Browse all 3 CVE security advisories affecting YMC. AI-powered Chinese analysis, POCs, and references for each vulnerability.
YMC develops enterprise software solutions for supply chain management and logistics operations. Historically, the organization's products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and access control flaws. While no major public security incidents have been documented, YMC's three recorded CVEs highlight persistent weaknesses in authentication mechanisms and secure coding practices. The company's security posture appears reactive rather than proactive, with remediation typically occurring post-disclosure rather than through comprehensive preventive measures.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-32397 | WordPress Filter & Grids plugin <= 3.5.1 - Broken Access Control vulnerability — Filter & GridsCWE-862 | 5.3 | Medium | 2026-03-13 |
| CVE-2024-39664 | WordPress Filter & Grids plugin <= 2.8.32 - Broken Authentication vulnerability — Filter & GridsCWE-862 | 7.3 | High | 2024-11-01 |
| CVE-2024-39665 | WordPress Filter & Grids plugin <= 2.9.2 - Cross Site Scripting (XSS) vulnerability — Filter & GridsCWE-79 | 6.5 | Medium | 2024-08-01 |
This page lists every published CVE security advisory associated with YMC. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.