Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CloudExplorer-Dev — Vulnerabilities & Security Advisories 9

Browse all 9 CVE security advisories affecting CloudExplorer-Dev. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Cloudexplorer-dev is a cloud resource exploration tool designed for security professionals to analyze and manage cloud environments. Historically, it has been vulnerable to multiple remote code execution (RCE) and cross-site scripting (XSS) flaws, often stemming from improper input validation and insecure API endpoints. Privilege escalation vulnerabilities have also been prevalent, allowing unauthorized access to cloud resources. The tool has accumulated 9 CVEs to date, with several critical RCE issues enabling complete compromise of cloud environments. While no major public incidents have been documented, the consistent pattern of vulnerabilities suggests potential for significant security breaches if deployed without proper hardening and monitoring.

Found 3 results / 9Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2023-3423 Weak Password Requirements in cloudexplorer-dev/cloudexplorer-lite — cloudexplorer-dev/cloudexplorer-liteCWE-521 9.8 -2023-06-27
CVE-2023-2844 Authorization Bypass Through User-Controlled Key in cloudexplorer-dev/cloudexplorer-lite — cloudexplorer-dev/cloudexplorer-liteCWE-639 5.4 -2023-05-23
CVE-2023-2845 Improper Access Control in cloudexplorer-dev/cloudexplorer-lite — cloudexplorer-dev/cloudexplorer-liteCWE-284 5.4 -2023-05-23

This page lists every published CVE security advisory associated with CloudExplorer-Dev. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.