Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-56898

EPSS 6.91% · P91
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-56898

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Broken access control vulnerability in Geovision GV-ASWeb with version v6.1.0.0 or less. This vulnerability allows low privilege users perform actions that they aren't authorized to, which can be leveraged to escalate privileges, create, modify or delete accounts.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Geovision GV-ASWeb 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Geovision GV-ASWeb是中国奇偶(Geovision)公司的一个基于 Web 的软件,用于远程访问和配置 GV-ASManager 的数据库。 Geovision GV-ASWeb 6.1.0.0及之前版本存在安全漏洞,该漏洞源于存在错误访问控制,允许未经授权的低级权限攻击者通过提供精心设计的 HTTP 请求来管理和创建新的用户帐户。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-56898

#POC DescriptionSource LinkShenlong Link
1CVE-2024-56898 - Broken access control vulnerability in GeoVision ASManager web application version v6.0.1.0 or less. https://github.com/DRAGOWN/CVE-2024-56898POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-56898

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-02-03 · 34 CVEs total

CVE-2025-09735.4 MEDIUMCmsEasy index.php backAll_action path traversal
CVE-2024-569465.3 MEDIUMTechnitium DNS Server 安全漏洞
CVE-2024-34896Nedis SmartLife 安全漏洞
CVE-2024-57097ClassCMS 安全漏洞
CVE-2024-57452ChestnutCMS 安全漏洞
CVE-2024-57450ChestnutCMS 安全漏洞
CVE-2024-57498ForestBlog 安全漏洞
CVE-2024-57451ChestnutCMS 安全漏洞
CVE-2024-44449Quorum onQ 安全漏洞
CVE-2024-57098Moss 安全漏洞
CVE-2024-34897Nedis SmartLife 安全漏洞
CVE-2024-56901Geovision GV-ASWeb 安全漏洞
CVE-2024-56902Geovision GV-ASWeb 安全漏洞
CVE-2024-56903Geovision GV-ASWeb 安全漏洞
CVE-2025-22918Polycom RealPresence Group 500 安全漏洞
CVE-2023-52164Digiever DS-2105 Pro 安全漏洞
CVE-2023-52163Digiever DS-2105 Pro 安全漏洞
CVE-2024-57099ClassCMS 安全漏洞
CVE-2025-22978ELADMIN 安全漏洞
CVE-2024-56921Open5GS 安全漏洞

Showing top 20 of 34 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-56898

No comments yet


Leave a comment