Browse all 5 CVE security advisories affecting eolinker. AI-powered Chinese analysis, POCs, and references for each vulnerability.
eolinker is an API management platform primarily used for API design, testing, and documentation. Historically, it has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting (XSS) flaws, and privilege escalation issues. The platform's security record includes five CVEs, with RCE being the most prevalent class of vulnerability. These issues often stem from insufficient input validation and improper access controls in its API testing and management features. While no major public security incidents have been widely reported, the consistent pattern of vulnerabilities suggests potential risks for organizations relying on the platform without proper hardening and monitoring.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-3797 | eolinker apinto-dashboard login redirect — apinto-dashboardCWE-601 | 6.3 | Medium | 2022-11-01 |
| CVE-2022-3803 | eolinker apinto-dashboard cross site scripting — apinto-dashboardCWE-707 | 3.5 | Low | 2022-11-01 |
| CVE-2022-3804 | eolinker apinto-dashboard login cross site scripting — apinto-dashboardCWE-707 | 4.3 | Medium | 2022-11-01 |
This page lists every published CVE security advisory associated with eolinker. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.