Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-15858

CVSS 6.2 · Medium EPSS 0.28% · P51
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-15858

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Some devices of Thales DIS (formerly Gemalto, formerly Cinterion) allow Directory Traversal by physically proximate attackers. The directory path access check of the internal flash file system can be circumvented. This flash file system can store application-specific data and data needed for customer Java applications, TLS and OTAP (Java over-the-air-provisioning) functionality. The affected products and releases are: BGS5 up to and including SW RN 02.000 / ARN 01.001.06 EHSx and PDSx up to and including SW RN 04.003 / ARN 01.000.04 ELS61 up to and including SW RN 02.002 / ARN 01.000.04 ELS81 up to and including SW RN 05.002 / ARN 01.000.04 PLS62 up to and including SW RN 02.000 / ARN 01.000.04
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Thales DIS 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Thales DIS是Thales Group的一个数字身份和安全解决方案。 Thales DIS 存在路径遍历漏洞,该漏洞允许攻击者进行目录遍历。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-15858

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-15858

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-08-21 · 48 CVEs total

CVE-2020-245899.1 CRITICALWSO2 API Manager 安全漏洞
CVE-2020-245909.1 CRITICALWSO2 API Manager 安全漏洞
CVE-2019-118579.1 CRITICALALEOS AceManager Information Disclosure
CVE-2020-77108.1 HIGHSandbox Escape
CVE-2019-118628.1 HIGHALEOS SSH Service Allows Traffic Proxying
CVE-2019-118558.1 HIGHALEOS LAN-Side RPC Server
CVE-2019-118477.3 HIGHALEOS User Root Shell Escalation
CVE-2020-245916.5 MEDIUMWSO2 多款产品代码问题漏洞
CVE-2019-118496.3 MEDIUMALEOS AT API Stack Overflow
CVE-2019-118506.3 MEDIUMALEOS AT Command Stack Overflow
CVE-2019-118596.0 MEDIUMALEOS SMS Handler Buffer Overflow
CVE-2019-118585.7 MEDIUMALEOS Multiple Web UI vulnerabilities
CVE-2019-118484.1 MEDIUMALEOS AT Command API Abuse
CVE-2019-118533.9 LOWALEOS AT Command Injections
CVE-2019-118523.7 LOWALEOS ACEView Service Out-Of-Bounds Read
CVE-2019-118563.3 LOWALEOS ACEView Message Replay
CVE-2020-24057Verint S5120FD Verint_FW_0_42操作系统命令注入漏洞
CVE-2020-5775Canvas LMS 代码问题漏洞
CVE-2020-3975VMware App Volumes 跨站脚本漏洞
CVE-2020-20633WordPress 跨站脚本漏洞

Showing top 20 of 48 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-15858

No comments yet


Leave a comment