Browse all 5 CVE security advisories affecting Eugeny. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Eugeny is a software component primarily used for data processing and manipulation in enterprise applications. Historically, vulnerabilities in Eugeny have commonly included remote code execution, cross-site scripting, and privilege escalation flaws. The component has been associated with multiple security incidents, including four CVEs that highlight persistent weaknesses in input validation and access controls. Security researchers have noted that Eugeny's architecture often allows for unauthorized system access when proper sanitization measures are not implemented. Organizations using Eugeny should prioritize patching and implement additional validation layers to mitigate risks associated with its historically exploitable vulnerabilities.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-22136 | Tabby has a TCC Bypass via Misconfigured Node Fuses — tabbyCWE-94 | 7.8 | - | 2025-01-08 |
| CVE-2024-55950 | Tabby has a TCC Bypass via Unnecessary Permissive Entitlements in Tabby — tabbyCWE-276 | 6.6 | - | 2024-12-26 |
This page lists every published CVE security advisory associated with Eugeny. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.