Browse all 3 CVE security advisories affecting SevOne. AI-powered Chinese analysis, POCs, and references for each vulnerability.
SevOne provides network performance monitoring solutions for large enterprises, focusing on infrastructure visibility and management. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and access controls. While no major public security incidents have been widely documented, the three CVEs on record highlight potential risks in web interfaces and authentication mechanisms. The platform's complexity and extensive network access capabilities make proper security configuration critical for organizations deploying SevOne solutions to prevent potential exploitation of these vulnerabilities.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-36531 | SevOne Network Management System Device Manager Page injection — Network Management SystemCWE-74 | 6.3 | Medium | 2022-06-03 |
| CVE-2020-36530 | SevOne Network Management System Alert Summary sql injection — Network Management SystemCWE-89 | 6.3 | Medium | 2022-06-03 |
| CVE-2020-36529 | SevOne Network Management System Traceroute traceroute.php command injection — Network Management SystemCWE-77 | 8.8 | High | 2022-06-03 |
This page lists every published CVE security advisory associated with SevOne. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.