Browse all 3 CVE security advisories affecting WillyXJ. AI-powered Chinese analysis, POCs, and references for each vulnerability.
WillyXJ primarily targets web applications and APIs, with a core focus on exploiting authentication and session management flaws. Historically, this actor has demonstrated a preference for remote code execution (RCE) and cross-site scripting (XSS) vulnerabilities, often chaining multiple weaknesses to achieve privilege escalation. WillyXJ's activities typically involve automated scanning tools combined with manual exploitation techniques. While no major public incidents have been directly attributed to WillyXJ, their consistent pattern of targeting common vulnerabilities suggests an opportunistic approach rather than sophisticated advanced persistent threat tactics. The three CVEs associated with this actor highlight a preference for widely deployed software with known but unpatched flaws.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-24573 | facileManager Privilege Escalation via Mass Assignment — facileManagerCWE-863 | 8.8 | High | 2024-01-31 |
| CVE-2024-24572 | facileManager Authenticated Variable Manipulation leading to SQL Injection — facileManagerCWE-89 | 6.5 | Medium | 2024-01-31 |
| CVE-2024-24571 | facileManager Systemic Cross-Site Scripting (XSS) — facileManagerCWE-80 | 5.4 | Medium | 2024-01-31 |
This page lists every published CVE security advisory associated with WillyXJ. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.