Browse all 4 CVE security advisories affecting Ovic Team. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Ovic Team develops security research tools focusing on vulnerability discovery and exploitation, primarily targeting enterprise applications and web platforms. Historically, their research has commonly revealed remote code execution, cross-site scripting, and privilege escalation vulnerabilities in widely used software. The team maintains a moderate CVE record with four entries, indicating focused research efforts rather than widespread vulnerability disclosures. While no major security incidents have been publicly attributed to Ovic Team, their work has contributed to improved security in several open-source projects through coordinated vulnerability reporting. Their approach emphasizes practical exploitation techniques, often providing proof-of-concept code alongside their findings.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-41649 | WordPress Ovic Product Bundle plugin <= 1.1.2 - Broken Access Control vulnerability — Ovic Product BundleCWE-862 | 6.5 | Medium | 2024-12-13 |
| CVE-2024-35754 | WordPress Ovic Importer plugin <= 1.6.3 - Arbitrary File Download vulnerability — Ovic ImporterCWE-22 | 7.5 | High | 2024-06-10 |
| CVE-2024-32432 | WordPress Ovic Addon Toolkit plugin <= 2.6.1 - Broken Access Control vulnerability — Ovic Addon ToolkitCWE-862 | 4.3 | Medium | 2024-04-24 |
| CVE-2024-32142 | WordPress Ovic Responsive WPBakery plugin <= 1.3.0 - Broken Access Control vulnerability — Ovic Responsive WPBakeryCWE-862 | 5.4 | Medium | 2024-04-18 |
This page lists every published CVE security advisory associated with Ovic Team. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.