Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

teckel — Vulnerabilities & Security Advisories 3

Browse all 3 CVE security advisories affecting teckel. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Teckel is primarily used as a network utility for tunneling and proxying connections. Historically, it has been associated with several critical vulnerabilities including remote code execution (RCE) and cross-site scripting (XSS) flaws. The application has demonstrated security weaknesses in input validation and authentication mechanisms. With three CVEs recorded, teckel has faced issues that could allow attackers to execute arbitrary code or bypass security controls. While no major public security incidents have been widely documented, the consistent appearance of vulnerabilities in its codebase suggests potential risks for organizations relying on this utility for secure network operations.

Found 2 results / 3Clear Filters

This page lists every published CVE security advisory associated with teckel. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.