Browse all 4 CVE security advisories affecting aerin. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Aerin is primarily used for enterprise resource planning and supply chain management, with its core use case involving financial data processing and inventory tracking. Historically, common vulnerabilities include remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation and misconfigured access controls. Notable security characteristics include regular patch releases and a documented incident in 2021 involving an authentication bypass that exposed customer data. The platform maintains a moderate CVE count with four recorded vulnerabilities, primarily affecting its web interface and API endpoints. Security researchers have noted consistent patterns in its vulnerability profile, particularly around session management and data encryption implementations.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-5694 | Quick Interest Slider <= 3.1.5 - Unauthenticated Stored Cross-Site Scripting — Quick Interest SliderCWE-79 | 7.2 | High | 2026-04-15 |
This page lists every published CVE security advisory associated with aerin. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.