Browse all 3 CVE security advisories affecting Apryse. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Apryse develops enterprise content management and document processing solutions, enabling organizations to capture, manage, and extract value from unstructured data. Historically, the platform has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and access control flaws. While no major public security incidents have been widely reported, the three CVEs on record highlight potential risks in web interfaces and API endpoints. The company typically addresses vulnerabilities through timely patches and security advisories, though organizations should implement additional security controls like input sanitization and principle of least privilege to mitigate potential exploitation risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-4327 | Apryse WebViewer PDF Document cross site scripting — WebViewerCWE-79 | 3.5 | Low | 2024-04-30 |
| CVE-2023-6299 | Apryse iText Reference Table PdfDocument.java memory leak — iTextCWE-401 | 4.3 | Medium | 2023-11-26 |
| CVE-2023-6298 | Apryse iText PdfDocument.java main array index — iTextCWE-129 | 4.3 | Medium | 2023-11-26 |
This page lists every published CVE security advisory associated with Apryse. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.