Browse all 5 CVE security advisories affecting miunosoft. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Miunosoft develops enterprise software solutions with a core focus on business process automation and productivity tools. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from input validation flaws and insecure default configurations. While no major public security incidents have been widely documented, their five recorded CVEs highlight consistent issues in access controls and data handling. The organization has shown gradual improvement in security practices, though legacy components remain potential attack vectors. Their software architecture typically integrates third-party libraries, introducing additional complexity to vulnerability management.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-10056 | Task Scheduler <= 1.6.3 - Authenticated (Admin+) Blind Server-Side Request Forgery — Task SchedulerCWE-918 | 4.4 | Medium | 2025-10-15 |
| CVE-2025-32599 | WordPress Task Scheduler Plugin <= 1.6.3 - Reflected Cross Site Scripting (XSS) vulnerability — Task SchedulerCWE-79 | 7.1 | High | 2025-04-11 |
This page lists every published CVE security advisory associated with miunosoft. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.