Browse all 3 CVE security advisories affecting Aaron-Junker. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Aaron-Junker develops web applications with a focus on enterprise content management systems. Historically, vulnerabilities associated with this developer have included remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from insufficient input validation and access control misconfigurations. While no major public security incidents have been documented, the three CVEs on record highlight recurring issues in sanitizing user-supplied data and implementing secure session management. These vulnerabilities typically allow attackers to execute arbitrary code, manipulate web content, or gain elevated privileges within affected systems, emphasizing the need for rigorous security testing in their development lifecycle.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-21666 | SQL Injection in useredit.php — USOCCWE-89 | 7.2 | High | 2022-01-10 |
| CVE-2022-21644 | SQL Injection via search in USOC — USOCCWE-89 | 9.1 | Critical | 2022-01-04 |
| CVE-2022-21643 | SQL Injection in USOC — USOCCWE-89 | 10.0 | Critical | 2022-01-04 |
This page lists every published CVE security advisory associated with Aaron-Junker. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.