Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2019-25087
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
RamseyK httpserver URI ResourceHost.cpp getResource path traversal
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability was found in RamseyK httpserver. It has been rated as critical. This issue affects the function ResourceHost::getResource of the file src/ResourceHost.cpp of the component URI Handler. The manipulation of the argument uri leads to path traversal: '../filedir'. The attack may be initiated remotely. The name of the patch is 1a0de56e4dafff9c2f9c8f6b130a764f7a50df52. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216863.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
路径遍历:’../filedir’
Source: NVD (National Vulnerability Database)
Vulnerability Title
RamseyK httpserver 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
RamseyK httpserver是作为学习工具使用的,由 C++ 编写的高性能、单线程、HTTP/1.1 服务器。 RamseyK httpserver存在安全漏洞,该漏洞源于对参数uri的错误操作导致路径遍历。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
RamseyKhttpserver n/a -
II. Public POCs for CVE-2019-25087
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2019-25087
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2019-25087

No comments yet


Leave a comment