Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

JCT — Vulnerabilities & Security Advisories 4

Browse all 4 CVE security advisories affecting JCT. AI-powered Chinese analysis, POCs, and references for each vulnerability.

JCT is a software component commonly used for content management and data processing across web applications. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and access control flaws. The component has accumulated four CVE records to date, with notable incidents including authentication bypass weaknesses and insecure default configurations that allowed unauthorized access to sensitive data. Security researchers have consistently identified similar patterns in its codebase, highlighting ongoing challenges in secure development practices. Organizations implementing JCT should prioritize timely patching and hardening measures to mitigate these recurring risks.

Found 4 results / 4Clear Filters
Top products by JCT: Airpointer
CVE IDTitleCVSSSeverityPublished
CVE-2025-4636 Local Privilege Escalation — AirpointerCWE-269 7.8 High2025-05-30
CVE-2025-4635 Remote Code Execution — AirpointerCWE-20 6.6 Medium2025-05-30
CVE-2025-4634 Local File Inclusion — AirpointerCWE-552 4.1 Medium2025-05-30
CVE-2025-4633 Default Credentials — AirpointerCWE-798 6.5 Medium2025-05-30

This page lists every published CVE security advisory associated with JCT. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.