[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-5964":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-20T11:17:00.701Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":44,"aliases":45,"duplicate_of":9,"upstream":46,"downstream":47,"duplicates":48,"related":49,"reserved_at":9,"published_at":50,"modified_at":51,"state":52,"summary":53,"references_raw":62,"kevs":73,"epss":74,"epss_history":77,"metrics":79,"affected":91},"CVE-2026-5964","EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-89","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.","weakness","Stable","Base","High",[20,24,28,32,36,40],{"id":21,"name":22,"techniques":23},"CAPEC-108","Command Line Execution through SQL Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-109","Object Relational Mapping Injection",[],{"id":29,"name":30,"techniques":31},"CAPEC-110","SQL Injection through SOAP Parameter Tampering",[],{"id":33,"name":34,"techniques":35},"CAPEC-470","Expanding Control over the Operating System from the Database",[],{"id":37,"name":38,"techniques":39},"CAPEC-66","SQL Injection",[],{"id":41,"name":42,"techniques":43},"CAPEC-7","Blind SQL Injection",[],[],[],[],[],[],[],"2026-04-20T07:36:58.476Z","2026-04-20T13:38:08.600Z","Received",{"cisa_kev":54,"cisa_ransomware":54,"cisa_vendor":9,"epss_severity":55,"epss_score":56,"severity":57,"severity_score":58,"severity_version":59,"severity_source":60,"severity_vector":61,"severity_status":52},false,"low",0.00081,"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[63,69],{"url":64,"sources":65,"tags":67},"https://www.twcert.org.tw/tw/cp-132-10831-a734d-1.html",[60,66],"nvd",[68],"Third Party Advisory",{"url":70,"sources":71,"tags":72},"https://www.twcert.org.tw/en/cp-139-10832-05f3a-2.html",[60,66],[68],[],{"date":75,"score":56,"percentile":76},"2026-04-20",0.2374,[78],{"date":75,"score":56,"percentile":76},[80,87],{"source":60,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":81,"cvss_v4_0":84},{"baseScore":58,"baseSeverity":82,"vectorString":61,"impactScore":58,"exploitabilityScore":83},"CRITICAL",10,{"baseScore":85,"baseSeverity":82,"vectorString":86,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",{"source":66,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":88,"cvss_v4_0":89},{"baseScore":58,"baseSeverity":82,"vectorString":61,"impactScore":58,"exploitabilityScore":83},{"baseScore":85,"baseSeverity":82,"vectorString":90,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[92],{"ecosystem":9,"name":93,"vendor":94,"product":95,"cpe_part":96,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":97},"EasyFlow .NET","digiwin","easyflow .net","a",[98,105,109],{"version":99,"is_range":100,"range_type":60,"version_start":101,"version_start_type":102,"version_end":103,"version_end_type":104,"fixed_in":9},"6.1.*",true,"6.1.0","including","6.2.0","excluding",{"version":106,"is_range":100,"range_type":60,"version_start":107,"version_start_type":102,"version_end":108,"version_end_type":104,"fixed_in":9},"6.6.*","6.6.0","6.7.0",{"version":110,"is_range":100,"range_type":60,"version_start":111,"version_start_type":102,"version_end":112,"version_end_type":102,"fixed_in":9},">= 8.1.1, \u003C= 8.1.2","8.1.1","8.1.2"]