Browse all 3 CVE security advisories affecting Gemini Labs. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Gemini Labs develops security testing tools and vulnerability research platforms, primarily serving penetration testers and security professionals. Historically, their products have been associated with remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from input validation flaws and insecure default configurations. While no major public security incidents have been documented, the three CVEs on record highlight recurring issues in their software's access control and sanitization mechanisms. Their tools remain valuable for security assessment but require careful configuration and patch management to mitigate identified risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-49832 | WordPress Site Reviews plugin <= 6.10.2 - Broken Access Control vulnerability — Site ReviewsCWE-862 | 5.3 | Medium | 2024-12-09 |
| CVE-2024-29095 | WordPress Site Reviews plugin <= 6.11.6 - Cross Site Scripting (XSS) vulnerability — Site ReviewsCWE-79 | 5.9 | Medium | 2024-03-19 |
| CVE-2018-0603 | WordPress Site Reviews 跨站脚本漏洞 — Site Reviews | 6.1 | - | 2018-06-26 |
This page lists every published CVE security advisory associated with Gemini Labs. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.