Browse all 3 CVE security advisories affecting INNORIX. AI-powered Chinese analysis, POCs, and references for each vulnerability.
INNORIX provides enterprise software for IT asset management and endpoint security, focusing on device control and compliance monitoring. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and access control flaws. While no major public security incidents have been widely reported, the three documented CVEs highlight potential risks in web interfaces and communication protocols. Their security posture appears typical for enterprise software vendors, with vulnerabilities primarily affecting authenticated users and requiring local network access for exploitation.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-15067 | Unrestricted File Upload and RCE in Innorix WP — Innorix WPCWE-434 | 7.7 | High | 2025-12-29 |
| CVE-2025-15066 | Arbitrary File Download through Path Traversal in Innorix WP — Innorix WPCWE-22 | 6.2 | Medium | 2025-12-29 |
| CVE-2020-7851 | Innorix File Transfer Solution File Download and Execution Vulnerability — INNORIX Agent.exeCWE-88 | 7.8 | High | 2021-04-19 |
This page lists every published CVE security advisory associated with INNORIX. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.