Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2014-9618

EPSS 68.17% · P99

Public Exploits 2

ExploitDB · 1 EDB-37933 [webapps]
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-9618

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Client Filter Admin portal in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and subsequently create arbitrary profiles via a showdeny action to the default URL.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Netsweeper 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Netsweeper是加拿大Netsweeper公司的一套Web内容过滤解决方案。Client Filter Admin portal是其中的一个过滤器管理程序。 Netsweeper 3.1.10之前的版本、4.0.9之前的4.0.x版本和4.1.2之前的4.1.x版本中的Client Filter Admin portal存在安全漏洞。远程攻击者可利用该漏洞绕过身份验证,创建任意的配置文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-9618

#POC DescriptionSource LinkShenlong Link
1The Client Filter Admin portal in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and subsequently create arbitrary profiles via a showdeny action to the default URL. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2014/CVE-2014-9618.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-9618

登录查看更多情报信息。

Same Patch Batch · n/a · 2017-09-19 · 41 CVEs total

CVE-2015-3432Pydio 跨站脚本漏洞
CVE-2014-9616Netsweeper 安全漏洞
CVE-2014-9619Netsweeper 安全漏洞
CVE-2015-0689Cisco Cloud Web Security connector引擎缓冲区错误漏洞
CVE-2015-1854389 Directory Server 访问控制错误漏洞
CVE-2015-1864Kallithea 跨站脚本漏洞
CVE-2015-3299WordPress Floating Social Bar插件跨站脚本漏洞
CVE-2015-3419vBulletin 安全漏洞
CVE-2015-3420Dovecot 安全漏洞
CVE-2015-3431Pydio 安全漏洞
CVE-2014-9611Netsweeper 安全漏洞
CVE-2015-3880phpBB 安全漏洞
CVE-2015-4089WordPress WP Fastest Cache插件跨站请求伪造漏洞
CVE-2017-10700QNAP NAS medialibrary组件安全漏洞
CVE-2017-14141Kaltura 安全漏洞
CVE-2017-14142Kaltura 跨站脚本漏洞
CVE-2017-14143Kaltura 安全漏洞
CVE-2017-14597AfterLogic WebMail AdminPanel 跨站脚本漏洞
CVE-2017-14600Pragyan CMS SQL注入漏洞
CVE-2017-14601Pragyan CMS SQL注入漏洞

Showing top 20 of 41 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2014-9618

No comments yet


Leave a comment