Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Atlassian | Confluence Data Center | 8.9.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on a vulnerable Confluence server. The vulnerability exists due to an improper validation of user-supplied input in the Confluence REST API. This allows an attacker to inject malicious code into the Confluence server, which can then be executed by the server | https://github.com/r00t7oo2jm/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server | POC Details |
| 2 | CVE-2024-21683 Confluence Post Auth RCE | https://github.com/W01fh4cker/CVE-2024-21683-RCE | POC Details |
| 3 | This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the server. | https://github.com/absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server | POC Details |
| 4 | None | https://github.com/phucrio/CVE-2024-21683-RCE | POC Details |
| 5 | None | https://github.com/xh4vm/CVE-2024-21683 | POC Details |
| 6 | CVE-2024-21683 Confluence Post Auth RCE | https://github.com/XiaomingX/cve-2024-21683-rce | POC Details |
| 7 | Detects a Remote Code Execution vulnerability in Confluence Data Center and Server versions prior to X.X (affected versions). This issue allows authenticated attackers to execute arbitrary code. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-21683.yaml | POC Details |
| 8 | CVE-2024-21683 Confluence Post Auth RCE | https://github.com/r3db34rdh4x/cve-2024-21683-rce | POC Details |
No public POC found.
Login to generate AI POCNo comments yet