Browse all 3 CVE security advisories affecting Noah Hearle, Design Extreme. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Noah Hearle, Design Extreme specializes in web application development with a focus on custom design solutions. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, as evidenced by their three recorded CVEs. While no major public security incidents have been documented, their vulnerability history suggests consistent issues with input validation and access control. The organization's security posture appears reactive rather than proactive, with vulnerabilities typically addressed after disclosure. Their core use case involves creating visually distinctive web applications, though this emphasis on design has sometimes resulted in security compromises that require patching.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-23986 | WordPress Reviews and Rating – Google My Business plugin <= 4.14 - Broken Access Control vulnerability — Reviews and Rating – Google My BusinessCWE-862 | 5.4 | Medium | 2024-12-09 |
| CVE-2023-25067 | WordPress We’re Open! plugin <= 1.45 - Broken Access Control vulnerability — We’re Open!CWE-862 | 4.3 | Medium | 2024-12-09 |
| CVE-2023-25964 | WordPress We’re Open! Plugin <= 1.46 is vulnerable to Cross Site Scripting (XSS) — We’re Open!CWE-79 | 5.9 | Medium | 2023-06-13 |
This page lists every published CVE security advisory associated with Noah Hearle, Design Extreme. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.