Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

needrestart — Vulnerabilities & Security Advisories 4

Browse all 4 CVE security advisories affecting needrestart. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Needrestart identifies system services requiring restart after security updates to prevent vulnerable running processes, addressing critical post-patch gaps. Historically, it has mitigated vulnerabilities across multiple classes, including remote code execution, privilege escalation, and memory corruption flaws. With four CVEs on record, these typically stem from unpatched services persisting in memory after updates. The tool's core strength lies in its ability to detect and restart services without full system reboots, reducing downtime while maintaining security posture. While no major public incidents are documented, its CVE history reflects the ongoing challenge of maintaining secure service states during patch management cycles.

Found 4 results / 4Clear Filters
Top products by needrestart: needrestart
CVE IDTitleCVSSSeverityPublished
CVE-2024-48992 needrestart 安全漏洞 — needrestart 7.8 High2024-11-19
CVE-2024-48991 needrestart 安全漏洞 — needrestart 7.8 High2024-11-19
CVE-2024-48990 needrestart 安全漏洞 — needrestart 7.8 High2024-11-19
CVE-2024-11003 needrestart 安全漏洞 — needrestart 7.8 High2024-11-19

This page lists every published CVE security advisory associated with needrestart. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.