Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| xwiki | xwiki-platform | >= 5.0-rc-1, < 14.10.19 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-31465 | 10.0 CRITICAL | XWiki Platform: Remote code execution from account via SearchSuggestSourceSheet |
| CVE-2024-31981 | 10.0 CRITICAL | XWiki Platform: Privilege escalation (PR) from user registration through PDFClass |
| CVE-2024-31982 | 10.0 CRITICAL | XWiki Platform: Remote code execution as guest via DatabaseSearch |
| CVE-2024-31983 | 10.0 CRITICAL | XWiki Platform: Remote code execution from edit in multilingual wikis via translations |
| CVE-2024-31984 | 10.0 CRITICAL | XWiki Platform: Remote code execution through space title and Solr space facet |
| CVE-2024-31987 | 10.0 CRITICAL | XWiki Platform remote code execution from account via custom skins support |
| CVE-2024-31996 | 10.0 CRITICAL | XWiki Commons missing escaping of `{` in Velocity escapetool allows remote code execution |
| CVE-2024-31997 | 10.0 CRITICAL | XWiki Platform remote code execution from account through UIExtension parameters |
| CVE-2024-31988 | 9.7 CRITICAL | XWiki Platform CSRF remote code execution through the realtime HTML Converter API |
| CVE-2024-31986 | 9.1 CRITICAL | XWiki Platform CSRF remote code execution through scheduler job's document reference |
| CVE-2024-31985 | 5.4 MEDIUM | XWiki Platform CSRF in the job scheduler |
No comments yet