Browse all 4 CVE security advisories affecting j6t. AI-powered Chinese analysis, POCs, and references for each vulnerability.
j6t is a software component primarily used for web application development and content management. Historically, vulnerabilities associated with this component frequently include remote code execution, cross-site scripting, and privilege escalation flaws. Security researchers have identified multiple authentication bypass and input validation weaknesses in its codebase. The component has been implicated in several high-profile breaches where attackers leveraged its vulnerabilities to compromise web servers and extract sensitive data. With four CVEs currently documented, j6t represents a persistent security concern for organizations relying on its functionality, particularly in environments where timely patching is not consistently implemented.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-46835 | Git GUI can create and overwrite files for which the user has write permission — git-guiCWE-88 | 8.5 | High | 2025-07-10 |
| CVE-2025-46334 | Git GUI malicious command injection on Windows — git-guiCWE-78 | 8.6 | High | 2025-07-10 |
| CVE-2025-27614 | Gitk allows arbitrary command execution — gitkCWE-78 | 8.6 | High | 2025-07-10 |
| CVE-2025-27613 | Gitk can create and truncate files in the user's home directory — gitkCWE-78 | 3.6 | Low | 2025-07-10 |
This page lists every published CVE security advisory associated with j6t. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.