Esafenet
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Esafenet product.
RSS Feeds for Esafenet security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Esafenet products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Esafenet Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 0 vulnerabilities in Esafenet. Last year, in 2025 Esafenet had 20 security vulnerabilities published. Right now, Esafenet is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 20 | 8.52 |
| 2024 | 32 | 9.13 |
| 2023 | 0 | 0.00 |
| 2022 | 0 | 0.00 |
| 2021 | 0 | 0.00 |
| 2020 | 0 | 0.00 |
| 2019 | 1 | 0.00 |
It may take a day or so for new Esafenet vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Esafenet Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-3401 | Apr 08, 2025 |
SQLi via noticeId in ESAFENET CDG 5.6.3.154_20250114 /parameter/getLimitIPList.jspA vulnerability has been found in ESAFENET CDG 5.6.3.154.205_20250114 and classified as critical. This vulnerability affects unknown code of the file /parameter/getLimitIPList.jsp. The manipulation of the argument noticeId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2025-3399 | Apr 08, 2025 |
ESAFENET CDG 5.6.3 SQLi via /pubinfo/updateNotice.jsp IDA vulnerability, which was classified as critical, has been found in ESAFENET CDG 5.6.3.154.205_20250114. Affected by this issue is some unknown functionality of the file /pubinfo/updateNotice.jsp. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2025-3400 | Apr 08, 2025 |
CRITICAL SQLi in ESAFENET CDG 5.6.3 via UnChkMailApp.jsp 'typename'A vulnerability, which was classified as critical, was found in ESAFENET CDG 5.6.3.154.205_20250114. This affects an unknown part of the file /client/UnChkMailApplication.jsp. The manipulation of the argument typename leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2025-2927 | Mar 28, 2025 |
ESAFENET CDG 5.6.3.154.205 - /parameter/getFileTypeList.jsp Remote SQLiA vulnerability was found in ESAFENET CDG 5.6.3.154.205. It has been classified as critical. Affected is an unknown function of the file /parameter/getFileTypeList.jsp. The manipulation of the argument typename leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2025-1845 | Mar 03, 2025 |
ESAFENET DSM 3.1.2 CMDI via examExportPDF (s arg)A vulnerability has been found in ESAFENET DSM 3.1.2 and classified as critical. Affected by this vulnerability is the function examExportPDF of the file /admin/plan/examExportPDF. The manipulation of the argument s leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2025-1844 | Mar 03, 2025 |
ESAFENET CDG 5.6.3 SQLi via backupLogDetail.jsp logTaskIdA vulnerability, which was classified as critical, was found in ESAFENET CDG 5.6.3.154.205_20250114. Affected is an unknown function of the file /CDGServer3/logManagement/backupLogDetail.jsp. The manipulation of the argument logTaskId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2025-1840 | Mar 03, 2025 |
ESAFENET CDG 5.6.3.154.205 – SQLi via updateorg.jsp (flowId)A vulnerability was found in ESAFENET CDG 5.6.3.154.205. It has been rated as critical. Affected by this issue is some unknown functionality of the file /CDGServer3/workflowE/useractivate/updateorg.jsp. The manipulation of the argument flowId leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. |
|
| CVE-2025-1841 | Mar 03, 2025 |
ESAFENET CDG 5.6.3.154.205 SQLi in ClientSortLog.jsp (remote)A vulnerability classified as critical has been found in ESAFENET CDG 5.6.3.154.205. This affects an unknown part of the file /CDGServer3/logManagement/ClientSortLog.jsp. The manipulation of the argument startDate/endDate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
|
| CVE-2025-1158 | Feb 10, 2025 |
ESAFENET CDG 5.6.3.154_20250114: addPolicyToSafetyGroup.jsp SQLi via safetyGroupIdA vulnerability was found in ESAFENET CDG 5.6.3.154.205_20250114. It has been classified as critical. Affected is an unknown function of the file addPolicyToSafetyGroup.jsp. The manipulation of the argument safetyGroupId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2025-0795 | Jan 29, 2025 |
ESAFENET CDG V5 XSS via flowId in /todolistjump.jspA vulnerability was found in ESAFENET CDG V5. It has been classified as problematic. This affects an unknown part of the file /todolistjump.jsp. The manipulation of the argument flowId leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
|