Browse all 3 CVE security advisories affecting 4ra1n. AI-powered Chinese analysis, POCs, and references for each vulnerability.
4ra1n is a penetration testing tool primarily used for identifying and exploiting vulnerabilities in web applications and network systems. Historically, it has been associated with Remote Code Execution (RCE), Cross-Site Scripting (XSS), and privilege escalation vulnerabilities. The tool has been documented in three CVEs, highlighting its potential for identifying critical security flaws. While no major public incidents have been directly attributed to 4ra1n, its capabilities make it valuable for both security researchers and malicious actors seeking to identify weaknesses in systems. The tool's effectiveness lies in its ability to automate complex exploitation techniques, making it a significant concern for organizations with inadequate security controls.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-41958 | Deserialization Vulnerability by yaml config input in super-xray — super-xrayCWE-502 | 7.3 | High | 2022-11-25 |
| CVE-2022-41950 | Privilege Escalation Vulnerability by wrong chmod param — super-xrayCWE-250 | 6.4 | Medium | 2022-11-22 |
| CVE-2022-41945 | Remote Code Execution (RCE) vulnerability in super-xray via URL input — super-xrayCWE-94 | 6.5 | Medium | 2022-11-21 |
This page lists every published CVE security advisory associated with 4ra1n. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.