Jeesite Vulnerabilities
Comprehensive security vulnerability database for Jeesite products
1
0
1
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-3405 | 2.3 | This vulnerability allows an attacker to access files on the server that they shouldn't be able to reach, potentially exposing sensitive information. However, exploiting this flaw is difficult and requires a specific setup, making it less likely for most attackers to succeed. | jeesitejeesite | Exploit Available | about 1 month agoMar 2, 2026 |
About Jeesite Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Jeesite products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.