Browse all 3 CVE security advisories affecting wshberlin. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Wshberlin operates in cybersecurity research, focusing on vulnerability discovery and analysis across various software systems. Historically, their reported vulnerabilities commonly include remote code execution (RCE), cross-site scripting (XSS), and privilege escalation flaws, often affecting web applications and enterprise software. While no major public security incidents are directly attributed to wshberlin, their CVE contributions highlight consistent findings in input validation and access control weaknesses. Their work typically emphasizes identifying flaws in widely used platforms, with research that aids in improving overall software security postures. The three CVEs on record demonstrate their role in uncovering critical issues that could lead to system compromises if unaddressed.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-5153 | Startklar Elementor Addons <= 1.7.15 - Unauthenticated Path Traversal to Arbitrary Directory Deletion — Startklar Elementor AddonsCWE-22 | 9.1 | Critical | 2024-06-06 |
| CVE-2024-4345 | Startklar Elementor Addons <= 1.7.13 - Unauthenticated Arbitrary File Upload — Startklar Elementor AddonsCWE-434 | 9.8 | Critical | 2024-05-07 |
| CVE-2024-4346 | Startklar Elementor Addons <= 1.7.13 - Unauthenticated Arbitrary File Deletion — Startklar Elementor AddonsCWE-22 | 9.1 | Critical | 2024-05-07 |
This page lists every published CVE security advisory associated with wshberlin. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.