Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-11733

EPSS 0.30% · P54
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-11733

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered on Spirent TestCenter and Avalanche appliance admin interface firmware. An attacker, who already has access to an SSH restricted shell, can achieve root access via shell metacharacters. The attacker can then, for example, read sensitive files such as appliance admin configuration source code. This affects Spirent TestCenter and Avalanche products which chassis version <= 5.08. The SSH restricted shell is available with default credentials.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Spirent TestCenter 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Spirent TestCenter是Spirent公司的一个网络性能测试仪。 Spirent TestCenter和Avalanche中的管理界面存在注入漏洞。攻击者可利用该漏洞获取root访问权限,读取敏感文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-11733

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-11733

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-08-13 · 97 CVEs total

CVE-2020-8708Intel Server Board、Server System和Compute Module 授权问题漏洞
CVE-2020-8707Intel Server Board、Server System和Compute Module 缓冲区错误漏洞
CVE-2020-8721Intel Server Board、Server System和Compute Module 输入验证错误漏洞
CVE-2020-8718Intel Server Board、Server System和Compute Module 缓冲区错误漏洞
CVE-2020-8722Intel Server Board、Server System和Compute Module 安全漏洞
CVE-2020-8732Intel Server Board、Server System和Compute Module 缓冲区错误漏洞
CVE-2020-8709Intel Server Board、Server System和Compute Module 授权问题漏洞
CVE-2020-8723Intel Server Board、Server System和Compute Module 跨站脚本漏洞
CVE-2020-8712Intel Server Board、Server System和Compute Module 缓冲区错误漏洞
CVE-2020-8730Intel Server Board、Server System和Compute Module 缓冲区错误漏洞
CVE-2020-8731Intel Server Board、Server System和Compute Module 安全漏洞
CVE-2020-8733Intel Server Board M10JNP2SB 缓冲区错误漏洞
CVE-2020-8736Intel Computing Improvement Program 安全漏洞
CVE-2020-8742Intel NUCs 输入验证错误漏洞
CVE-2020-8743Intel Mailbox Interface 安全漏洞
CVE-2020-8763Intel RealSense D400 Series Universal 安全漏洞
CVE-2020-12287Intel Distribution of OpenVINO(TM) Toolkit 安全漏洞
CVE-2020-17538Artifex Software Ghostscript 缓冲区错误漏洞
CVE-2020-16310Artifex Software Ghostscript 数字错误漏洞
CVE-2020-16309Artifex Software Ghostscript 缓冲区错误漏洞

Showing top 20 of 97 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2020-11733

No comments yet


Leave a comment