Browse all 4 CVE security advisories affecting v1rustyle. AI-powered Chinese analysis, POCs, and references for each vulnerability.
v1rustyle primarily develops web applications and security tools, with a core focus on vulnerability research and penetration testing. Historically, their work has commonly exposed remote code execution, cross-site scripting, and privilege escalation vulnerabilities across multiple platforms. Their security characteristics emphasize thorough code analysis and exploit development, though their CVE record shows a pattern of identifying flaws in both custom and third-party systems. While no major public incidents are directly attributed to v1rustyle, their CVE contributions highlight consistent findings in authentication mechanisms and input validation processes. Their research typically spans enterprise applications and open-source projects, demonstrating a broad approach to security assessment.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-4177 | Flynax Bridge <= 2.2.0 - Unauthenticated Arbitrary User Deletion — Flynax BridgeCWE-862 | 5.3 | Medium | 2025-05-02 |
| CVE-2025-4179 | Flynax Bridge <= 2.2.0 - Unauthenticated Limited Privilege Escalation — Flynax BridgeCWE-862 | 7.3 | High | 2025-05-02 |
| CVE-2025-3603 | Flynax Bridge <= 2.2.0 - Unauthenticated Privilege Escalation via Password Update — Flynax BridgeCWE-620 | 9.8 | Critical | 2025-04-24 |
| CVE-2025-3604 | Flynax Bridge <= 2.2.0 - Unauthenticated Privilege Escalation via Account Takeover — Flynax BridgeCWE-862 | 9.8 | Critical | 2025-04-24 |
This page lists every published CVE security advisory associated with v1rustyle. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.