Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-3648

EPSS 51.68% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2015-3648

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Directory traversal vulnerability in pages/setup.php in Montala Limited ResourceSpace before 7.2.6727 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the defaultlanguage parameter.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Montala Limited ResourceSpace 目录遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Montala Limited ResourceSpace是英国Montala公司的一套开源的数字资产管理软件。该软件支持快速搜索资源、共享资源等。 Montala Limited ResourceSpace 7.2.6727之前版本的pages/setup.php脚本中存在目录遍历漏洞。远程攻击者可借助‘defaultlanguage’参数中的目录遍历字符‘..’利用该漏洞包含并执行任意本地文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2015-3648

#POC DescriptionSource LinkShenlong Link
1ResourceSpace is prone to a local file-inclusion vulnerability because it fails to sufficiently sanitize user-supplied input.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2015/CVE-2015-3648.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2015-3648

登录查看更多情报信息。

Same Patch Batch · n/a · 2015-06-09 · 26 CVEs total

CVE-2014-7872Comodo GeekBuddy 权限许可和访问控制漏洞
CVE-2015-4418ZOHO NetFlow Analyzer 安全漏洞
CVE-2015-2961ZOHO NetFlow Analyzer 跨站请求伪造漏洞
CVE-2015-2960ZOHO NetFlow Analyzer 跨站脚本漏洞
CVE-2015-2959ZOHO NetFlow Analyzer 安全漏洞
CVE-2014-9284多款Buffalo路由器安全漏洞
CVE-2015-4427Ektron Content Management System 跨站脚本漏洞
CVE-2015-4335Redis 安全漏洞
CVE-2015-4109WordPress Users Ultra插件SQL注入漏洞
CVE-2015-4080Kankun Smart Socket设备和移动应用程序加密问题漏洞
CVE-2015-4010WordPress Encrypted Contact Form插件跨站请求伪造漏洞
CVE-2015-3624Ektron Content Management System 跨站请求伪造漏洞
CVE-2015-3436Zarafa Collaboration Platform 后置链接漏洞
CVE-2015-2783PHP 安全漏洞
CVE-2015-3200Lighttpd mod_auth模块权限许可和访问控制问题漏洞
CVE-2015-4148PHP‘do_soap_call’函数输入验证漏洞
CVE-2015-4147PHP‘SoapClient's __call()’函数代码注入漏洞
CVE-2015-4026PHP pcntl_exec 安全漏洞
CVE-2015-4025PHP 权限许可和访问控制漏洞
CVE-2015-4024PHP‘multipart_buffer_headers’函数资源管理错误漏洞

Showing top 20 of 26 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2015-3648

No comments yet


Leave a comment