Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

peerigon — Vulnerabilities & Security Advisories 3

Browse all 3 CVE security advisories affecting peerigon. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Peerigon develops web-based collaboration and project management tools used by enterprises worldwide. Historically, their applications have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and improper access controls. While no major public security incidents have been widely reported, the three documented CVEs highlight persistent issues in their web application security posture. Their codebase typically requires regular security patches to address authentication flaws and server-side injection risks. Organizations implementing Peerigon solutions should prioritize timely updates and conduct thorough penetration testing due to the recurring nature of these vulnerability classes in their product history.

Found 3 results / 3Clear Filters
Top products by peerigon: angular-expressions
CVE IDTitleCVSSSeverityPublished
CVE-2024-54152 Angular Expressions - Remote Code Execution when using locals — angular-expressionsCWE-94 10.0 -2024-12-10
CVE-2021-21277 Angular Expressions - Remote Code Execution — angular-expressionsCWE-74 8.5 High2021-02-01
CVE-2020-5219 Remote Code Execution in Angular Expressions — angular-expressionsCWE-74 8.7 High2020-01-24

This page lists every published CVE security advisory associated with peerigon. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.