Browse all 8 CVE security advisories affecting XjSv. AI-powered Chinese analysis, POCs, and references for each vulnerability.
XjSv is a network monitoring tool primarily used for real-time traffic analysis and security event detection. Historically, it has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, accounting for its 8 recorded CVEs. The software's web interface has been particularly vulnerable to XSS attacks, while its service components have faced RCE risks through improper input validation. In 2022, a critical privilege escalation vulnerability allowed authenticated users to gain system-level access, prompting several high-severity advisories. Despite these issues, XjSv remains widely deployed due to its comprehensive logging capabilities and integration with existing security infrastructure.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-39310 | WordPress Basil Theme Authenticated (Contributor+) Persistent Cross-Site Scripting Vulnerability — BasilCWE-79 | 5.4 | Medium | 2024-07-01 |
This page lists every published CVE security advisory associated with XjSv. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.