Browse all 4 CVE security advisories affecting encode. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Encode is a software platform primarily used for web application development and content management. Historically, Encode has been associated with several common vulnerability classes, including cross-site scripting (XSS), remote code execution (RCE), and privilege escalation vulnerabilities. The platform has recorded four CVEs to date, with some instances allowing unauthorized access or system compromise. Security researchers have noted that certain versions of Encode contained insufficient input validation and improper access controls, leading to potential security breaches. While no major public security incidents have been widely reported, the consistent appearance of similar vulnerability patterns suggests ongoing security challenges that require careful implementation and regular updates.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-54121 | Starlette has possible denial-of-service vector when parsing large files in multipart forms — starletteCWE-770 | 5.3 | Medium | 2025-07-21 |
| CVE-2024-47874 | Starlette Denial of service (DoS) via multipart/form-data — starletteCWE-770 | 7.5 | - | 2024-10-15 |
| CVE-2023-29159 | Starlette 路径遍历漏洞 — Starlette | 7.5 | - | 2023-06-01 |
| CVE-2023-30798 | MultipartParser DOS with too many fields or files in Starlette Framework — StarletteCWE-400 | 7.5 | High | 2023-04-21 |
This page lists every published CVE security advisory associated with encode. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.