Browse all 3 CVE security advisories affecting TienCOP. AI-powered Chinese analysis, POCs, and references for each vulnerability.
TienCOP is a cybersecurity platform focused on threat detection and incident response for enterprise environments. Historically, the product has been associated with vulnerabilities including remote code execution, cross-site scripting, and privilege escalation flaws. Security researchers have identified multiple authentication bypass issues and insecure default configurations in past versions. While no major public security incidents have been documented, the three CVEs recorded highlight potential risks in input validation and access control mechanisms. The platform's architecture relies heavily on custom components which may introduce unique attack surfaces not commonly found in mainstream security tools.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-46623 | WordPress WP EXtra Plugin <= 6.2 is vulnerable to Remote Code Execution (RCE) — WP EXtraCWE-94 | 9.9 | Critical | 2023-12-29 |
| CVE-2023-46212 | WordPress WP EXtra Plugin <= 6.2 is vulnerable to Broken Access Control — WP EXtraCWE-862 | 6.3 | Medium | 2023-12-18 |
| CVE-2023-47825 | WordPress WP EXtra Plugin <= 6.4 is vulnerable to Cross Site Request Forgery (CSRF) — WP EXtraCWE-352 | 4.3 | Medium | 2023-11-22 |
This page lists every published CVE security advisory associated with TienCOP. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.