Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| xwiki | xwiki-platform | >= 3.1, < 14.10.19 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-31465 | 10.0 CRITICAL | XWiki Platform: Remote code execution from account via SearchSuggestSourceSheet |
| CVE-2024-31981 | 10.0 CRITICAL | XWiki Platform: Privilege escalation (PR) from user registration through PDFClass |
| CVE-2024-31982 | 10.0 CRITICAL | XWiki Platform: Remote code execution as guest via DatabaseSearch |
| CVE-2024-31983 | 10.0 CRITICAL | XWiki Platform: Remote code execution from edit in multilingual wikis via translations |
| CVE-2024-31984 | 10.0 CRITICAL | XWiki Platform: Remote code execution through space title and Solr space facet |
| CVE-2024-31987 | 10.0 CRITICAL | XWiki Platform remote code execution from account via custom skins support |
| CVE-2024-31996 | 10.0 CRITICAL | XWiki Commons missing escaping of `{` in Velocity escapetool allows remote code execution |
| CVE-2024-31997 | 10.0 CRITICAL | XWiki Platform remote code execution from account through UIExtension parameters |
| CVE-2024-31988 | 9.7 CRITICAL | XWiki Platform CSRF remote code execution through the realtime HTML Converter API |
| CVE-2024-31464 | 6.8 MEDIUM | XWiki Platform: Password hash might be leaked by diff once the xobject holding them is del |
| CVE-2024-31985 | 5.4 MEDIUM | XWiki Platform CSRF in the job scheduler |
No comments yet