Browse all 4 CVE security advisories affecting cybernetikz. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Cybernetikz develops network security solutions focusing on threat detection and vulnerability management for enterprise environments. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and misconfigured access controls. While no major public security incidents have been documented, their CVE history indicates persistent issues with authentication bypass and insecure default configurations. The company has demonstrated a pattern of addressing vulnerabilities through patch releases, though remediation timelines have occasionally been protracted, leaving exposed systems at risk during interim periods.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-33998 | WordPress Easy Social Icons plugin <= 3.2.5 - Broken Access Control vulnerability — Easy Social IconsCWE-862 | 4.3 | Medium | 2024-12-13 |
| CVE-2024-22289 | WordPress Post views Stats plugin <= 1.4.1 - Cross Site Scripting (XSS) vulnerability — Post views StatsCWE-79 | 7.1 | High | 2024-01-31 |
| CVE-2023-48336 | WordPress Easy Social Icons Plugin <= 3.2.4 is vulnerable to Cross Site Scripting (XSS) — Easy Social IconsCWE-79 | 6.5 | Medium | 2023-11-30 |
| CVE-2021-39322 | Easy Social Icons <= 3.0.8 - Reflected Cross-Site Scripting — Easy Social IconsCWE-79 | 6.1 | Medium | 2021-09-02 |
This page lists every published CVE security advisory associated with cybernetikz. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.