Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-39031

EPSS 6.74% · P91
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-39031

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Silverpeas Core <= 6.3.5, in Mes Agendas, a user can create new events and add them to their calendar. Additionally, users can invite others from the same domain, including administrators, to these events. A standard user can inject an XSS payload into the "Titre" and "Description" fields when creating an event and then add the administrator or any user to the event. When the invited user (victim) views their own profile, the payload will be executed on their side, even if they do not click on the event.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Silverpeas 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Silverpeas是一套开源的业务协作平台。该平台包括项目管理、博客、论坛和文档管理等应用程序。 Silverpeas 6.3.5及之前版本存在安全漏洞,该漏洞源于容易受到存储型跨站脚本攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-39031

#POC DescriptionSource LinkShenlong Link
1Stored Cross-Side Scripting (XSS) leads to privilege escalation in SilverPeas social-networking portalhttps://github.com/toneemarqus/CVE-2024-39031POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-39031

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-07-09 · 60 CVEs total

CVE-2023-508068.4 HIGHSAMSUNG Mobile Processor和Wearable Processor 安全漏洞
CVE-2023-508058.1 HIGHSAMSUNG Mobile Processor和Wearable Processor安全漏洞
CVE-2023-508078.1 HIGHSAMSUNG Wearable Processor 安全漏洞
CVE-2024-291538.1 HIGHSAMSUNG Mobile Processor、Wearable Processor和Modems 安全漏洞
CVE-2024-273856.7 MEDIUMSAMSUNG Mobile Processor 安全漏洞
CVE-2024-273866.7 MEDIUMSAMSUNG Mobile Processor 安全漏洞
CVE-2024-319576.2 MEDIUMSAMSUNG Mobile Processor 安全漏洞
CVE-2024-273636.0 MEDIUMSAMSUNG Mobile Processor 安全漏洞
CVE-2024-273606.0 MEDIUMSAMSUNG Mobile Processor 安全漏洞
CVE-2024-391185.5 MEDIUMAdvanced Backups 安全漏洞
CVE-2024-280685.3 MEDIUMSAMSUNG Mobile Processor、Wearable Processor和Modems 安全漏洞
CVE-2024-280675.3 MEDIUMSAMSUNG Exynos Modem 5300 安全漏洞
CVE-2024-273615.1 MEDIUMSAMSUNG Mobile Processor 安全漏洞
CVE-2024-273624.4 MEDIUMSAMSUNG Mobile Processor 安全漏洞
CVE-2024-40038idcCMS 安全漏洞
CVE-2024-40034idcCMS 安全漏洞
CVE-2024-40741NetBox 安全漏洞
CVE-2024-40735NetBox 安全漏洞
CVE-2024-40733NetBox 安全漏洞
CVE-2024-40742NetBox 安全漏洞

Showing top 20 of 60 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-39031

No comments yet


Leave a comment