Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15745

EPSS 88.69% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-15745

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Argus Surveillance DVR 4.0.0.0 devices allow Unauthenticated Directory Traversal, leading to File Disclosure via a ..%2F in the WEBACCOUNT.CGI RESULTPAGE parameter.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Argus Surveillance DVR 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Argus Surveillance DVR是加拿大Argus Surveillance公司的一款硬盘录像机设备。 Argus Surveillance DVR 4.0.0.0版本中的WEBACCOUNT.CGI文件存在目录遍历漏洞。攻击者可借助‘RESULTPAGE’参数中的‘..%2F’利用该漏洞泄露文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2018-15745

#POC DescriptionSource LinkShenlong Link
1Argus Surveillance DVR 4.0.0.0 devices allow unauthenticated local file inclusion, leading to file disclosure via a ..%2F in the WEBACCOUNT.CGI RESULTPAGE parameter. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-15745.yamlPOC Details
2Nonehttps://github.com/Jasurbek-Masimov/CVE-2018-15745POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-15745

登录查看更多情报信息。

Same Patch Batch · n/a · 2018-08-30 · 31 CVEs total

CVE-2018-14901EPSON iPrint application for Android 安全漏洞
CVE-2018-16239damiCMS 安全漏洞
CVE-2018-16238damiCMS 安全漏洞
CVE-2018-16237damiCMS 路径遍历漏洞
CVE-2018-16236cPanel 跨站脚本漏洞
CVE-2018-16234MorningStar WhatWeb 跨站脚本漏洞
CVE-2018-16233MiniCMS 跨站脚本漏洞
CVE-2018-16231Michael Roth Software Personal FTP Server 安全漏洞
CVE-2018-15480多款myStrom WiFi产品安全漏洞
CVE-2018-15479多款myStrom WiFi产品安全漏洞
CVE-2018-15478多款myStrom WiFi产品安全漏洞
CVE-2018-15477myStrom WiFi Switch V1 安全漏洞
CVE-2018-15476多款myStrom WiFi产品安全漏洞
CVE-2018-14903EPSON WF-2750打印机安全漏洞
CVE-2018-14902EPSON iPrint application for Android 安全漏洞
CVE-2018-16056Wireshark Bluetooth Attribute Protocol解析器注入漏洞
CVE-2018-14900EPSON WF-2750打印机安全漏洞
CVE-2018-14899EPSON WF-2750打印机安全漏洞
CVE-2018-11720Xovis PC2、PC2R和PC3传感器路径遍历漏洞
CVE-2018-11719Xovis PC2、PC2R和PC3传感器安全漏洞

Showing top 20 of 31 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2018-15745

No comments yet


Leave a comment