Browse all 3 CVE security advisories affecting Multisuns. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Multisuns develops enterprise software solutions for supply chain management and logistics optimization. Historically, the organization has been associated with vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation and access control flaws. While no major public security incidents have been widely documented, the three CVEs on record highlight persistent security challenges in their web applications and APIs. Their security posture appears typical for mid-sized enterprise software vendors, with vulnerabilities primarily affecting authenticated users and requiring network access for exploitation.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-48390 | Multisuns EasyLog web+ - Command Injection — EasyLog web+CWE-94 | 9.8 | Critical | 2023-12-15 |
| CVE-2023-48389 | Multisuns EasyLog web+ - Path Traversal — EasyLog web+CWE-22 | 7.5 | High | 2023-12-15 |
| CVE-2023-48388 | Multisuns EasyLog web+ - Use of Hard-coded Password — EasyLog web+CWE-798 | 9.8 | Critical | 2023-12-15 |
This page lists every published CVE security advisory associated with Multisuns. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.