Browse all 3 CVE security advisories affecting chertz. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Chertz is a network monitoring tool primarily used for real-time traffic analysis and security event detection. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and insecure default configurations. The tool's web interface has been particularly impacted, with multiple CVEs allowing unauthorized access or system compromise. While no major public security incidents have been widely documented, its consistent vulnerability pattern suggests a need for rigorous hardening and timely patching. Chertz remains in use despite these issues, primarily due to its specialized monitoring capabilities in niche environments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-10078 | WP Easy Post Types <= 1.4.4 - Authenticated (Subscriber+) Missing Authorization via Multiple Functions — WP Easy Post TypesCWE-862 | 6.3 | Medium | 2024-10-18 |
| CVE-2024-10079 | WP Easy Post Types <= 1.4.4 - Authenticated (Subscriber+) PHP Object Injection — WP Easy Post TypesCWE-502 | 8.8 | High | 2024-10-18 |
| CVE-2024-10080 | WP Easy Post Types <= 1.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Meta — WP Easy Post TypesCWE-79 | 6.4 | Medium | 2024-10-18 |
This page lists every published CVE security advisory associated with chertz. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.