Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-56903

EPSS 0.35% · P57
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-56903

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Geovision GV-ASWeb with the version 6.1.1.0 or less allows attackers to modify POST request method with the GET against critical functionalities, such as account management. This vulnerability is used in chain with CVE-2024-56901 for a successful CSRF attack.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Geovision GV-ASWeb 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Geovision GV-ASWeb是中国奇偶(Geovision)公司的一个基于 Web 的软件,用于远程访问和配置 GV-ASManager 的数据库。 Geovision GV-ASWeb 6.1.1.0及之前版本存在安全漏洞,该漏洞源于存在跨站请求伪造 (CSRF) ,允许攻击者通过提供精心设计的 HTTP 请求执行任意操作。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-56903

#POC DescriptionSource LinkShenlong Link
1CVE-2024-56903 - Geovision GV-ASManager web application with the version 6.1.1.0 or less allows attackers to modify POST requests with GET in critical functionalities, such as account management. This vulnerability is used in chain with CVE-2024-56901 for a successful CSRF attack.https://github.com/DRAGOWN/CVE-2024-56903POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-56903

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-02-03 · 34 CVEs total

CVE-2025-09735.4 MEDIUMCmsEasy index.php backAll_action path traversal
CVE-2024-569465.3 MEDIUMTechnitium DNS Server 安全漏洞
CVE-2024-34896Nedis SmartLife 安全漏洞
CVE-2024-57097ClassCMS 安全漏洞
CVE-2024-57452ChestnutCMS 安全漏洞
CVE-2024-57450ChestnutCMS 安全漏洞
CVE-2024-57498ForestBlog 安全漏洞
CVE-2024-57451ChestnutCMS 安全漏洞
CVE-2024-44449Quorum onQ 安全漏洞
CVE-2024-57098Moss 安全漏洞
CVE-2024-34897Nedis SmartLife 安全漏洞
CVE-2024-56898Geovision GV-ASWeb 安全漏洞
CVE-2024-56901Geovision GV-ASWeb 安全漏洞
CVE-2024-56902Geovision GV-ASWeb 安全漏洞
CVE-2025-22918Polycom RealPresence Group 500 安全漏洞
CVE-2023-52164Digiever DS-2105 Pro 安全漏洞
CVE-2023-52163Digiever DS-2105 Pro 安全漏洞
CVE-2024-57099ClassCMS 安全漏洞
CVE-2025-22978ELADMIN 安全漏洞
CVE-2024-56921Open5GS 安全漏洞

Showing top 20 of 34 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-56903

No comments yet


Leave a comment