18 results (0.013 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

07 Oct 2024 — RuoYi v4.7.9 and before has a security flaw that allows escaping from comments within the code generation feature, enabling the injection of malicious code. • https://gist.github.com/kkll5875/f237f200bae6db6b47eea3236d82ad0d • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

28 Aug 2024 — Ruoyi v4.7.9 and before was discovered to contain a cross-site scripting (XSS) vulnerability via the sql parameter of the createTable() function at /tool/gen/create. • https://g03m0n.github.io/posts/cve-2024-42900 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

26 Aug 2024 — RuoYi CMS v4.7.9 was discovered to contain a SQL injection vulnerability via the job_id parameter at /sasfs1. • https://github.com/kkll5875/CVE-2024-42913 •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

19 Jul 2024 — Cross Site Scripting vulnerability in RuoYi v.4.7.9 and before allows a remote attacker to execute arbitrary code via the file upload method Vulnerabilidad de Cross Site Scripting en RuoYi v.4.7.9 y anteriores permite a un atacante remoto ejecutar código arbitrario a través del método de carga de archivos • https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41599 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

12 Apr 2024 — An issue was discovered in RuoYi v4.5.1, allows attackers to obtain sensitive information via the status parameter. Se descubrió un problema en RuoYi v4.5.1 que permite a los atacantes obtener información confidencial a través del parámetro de estado. • https://github.com/Fr1ezy/RuoYi_info • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

28 Dec 2023 — A vulnerability was found in y_project RuoYi 4.7.8. It has been declared as problematic. This vulnerability affects unknown code of the file /login of the component HTTP POST Request Handler. The manipulation of the argument rememberMe with the input falsen3f0m<script>alert(1)</script>p86o0 leads to cross site scripting. The attack can be initiated remotely. • https://1drv.ms/w/s!AgMfVZkPO1NWgSPnwk90DMQIUN_D?e=2Bauy4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

01 Dec 2023 — RuoYi up to v4.6 was discovered to contain a SQL injection vulnerability via /system/dept/edit. Se descubrió que RuoYi hasta v4.6 contenía una vulnerabilidad de inyección SQL a través de /system/dept/edit. • https://gist.github.com/Maverickfir/53405b944b2830b43a84abf4b1734847 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

11 Aug 2023 — An issue was discovered in getRememberedSerializedIdentity function in CookieRememberMeManager class in lerry903 RuoYi version 3.4.0, allows remote attackers to escalate privileges. • https://github.com/lerry903/RuoYi/issues/20 • CWE-269: Improper Privilege Management •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

21 Jul 2023 — A vulnerability, which was classified as problematic, has been found in y_project RuoYi up to 4.7.7. Affected by this issue is the function uploadFilesPath of the component File Upload. The manipulation of the argument originalFilenames leads to cross site scripting. The attack may be launched remotely. VDB-235118 is the identifier assigned to this vulnerability. • https://gitee.com/y_project/RuoYi/issues/I7IL85 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

08 Jun 2023 — A vulnerability was found in y_project RuoYi up to 4.7.7. It has been classified as problematic. Affected is the function filterKeyword. The manipulation of the argument value leads to resource consumption. VDB-231090 is the identifier assigned to this vulnerability. • https://github.com/George0Papasotiriou/CVE-2023-3163-SQL-Injection-Prevention • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE-400: Uncontrolled Resource Consumption •