Browse all 3 CVE security advisories affecting rocklobsterinc. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Rocklobsterinc develops network security appliances focused on threat detection and prevention. Historically, their products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from improper input validation and authentication bypasses. The company has addressed three CVEs to date, with RCE being the most prevalent class. While no major public security incidents have been documented, their vulnerabilities have consistently allowed unauthenticated attackers to compromise affected systems, underscoring the importance of timely patching. Rocklobsterinc's security posture reflects common challenges in embedded device security, where complex functionality can introduce exploitable weaknesses.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-3247 | Contact Form 7 <= 6.0.5 - Order Replay Vulnerability — Contact Form 7CWE-354 | 5.3 | Medium | 2025-04-16 |
| CVE-2024-2242 | Contact Form 7 <= 5.9 - Reflected Cross-Site Scripting — Contact Form 7CWE-79 | 6.1 | Medium | 2024-03-13 |
| CVE-2023-6449 | Contact Form 7 <= 5.8.3 - Authenticated (Editor+) Arbitrary File Upload — Contact Form 7CWE-434 | 6.6 | Medium | 2023-12-01 |
This page lists every published CVE security advisory associated with rocklobsterinc. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.