Browse all 4 CVE security advisories affecting Alex4SSB. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Alex4SSB primarily develops security testing tools and penetration testing frameworks, with a core focus on identifying vulnerabilities in web applications and network infrastructure. Historically, Alex4SSB has been associated with Remote Code Execution (RCE), Cross-Site Scripting (XSS), and privilege escalation vulnerabilities in their software products. The security characteristics of Alex4SSB's tools often include aggressive scanning capabilities and automated exploitation features. While no major public security incidents have been directly linked to Alex4SSB, their tools have been observed in both defensive security research and offensive exploitation scenarios, reflecting their dual-use nature in the cybersecurity landscape.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-27615 | ADB-Explorer: UNC Path Support in ManualAdbPath Leads to Remote Code Execution (RCE) — ADB-ExplorerCWE-40 | 8.8AI | HighAI | 2026-02-25 |
| CVE-2026-27115 | ADB Explorer is Vulnerable to Arbitrary Directory Deletion via Command-Line Argument — ADB-ExplorerCWE-22 | 7.1 | High | 2026-02-20 |
| CVE-2026-26959 | ADB Explorer Vulnerable to RCE via Insufficient Input Validation — ADB-ExplorerCWE-829 | 7.8 | High | 2026-02-19 |
| CVE-2026-26208 | ADB Explorer Vulnerable to Remote Code Execution via Insecure Deserialization — ADB-ExplorerCWE-502 | 7.8 | High | 2026-02-13 |
This page lists every published CVE security advisory associated with Alex4SSB. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.