Browse all 4 CVE security advisories affecting prasathmani. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Prasathmani develops web applications and APIs primarily for business process automation and data management solutions. Historically, their code has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and improper access controls. While no major public security incidents have been documented, their CVE record indicates consistent security challenges in authentication mechanisms and data sanitization practices. The organization's products typically handle sensitive business data, making proper input validation and secure coding practices critical for preventing exploitation. Their vulnerability profile suggests a need for enhanced security testing and secure development lifecycle implementation.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-6497 | prasathmani TinyFileManager File Upload filemanager.php server-side request forgery — TinyFileManagerCWE-918 | 6.3 | Medium | 2026-04-17 |
| CVE-2026-6496 | prasathmani TinyFileManager POST Parameter filemanager.php path traversal — TinyFileManagerCWE-22 | 5.4 | Medium | 2026-04-17 |
| CVE-2025-15138 | prasathmani TinyFileManager tinyfilemanager.php path traversal — TinyFileManagerCWE-22 | 4.7 | Medium | 2025-12-28 |
This page lists every published CVE security advisory associated with prasathmani. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.