Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| ServiceNow | Now Platform | 0 ~ Utah Patch 10 Hot Fix 3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-5217.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-4879 | 9.8 CRITICAL | Jelly Template Injection Vulnerability in ServiceNow UI Macros |
| CVE-2024-5178 | 4.9 MEDIUM | Incomplete Input Validation in SecurelyAccess API |
No comments yet