40 results (0.009 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

31 Oct 2024 — JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData. Se descubrió que JeecgBoot v3.7.1 contenía una vulnerabilidad de inyección SQL a través del componente /onlDragDatasetHead/getTotalData. • https://github.com/jeecgboot • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

10 Sep 2024 — An issue in the component /jeecg-boot/jmreport/dict/list of JimuReport v1.7.8 allows attacker to escalate privileges via a crafted GET request. • https://github.com/jeecgboot/JimuReport/issues/2904 • CWE-269: Improper Privilege Management •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

03 Jan 2024 — Deserialization of Untrusted Data in jeecgFormDemoController in JEECG 4.0 and earlier allows attackers to run arbitrary code via crafted POST request. La deserialización de datos que no son de confianza en jeecgFormDemoController en JEECG 4.0 y versiones anteriores permite a los atacantes ejecutar código arbitrario mediante una solicitud POST manipulada. • https://lemono.fun/thoughts/JEECG-RCE.html • CWE-502: Deserialization of Untrusted Data •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

30 Dec 2023 — SQL injection vulnerability in jeecg-boot version 3.5.3, allows remote attackers to escalate privileges and obtain sensitive information via the jmreport/qurestSql component. Vulnerabilidad de inyección SQL en jeecg-boot versión 3.5.3, permite a atacantes remotos escalar privilegios y obtener información confidencial a través del componente jmreport/qurestSql. • https://pho3n1x-web.github.io/2023/09/15/CVE-2023-41542%28JeecgBoot_sql%29 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 2

30 Dec 2023 — SQL injection vulnerability in jeecg-boot v3.5.3, allows remote attackers to escalate privileges and obtain sensitive information via the component /sys/replicate/check. Vulnerabilidad de inyección SQL en jeecg-boot v3.5.3, permite a atacantes remotos escalar privilegios y obtener información confidencial a través del componente /sys/replicate/check. • https://mp.weixin.qq.com/s/q6R-kaN4XS5d_cgWtq46vw • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

30 Dec 2023 — SSTI injection vulnerability in jeecg-boot version 3.5.3, allows remote attackers to execute arbitrary code via crafted HTTP request to the /jmreport/loadTableData component. Vulnerabilidad de inyección SSTI en jeecg-boot versión 3.5.3, permite a atacantes remotos ejecutar código arbitrario a través de una solicitud HTTP manipulada al componente /jmreport/loadTableData. • https://pho3n1x-web.github.io/2023/09/18/CVE-2023-41544%28JeecgBoot_SSTI%29 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

27 Nov 2023 — A vulnerability classified as critical was found in jeecgboot JimuReport up to 1.6.1. Affected by this vulnerability is an unknown functionality of the file /download/image. The manipulation of the argument imageUrl leads to relative path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/N0b1e6/exp/blob/main/README.md • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

22 Nov 2023 — Directory Traversal vulnerability in jeecg-boot v.3.6.0 allows a remote privileged attacker to obtain sensitive information via the file directory structure. La vulnerabilidad de Directory Traversal en jeecg-boot v.3.6.0 permite a un atacante remoto con privilegios obtener información confidencial a través de la estructura del directorio de archivos. • https://www.yuque.com/u2479829/tegvu8/dvmfdl5fssfen05q • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 1

22 Sep 2023 — SQL injection vulnerbility in jeecgboot jeecg-boot v 3.0, 3.5.3 that allows a remote attacker to execute arbitrary code via a crafted request to the report/jeecgboot/jmreport/queryFieldBySql component. Vulnerabilidad de inyección SQL en jeecgboot jeecg-boot v 3.0, 3.5.3 que permite a un atacante remoto ejecutar código arbitrario a través de una solicitud manipulada al componente report/jeecgboot/jmreport/queryFieldBySql. • https://github.com/Zone1-Z/CVE-2023-40989 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

08 Sep 2023 — Jeecg boot up to v3.5.3 was discovered to contain a SQL injection vulnerability via the component /jeecg-boot/jmreport/show. Se descubrió que el arranque de Jeecg hasta v3.5.3 contenía una vulnerabilidad de inyección SQL a través del componente /jeecg-boot/jmreport/show. • https://github.com/jeecgboot/jeecg-boot/issues/5311 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •