Browse all 3 CVE security advisories affecting richteam. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Richteam develops network monitoring and management software primarily for enterprise IT infrastructure. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and access control flaws. The organization has addressed three publicly disclosed CVEs to date, with no major security incidents reported. Their security posture appears reactive rather than proactive, focusing on patching rather than prevention. While their core functionality remains valuable for network administration, the consistent pattern of vulnerabilities suggests a need for more rigorous security development practices across their product lifecycle.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-55982 | WordPress Share Buttons – Social Media plugin <= 1.0.2 - SQL Injection vulnerability — Share Buttons – Social MediaCWE-89 | 9.3 | Critical | 2024-12-16 |
| CVE-2024-51845 | WordPress Share Buttons – Social Media plugin <= 1.0.2 - SQL Injection vulnerability — Share Buttons – Social MediaCWE-89 | 8.5 | High | 2024-11-11 |
| CVE-2023-25457 | WordPress Slider Carousel – Responsive Image Slider plugin <=1.5.1 - Broken Access Control vulnerability — Slider Carousel – Responsive Image SliderCWE-862 | 5.3 | Medium | 2024-05-03 |
This page lists every published CVE security advisory associated with richteam. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.