Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| The Wikimedia Foundation | Mediawiki - Confirm Account Extension | 1.39 ~ 1.43 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-32080 | Cross-origin data leak in mobilefrontend via lazy load images | |
| CVE-2025-32068 | Revoking authorization of OAuth2 consumer does not invalidate refresh tokens | |
| CVE-2025-32067 | i18n XSS vulnerability in message growthexperiments | |
| CVE-2025-32076 | Evil regex used to process user-provided data in VisualData | |
| CVE-2025-32077 | XSSes in Extension:SimpleCalendar | |
| CVE-2025-32075 | IP and user agent leaks in Extension:Tabs | |
| CVE-2025-32073 | System message XSS in HTMLTags | |
| CVE-2025-32070 | XSSes in AJAXPoll | |
| CVE-2025-32071 | Wikibase CommonsInlineImageFormatter: i18n XSS | |
| CVE-2025-32069 | Wikitext stored XSS on filepages due to dangerous WBMI serialization | |
| CVE-2025-32078 | XSSes and potential RCE in Special:VersionCompare | |
| CVE-2025-32079 | Saving the right content to MediaWiki:GrowthMentors.json can take down the site | |
| CVE-2025-32072 | HTML injection in feed output from i18n message |
No comments yet