Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-41877 | 7.2 HIGH | GeoServer log file path traversal vulnerability |
| CVE-2023-51444 | 7.2 HIGH | GeoServer arbitrary file upload vulnerability in REST Coverage Store API |
| CVE-2024-23634 | 6.0 MEDIUM | GeoServer arbitrary file renaming vulnerability in REST Coverage/Data Store API |
| CVE-2024-23640 | 4.8 MEDIUM | GeoServer Stored Cross-Site Scripting (XSS) vulnerability in Style Publisher |
| CVE-2024-23642 | 4.8 MEDIUM | GeoServer Stored Cross-Site Scripting (XSS) vulnerability in Simple SVG Renderer |
| CVE-2024-23643 | 4.8 MEDIUM | GeoServer Stored Cross-Site Scripting (XSS) vulnerability in GWC Seed Form |
| CVE-2024-23818 | 4.8 MEDIUM | GeoServer Stored Cross-Site Scripting (XSS) vulnerability in WMS OpenLayers Format |
| CVE-2024-23821 | 4.8 MEDIUM | GeoServer's GWC Demos Page vulnerable to Stored Cross-Site Scripting (XSS) |
| CVE-2024-23819 | 4.8 MEDIUM | GeoServer Stored Cross-Site Scripting (XSS) vulnerability in MapML HTML Page |
No comments yet