VYPR

Easyflow .net

by Digiwin

CVEs (8)

  • CVE-2026-5964CriApr 20, 2026
    risk 0.64cvss 9.8epss 0.00

    EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

  • CVE-2026-5963CriApr 20, 2026
    risk 0.64cvss 9.8epss 0.00

    EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

  • CVE-2025-13165HigNov 17, 2025
    risk 0.49cvss 7.5epss 0.00

    EasyFlow GP developed by Digiwin has a Denial of service vulnerability, allowing unauthenticated remote attackers to send specific requests that result in denial of web service.

  • CVE-2025-11949HigOct 21, 2025
    risk 0.49cvss 7.5epss 0.00

    EasyFlow .NET and EasyFlow AiNet, developed by Digiwin, has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to obtain database administrator credentials via a specific functionality.

  • CVE-2025-12503MedNov 3, 2025
    risk 0.42cvss 6.5epss 0.00

    EasyFlow .NET and EasyFlow AiNet developed by Digiwin has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read database contents.

  • CVE-2025-13164MedNov 17, 2025
    risk 0.32cvss 4.9epss 0.00

    EasyFlow GP developed by Digiwin has an Insufficiently Protected Credentials vulnerability, allowing privileged remote attackers to obtain plaintext credentials of AD and system mail from the system frontend.

  • CVE-2025-13163MedNov 17, 2025
    risk 0.32cvss 4.9epss 0.00

    EasyFlow GP developed by Digiwin has an Insufficiently Protected Credentials vulnerability, allowing privileged remote attackers to obtain plaintext database account credentials from the system frontend.

  • CVE-2024-7323Aug 2, 2024
    risk 0.00cvss epss 0.00

    Digiwin EasyFlow .NET lacks proper access control for specific functionality, and the functionality do not adequately filter user input. A remote attacker with regular privilege can exploit this vulnerability to download arbitrary files from the remote server .