CVE-2024-46076
https://notcve.org/view.php?id=CVE-2024-46076
07 Oct 2024 — RuoYi v4.7.9 and before has a security flaw that allows escaping from comments within the code generation feature, enabling the injection of malicious code. • https://gist.github.com/kkll5875/f237f200bae6db6b47eea3236d82ad0d • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-42900
https://notcve.org/view.php?id=CVE-2024-42900
28 Aug 2024 — Ruoyi v4.7.9 and before was discovered to contain a cross-site scripting (XSS) vulnerability via the sql parameter of the createTable() function at /tool/gen/create. • https://g03m0n.github.io/posts/cve-2024-42900 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-42913
https://notcve.org/view.php?id=CVE-2024-42913
26 Aug 2024 — RuoYi CMS v4.7.9 was discovered to contain a SQL injection vulnerability via the job_id parameter at /sasfs1. • https://github.com/kkll5875/CVE-2024-42913 •
CVE-2024-41599
https://notcve.org/view.php?id=CVE-2024-41599
19 Jul 2024 — Cross Site Scripting vulnerability in RuoYi v.4.7.9 and before allows a remote attacker to execute arbitrary code via the file upload method Vulnerabilidad de Cross Site Scripting en RuoYi v.4.7.9 y anteriores permite a un atacante remoto ejecutar código arbitrario a través del método de carga de archivos • https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41599 •
CVE-2024-29400
https://notcve.org/view.php?id=CVE-2024-29400
12 Apr 2024 — An issue was discovered in RuoYi v4.5.1, allows attackers to obtain sensitive information via the status parameter. Se descubrió un problema en RuoYi v4.5.1 que permite a los atacantes obtener información confidencial a través del parámetro de estado. • https://github.com/Fr1ezy/RuoYi_info • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2023-7133 – y_project RuoYi HTTP POST Request login cross site scripting
https://notcve.org/view.php?id=CVE-2023-7133
28 Dec 2023 — A vulnerability was found in y_project RuoYi 4.7.8. It has been declared as problematic. This vulnerability affects unknown code of the file /login of the component HTTP POST Request Handler. The manipulation of the argument rememberMe with the input falsen3f0m<script>alert(1)</script>p86o0 leads to cross site scripting. The attack can be initiated remotely. • https://1drv.ms/w/s!AgMfVZkPO1NWgSPnwk90DMQIUN_D?e=2Bauy4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2023-49371
https://notcve.org/view.php?id=CVE-2023-49371
01 Dec 2023 — RuoYi up to v4.6 was discovered to contain a SQL injection vulnerability via /system/dept/edit. Se descubrió que RuoYi hasta v4.6 contenía una vulnerabilidad de inyección SQL a través de /system/dept/edit. • https://gist.github.com/Maverickfir/53405b944b2830b43a84abf4b1734847 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2021-28411
https://notcve.org/view.php?id=CVE-2021-28411
11 Aug 2023 — An issue was discovered in getRememberedSerializedIdentity function in CookieRememberMeManager class in lerry903 RuoYi version 3.4.0, allows remote attackers to escalate privileges. • https://github.com/lerry903/RuoYi/issues/20 • CWE-269: Improper Privilege Management •
CVE-2023-3815 – y_project RuoYi File Upload uploadFilesPath cross site scripting
https://notcve.org/view.php?id=CVE-2023-3815
21 Jul 2023 — A vulnerability, which was classified as problematic, has been found in y_project RuoYi up to 4.7.7. Affected by this issue is the function uploadFilesPath of the component File Upload. The manipulation of the argument originalFilenames leads to cross site scripting. The attack may be launched remotely. VDB-235118 is the identifier assigned to this vulnerability. • https://gitee.com/y_project/RuoYi/issues/I7IL85 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2023-3163 – y_project RuoYi filterKeyword resource consumption
https://notcve.org/view.php?id=CVE-2023-3163
08 Jun 2023 — A vulnerability was found in y_project RuoYi up to 4.7.7. It has been classified as problematic. Affected is the function filterKeyword. The manipulation of the argument value leads to resource consumption. VDB-231090 is the identifier assigned to this vulnerability. • https://github.com/George0Papasotiriou/CVE-2023-3163-SQL-Injection-Prevention • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE-400: Uncontrolled Resource Consumption •