Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| xwiki | xwiki-platform | >= 12.10, < 13.10.10 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-26055 | 10.0 CRITICAL | XWiki Commons may allow privilege escalation to programming rights via user's first name |
| CVE-2023-26471 | 10.0 CRITICAL | XWiki Platform users may execute anything with superadmin right through comments and async |
| CVE-2023-26472 | 10.0 CRITICAL | XWiki Platform vulnerable to privilege escalation via async macro and IconThemeSheet from |
| CVE-2023-26474 | 10.0 CRITICAL | XWiki Platform vulnerable to privilege escalation via properties with wiki syntax that are |
| CVE-2023-26475 | 10.0 CRITICAL | XWiki Platform vulnerable to Remote Code Execution in Annotations |
| CVE-2023-26477 | 10.0 CRITICAL | org.xwiki.platform:xwiki-platform-flamingo-theme-ui Eval Injection vulnerability |
| CVE-2023-26476 | 7.5 HIGH | Two XWiki Platform UIs Expose Sensitive Information to an Unauthorized Actor |
| CVE-2023-26478 | 6.6 MEDIUM | org.xwiki.platform:xwiki-platform-store-filesystem-oldcore has Exposed Dangerous Method or |
| CVE-2023-26473 | 6.5 MEDIUM | XWiki Platform allows unprivileged users to make arbitrary select queries using DatabaseLi |
| CVE-2023-26479 | 6.5 MEDIUM | org.xwiki.platform:xwiki-platform-rendering-parser vulnerable to Improper Handling of Exce |
| CVE-2023-26470 | 5.7 MEDIUM | In XWiki Platform, saving a document with a large object number leads to persistent OOM er |
| CVE-2023-26056 | 5.4 MEDIUM | XWiki Platform allows macro execution as any user without programming rights through the c |
No comments yet