Browse all 3 CVE security advisories affecting dzikoysk. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Dzikoysk is a web-based content management system primarily used for building and managing websites, particularly in educational and organizational contexts. Historically, it has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting (XSS), and privilege escalation flaws, often stemming from insufficient input validation and insecure authentication mechanisms. The platform's three recorded CVEs highlight recurring issues in file handling and access control, with no major public security incidents documented. Its lightweight architecture appeals to users with limited technical resources, but the historical vulnerability patterns suggest a need for rigorous security hardening and regular updates to mitigate exploitation risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-36117 | Path traversal while serving Reposilite javadoc expanded files — reposiliteCWE-22 | 8.6 | High | 2024-06-19 |
| CVE-2024-36116 | Path traversal in Reposilite javadoc file expansion — reposiliteCWE-22 | 7.5 | High | 2024-06-19 |
| CVE-2024-36115 | Stored Cross site scripting in Reposilite artifacts — reposiliteCWE-79 | 7.1 | High | 2024-06-19 |
This page lists every published CVE security advisory associated with dzikoysk. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.