Browse all 3 CVE security advisories affecting Walter Pinem. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Walter Pinem operates primarily in enterprise software development, focusing on web applications and API frameworks. Historically, vulnerabilities associated with this entity include remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation and misconfigured access controls. While no major public security incidents have been documented, the three CVEs on record highlight recurring issues in authentication mechanisms and insecure default configurations. The security profile suggests a pattern of vulnerabilities related to improper neutralization of input during web page generation, requiring consistent remediation efforts to maintain secure deployment practices.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-47371 | WordPress WP MyLinks plugin<= 1.0.6 - Cross Site Scripting (XSS) vulnerability — WP MyLinksCWE-79 | 5.9 | Medium | 2024-10-05 |
| CVE-2024-29789 | WordPress OneClick Chat to Order plugin <= 1.0.5 - Cross Site Scripting (XSS) vulnerability — OneClick Chat to OrderCWE-79 | 6.5 | Medium | 2024-03-27 |
| CVE-2023-47546 | WordPress OneClick Chat to Order Plugin <= 1.0.4.2 is vulnerable to Cross Site Scripting (XSS) — OneClick Chat to OrderCWE-79 | 5.9 | Medium | 2023-11-14 |
This page lists every published CVE security advisory associated with Walter Pinem. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.