Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Kleor — Vulnerabilities & Security Advisories 5

Browse all 5 CVE security advisories affecting Kleor. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Kleor is a software platform primarily used for enterprise content management and workflow automation. Historically, kleor has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, as evidenced by its five recorded CVEs. The platform's security characteristics include complex authentication mechanisms that have previously been bypassed, and its extensive API surface has contributed to recurring injection-based vulnerabilities. While no major public security incidents have been widely documented, the consistent pattern of vulnerabilities in input validation and access control suggests ongoing challenges in secure development practices for this enterprise solution.

Top products by Kleor: Contact Manager Easy Timer

This page lists every published CVE security advisory associated with Kleor. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.