Page 2 of 40 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

08 Sep 2023 — Jeecg boot up to v3.5.3 was discovered to contain an arbitrary file read vulnerability via the interface /testConnection. Se descubrió que el arranque de Jeecg hasta v3.5.3 contenía una vulnerabilidad de lectura arbitraria de ficheros a través de la interfaz /testConnection. • https://github.com/Snakinya/Bugs/issues/1 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 2

21 Aug 2023 — A vulnerability was found in jeecgboot JimuReport up to 1.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Template Handler. The manipulation leads to injection. The attack can be launched remotely. • https://github.com/ilikeoyt/CVE-2023-4450-Attack • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 2

17 Aug 2023 — SQL injection vulnerability in Jeecg-boot v.3.5.0 and before allows a local attacker to cause a denial of service via the Benchmark, PG_Sleep, DBMS_Lock.Sleep, Waitfor, DECODE, and DBMS_PIPE.RECEIVE_MESSAGE functions. La vulnerabilidad de inyección SQL en Jeecg-boot v.3.5.0 y anteriores permite a un atacante local provocar una denegación de servicio a través de las funciones Benchmark, PG_Sleep, DBMS_Lock.Sleep, Waitfor, DECODE y DBMS_PIPE.RECEIVE_MESSAGE. • https://gist.github.com/wealeson1/e24fc8575f4e051320d69e9a75080642 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 1

28 Jul 2023 — jeecg-boot v3.5.1 was discovered to contain a SQL injection vulnerability via the title parameter at /sys/dict/loadTreeData. • https://github.com/jeecgboot/jeecg-boot/issues/5173 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

19 Jun 2023 — JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component queryTableDictItemsByCode at org.jeecg.modules.api.controller.SystemApiController. • https://github.com/jeecgboot/jeecg-boot/issues/4983 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

19 Jun 2023 — JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component queryFilterTableDictInfo at org.jeecg.modules.api.controller.SystemApiController. • https://github.com/jeecgboot/jeecg-boot/issues/4984 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 21%CPEs: 2EXPL: 1

16 Jun 2023 — jeecg-boot 3.5.0 and 3.5.1 have a SQL injection vulnerability the id parameter of the /jeecg-boot/jmreport/show interface. • https://github.com/jeecgboot/jeecg-boot/issues/4976 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 1

16 Jun 2023 — jjeecg-boot V3.5.0 has an unauthorized arbitrary file upload in /jeecg-boot/jmreport/upload interface. • https://github.com/jeecgboot/jeecg-boot/issues/4990 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.8EPSS: 2%CPEs: 1EXPL: 1

07 Jun 2023 — Jeecg P3 Biz Chat 1.0.5 allows remote attackers to read arbitrary files through specific parameters. • https://carl1l.github.io/2023/05/08/jeecg-p3-biz-chat-1-0-5-jar-has-arbitrary-file-read-vulnerability • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

31 Mar 2023 — A vulnerability was found in jeecg-boot 3.5.0 and classified as critical. This issue affects some unknown processing of the component API Documentation. The manipulation leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://note.youdao.com/ynoteshare/index.html?id=7eb8fc804ea3544d8add43749a09173e • CWE-287: Improper Authentication •