Browse all 3 CVE security advisories affecting tiann. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Tiann is a network monitoring tool primarily used for real-time traffic analysis and security event detection. Historically, vulnerabilities associated with tiann include remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from improper input validation and authentication weaknesses. The tool has been involved in several security incidents where unpatched instances allowed unauthorized access to network data and system compromise. Security researchers have noted tiann's susceptibility to misconfiguration-based attacks, with some CVEs highlighting insufficient access controls. While no major public breaches have been widely documented, the consistent pattern of vulnerabilities in network monitoring tools like tiann underscores the importance of timely patching and secure deployment practices.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-49794 | The logic of get apk path in KernelSU module can be bypassed — KernelSUCWE-290 | 6.7 | Medium | 2024-01-02 |
| CVE-2023-46139 | KernelSU signature validation mismatch — KernelSUCWE-863 | 5.0 | Medium | 2023-10-30 |
| CVE-2023-5521 | Incorrect Authorization in tiann/kernelsu — tiann/kernelsuCWE-863 | 8.3 | - | 2023-10-11 |
This page lists every published CVE security advisory associated with tiann. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.