Browse all 6 CVE security advisories affecting cym1102. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Cym1102 is primarily used in web application development and API integration, serving as a middleware component for data processing and communication. Historically, it has been associated with vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, with six CVEs documented to date. Security researchers have noted consistent issues in input validation and authentication mechanisms, though no major public incidents have been reported. The component's widespread adoption in enterprise environments makes it a persistent target for exploitation, particularly in legacy systems where patches may not be consistently applied.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-2145 | cym1102 nginxWebUI Web Management check cross site scripting — nginxWebUICWE-79 | 3.5 | Low | 2026-02-08 |
| CVE-2024-3740 | cym1102 nginxWebUI reload exec deserialization — nginxWebUICWE-502 | 6.3 | Medium | 2024-04-13 |
| CVE-2024-3739 | cym1102 nginxWebUI upload os command injection — nginxWebUICWE-78 | 6.3 | Medium | 2024-04-13 |
| CVE-2024-3738 | cym1102 nginxWebUI saveCmd handlePath certificate validation — nginxWebUICWE-295 | 7.3 | High | 2024-04-13 |
| CVE-2024-3737 | cym1102 nginxWebUI addOver findCountByQuery path traversal — nginxWebUICWE-22 | 6.3 | Medium | 2024-04-13 |
| CVE-2024-3736 | cym1102 nginxWebUI upload unrestricted upload — nginxWebUICWE-434 | 4.3 | Medium | 2024-04-13 |
This page lists every published CVE security advisory associated with cym1102. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.