Browse all 18 CVE security advisories affecting Erlang. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Erlang is primarily used for building highly available, distributed systems and real-time applications like messaging platforms and telecom infrastructure. Historically, vulnerabilities have included remote code execution, cross-site scripting, and privilege escalation, often stemming from input validation flaws and insecure deserialization. The platform's lightweight processes and fault-tolerance features provide inherent security benefits, though misconfigurations can still lead to breaches. Notable incidents include vulnerabilities in the Cowboy web server and OTP components, which have allowed attackers to execute arbitrary code or bypass authentication. Despite these issues, the language's design emphasizes reliability and concurrent processing, making it a preferred choice for systems requiring high uptime and scalability.
This page lists every published CVE security advisory associated with Erlang. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.