系统。该系统使用XML存储数据,并提供主题、附加组件、问题报告等功能。 SkyBlueCanvas CMS 1.1 r248-03及之前的版本中的cms/data/skins/techjunkie/fragments/contacts/functions.php脚本中的‘bashMail’函数中存在安全漏洞,该漏洞源于index.php脚本中存在错误。当‘pid’参数设置为‘4’时,远程攻击者可借助(1)name、(2)ema
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-1683

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-1683

登录查看更多情报信息。

Same Patch Batch · n/a · 2014-01-29 · 23 CVEs total

CVE-2013-7318AlgoSec Firewall Analyzer 跨站脚本漏洞
CVE-2014-0810JustSystems Sanshiro 安全漏洞
CVE-2013-6931Cybozu Garoon API SQL注入漏洞
CVE-2013-6930Cybozu Garoon page-navigation SQL注入漏洞
CVE-2013-6749IBM Lotus Quickr qp2.cab文件缓冲区溢出漏洞
CVE-2013-6748IBM Lotus Quickr qp2.cab文件缓冲区溢出漏洞
CVE-2013-2974IBM Tivoli Application Dependency Discovery Manager 权限许可和访问控制漏洞
CVE-2014-1692OpenSSH‘hash_buffer’函数缓冲区错误漏洞
CVE-2014-0682Cisco WebEx Meetings Server 权限许可和访问控制漏洞
CVE-2014-0681Cisco ISE 跨站脚本漏洞
CVE-2014-0680Cisco ISE NAC Web Agent 跨站脚本漏洞
CVE-2012-6086Zabbix ‘cURL’ API加密问题漏洞
CVE-2013-6141op5 Monitor 安全漏洞
CVE-2013-5092AlgoSec Firewall Analyzer 跨站脚本漏洞
CVE-2013-5005Tripwire Enterprise 跨站脚本漏洞
CVE-2013-4898SocialEngine TimeLine插件权限许可和访问控制漏洞
CVE-2013-4889Spring Signage Xibo 跨站请求伪造漏洞
CVE-2013-4888Spring Signage Xibo ’layout‘参数跨站脚本漏洞
CVE-2013-4887Spring Signage Xibo ‘displayid’参数SQL注入漏洞
CVE-2013-4662CiviCRM SQL注入漏洞

Showing top 20 of 23 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2014-1683

No comments yet


Leave a comment