Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| xwiki | xwiki-platform | >= 13.6.0, < 13.7-rc-1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2022-23616 | 8.8 HIGH | Remote code execution in xwiki-platform |
| CVE-2022-23622 | 7.4 HIGH | Cross site scripting in registration template in xwiki-platform |
| CVE-2022-23620 | 6.8 MEDIUM | Path traversal in xwiki-platform-skin-skinx |
| CVE-2022-23617 | 6.5 MEDIUM | Missing authorization in xwiki-platform |
| CVE-2022-23615 | 5.4 MEDIUM | Partial authorization bypass on document save in xwiki-platform |
| CVE-2022-23619 | 5.3 MEDIUM | Information exposure in xwiki-platform |
| CVE-2022-23618 | 4.7 MEDIUM | Open Redirect in xwiki-platform |
No comments yet