Browse all 5 CVE security advisories affecting ce21com. AI-powered Chinese analysis, POCs, and references for each vulnerability.
ce21com develops network security solutions focused on threat detection and vulnerability management. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and access control flaws. The company has addressed multiple CVEs related to authentication bypass and insecure default configurations. While no major public security incidents have been widely reported, their consistent CVE pattern suggests a need for strengthened secure development practices, particularly in handling user inputs and implementing proper privilege checks across their product lines.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-11008 | CE21 Suite <= 2.3.1 - Unauthenticated Sensitive Information Exposure to Privilege Escalation — CE21 SuiteCWE-532 | 9.8 | Critical | 2025-11-04 |
| CVE-2025-11007 | CE21 Suite 2.2.1 - 2.3.1 - Missing Authorization to Unauthenticated Privilege Escalation via Plugin Settings Update — CE21 SuiteCWE-306 | 9.8 | Critical | 2025-11-04 |
| CVE-2024-10294 | CE21 Suite <= 2.2.0 - Missing Authorization to Unauthenticated Plugin Settings Change — CE21 SuiteCWE-862 | 6.5 | Medium | 2024-11-09 |
| CVE-2024-10285 | CE21 Suite <= 2.2.0 - JWT Token Disclosure — CE21 SuiteCWE-200 | 9.8 | Critical | 2024-11-09 |
| CVE-2024-10284 | CE21 Suite <= 2.2.0 - Authentication Bypass — CE21 SuiteCWE-288 | 9.8 | Critical | 2024-11-09 |
This page lists every published CVE security advisory associated with ce21com. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.