Browse all 5 CVE security advisories affecting Saphira. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Saphira is a web-based collaboration platform primarily used for team project management and document sharing. Historically, it has been vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws, with five CVEs documented. The platform's security architecture has faced criticism for insufficient input validation and inadequate access controls. In 2022, a critical authentication bypass vulnerability allowed unauthorized access to sensitive project data, affecting multiple enterprise clients. Saphira has since implemented stricter validation mechanisms and enhanced its permission model, though its historical vulnerability pattern suggests ongoing challenges in secure coding practices.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-4665 | Privilage Escalation in Saphira Connect — Saphira ConnectCWE-279 | 8.8 | High | 2023-09-15 |
| CVE-2023-4664 | Privilage Escalation in Saphira Connect — Saphira ConnectCWE-276 | 8.8 | High | 2023-09-15 |
| CVE-2023-4663 | XSS in Saphira Connect — Saphira ConnectCWE-80 | 6.1 | Medium | 2023-09-15 |
| CVE-2023-4662 | RCE in Saphira Connect — Saphira ConnectCWE-250 | 9.8 | Critical | 2023-09-15 |
| CVE-2023-4661 | SQLi in Saphira Connect — Saphira ConnectCWE-89 | 9.8 | Critical | 2023-09-15 |
This page lists every published CVE security advisory associated with Saphira. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.