Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/iSee857/YonYouBip-path-travel |
|
Mon, 12 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
cvssV3_1
|
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yonyou
Yonyou yonbip |
|
| Vendors & Products |
Yonyou
Yonyou yonbip |
Fri, 09 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Yonyou YonBIP v3 and before, the LoginWithV8 interface in the series data application service system is vulnerable to path traversal, allowing unauthorized access to sensitive information within the system | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-12T16:24:18.143Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-66744
Updated: 2026-01-12T15:34:56.794Z
Status : Deferred
Published: 2026-01-09T17:15:52.927
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-66744
No data.
OpenCVE Enrichment
Updated: 2026-01-12T14:38:19Z