Browse all 4 CVE security advisories affecting Enter Software. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Enter Software develops enterprise resource planning solutions for mid-sized businesses. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and access control flaws. The company maintains four CVEs on record, with notable incidents including a 2022 authentication bypass affecting multiple versions that allowed unauthorized access to sensitive customer data. Security assessments frequently identify misconfigurations and inadequate session management as persistent issues, though Enter Software has shown improvement in patch response times in recent releases.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-5310 | Enter Software Iperius Backup IperiusAccounts.ini hard-coded key — Iperius BackupCWE-321 | 2.5 | Low | 2026-04-01 |
| CVE-2026-4824 | Enter Software Iperius Backup Backup Job Configuration File privileges management — Iperius BackupCWE-269 | 7.0 | High | 2026-03-25 |
| CVE-2026-4823 | Enter Software Iperius Backup NTLM2 information disclosure — Iperius BackupCWE-200 | 2.5 | Low | 2026-03-25 |
| CVE-2026-4822 | Enter Software Iperius Backup Backup Service temp file — Iperius BackupCWE-378 | 7.0 | High | 2026-03-25 |
This page lists every published CVE security advisory associated with Enter Software. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.