Browse all 3 CVE security advisories affecting psi-4ward. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Psi-4ward primarily provides network security solutions for enterprise environments, focusing on threat detection and vulnerability management. Historically, psi-4ward products have been associated with common vulnerability classes including remote code execution (RCE), cross-site scripting (XSS), and privilege escalation flaws. The organization has demonstrated notable security characteristics through regular security updates and patch management cycles. While no major public security incidents have been widely reported, psi-4ward's three recorded CVEs highlight the ongoing importance of vulnerability remediation in their product ecosystem. Their approach emphasizes proactive security measures to address potential weaknesses in their offerings.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-41180 | PsiTransfer: Upload PATCH path traversal can create `config.<NODE_ENV>.js` and lead to code execution on restart — psitransferCWE-22 | 7.5 | High | 2026-04-23 |
| CVE-2024-31454 | PsiTransfer file integrity violation vulnerability — psitransferCWE-434 | 6.5 | Medium | 2024-04-09 |
| CVE-2024-31453 | PsiTransfer vulnerable to violation of the integrity of file distribution — psitransferCWE-434 | 6.5 | Medium | 2024-04-09 |
This page lists every published CVE security advisory associated with psi-4ward. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.