Browse all 3 CVE security advisories affecting Commend. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Commend provides unified case management and incident response platforms for security operations. Historically, vulnerabilities have included remote code execution, cross-site scripting, and privilege escalation flaws. The platform's integration with multiple security tools creates potential attack surfaces. While no major public incidents have been widely reported, the three documented CVEs highlight persistent security concerns in web interfaces and authentication mechanisms. Organizations implementing Commend should prioritize timely patching and harden configurations against common web vulnerabilities, particularly those affecting administrative interfaces and session management.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-23492 | Commend WS203VICM Weak Encoding for Password — WS203VICMCWE-261 | 5.7 | Medium | 2024-03-01 |
| CVE-2024-21767 | Commend WS203VICM Improper Access Control — WS203VICMCWE-284 | 9.4 | Critical | 2024-03-01 |
| CVE-2024-22182 | Commend WS203VICM Argument Injection — WS203VICMCWE-88 | 8.6 | High | 2024-03-01 |
This page lists every published CVE security advisory associated with Commend. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.