Browse all 4 CVE security advisories affecting 666ghj. AI-powered Chinese analysis, POCs, and references for each vulnerability.
666ghj is a software component primarily used for web application development and content management. Historically, it has been associated with multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues. The component's four recorded CVEs highlight consistent security weaknesses in input validation and access control mechanisms. While no major public security incidents have been documented, the pattern of vulnerabilities suggests potential risks for implementations lacking proper hardening. Organizations using 666ghj should prioritize applying security patches and implementing additional input sanitization measures to mitigate exploitation risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-7059 | 666ghj MiroFish Query Parameter simulation.py get_simulation_posts path traversal — MiroFishCWE-22 | 5.3 | Medium | 2026-04-26 |
| CVE-2026-7058 | 666ghj MiroFish Inter-Process Communication simulation_ipc.py SimulationIPCClient.send_command command injection — MiroFishCWE-77 | 7.3 | High | 2026-04-26 |
| CVE-2026-7042 | 666ghj MiroFish REST API Endpoint __init__.py create_app missing authentication — MiroFishCWE-306 | 7.3 | High | 2026-04-26 |
| CVE-2026-7041 | 666ghj MiroFish Werkzeug Debugger PIN console information disclosure — MiroFishCWE-200 | 3.7 | Low | 2026-04-26 |
This page lists every published CVE security advisory associated with 666ghj. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.