Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2008-5825
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The SmartPoster implementation on the Nokia 6131 Near Field Communication (NFC) phone with 05.12 firmware does not properly display the URI record when the Title record contains a certain combination of space, CR (aka \r), and . (dot) characters, which allows remote attackers to trick a user into loading an arbitrary URI via a crafted NDEF tag, as demonstrated by (1) an http: URI for a malicious web site, (2) a tel: URI for a premium-rate telephone number, and (3) an sms: URI that triggers purchase of a ringtone.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Nokia 6131手机多个欺骗及拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nokia 6131是一款常用的手机,运行的操作系统为Symbian 40。 Nokia 6131手机中负责解析和显示NDEF Smart Poster内容和纯URI标签的代码存在安全漏洞。NDEF Smart Poster与描述文本同时显示URI,在显示时将描述文本与URI连接到一起,如果描述文本已经用尽了可用空间的话就不会显示URI;此外描述文本中也可能包含有类似于URI的文本,因此用户可能受骗打开或激活非预期的URI。 如果记录负载长度字段包含有0xFFFFFFFF或0xFFFFFFFE的话,Nok
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2008-5825
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2008-5825
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2008-5825

No comments yet


Leave a comment