Show filters
27 Total Results
Displaying 1-10 of 27
Sort by:
Attacker Value
Unknown

CVE-2024-9506

Disclosure Date: October 15, 2024 (last updated October 16, 2024)
Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability.
0
Attacker Value
Unknown

CVE-2024-6783

Disclosure Date: July 23, 2024 (last updated July 24, 2024)
A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as `Object.prototype.staticClass` or `Object.prototype.staticStyle` to execute arbitrary JavaScript code.
0
Attacker Value
Unknown

CVE-2023-5718

Disclosure Date: October 23, 2023 (last updated November 01, 2023)
The Vue.js Devtools extension was found to leak screenshot data back to a malicious web page via the standard `postMessage()` API. By creating a malicious web page with an iFrame targeting a sensitive resource (i.e. a locally accessible file or sensitive website), and registering a listener on the web page, the extension sent messages back to the listener, containing the base64 encoded screenshot data of the sensitive resource.
Attacker Value
Unknown

CVE-2023-27748

Disclosure Date: April 13, 2023 (last updated October 08, 2023)
BlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authenticity check for uploaded firmware. This can allow attackers to upload crafted firmware which contains backdoors and enables arbitrary code execution.
Attacker Value
Unknown

CVE-2023-27747

Disclosure Date: April 13, 2023 (last updated October 08, 2023)
BlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authentication in its web server. This vulnerability allows attackers to access sensitive information such as configurations and recordings.
Attacker Value
Unknown

CVE-2023-27746

Disclosure Date: April 13, 2023 (last updated October 08, 2023)
BlackVue DR750-2CH LTE v.1.012_2022.10.26 was discovered to contain a weak default passphrase which can be easily cracked via a brute force attack if the WPA2 handshake is intercepted.
Attacker Value
Unknown

CVE-2022-47762

Disclosure Date: February 03, 2023 (last updated October 08, 2023)
In gin-vue-admin < 2.5.5, the download module has a Path Traversal vulnerability.
Attacker Value
Unknown

CVE-2022-39345

Disclosure Date: October 25, 2022 (last updated February 24, 2025)
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin prior to 2.5.4 is vulnerable to path traversal, which leads to file upload vulnerabilities. Version 2.5.4 contains a patch for this issue. There are no workarounds aside from upgrading to a patched version.
Attacker Value
Unknown

CVE-2022-39305

Disclosure Date: October 24, 2022 (last updated February 24, 2025)
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Versions prior to 2.5.4 contain a file upload ability. The affected code fails to validate fileMd5 and fileName parameters, resulting in an arbitrary file being read. This issue is patched in 2.5.4b. There are no known workarounds.
Attacker Value
Unknown

CVE-2022-32176

Disclosure Date: October 17, 2022 (last updated February 24, 2025)
In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3b are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the "Compress Upload" functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin's cookie leading to account takeover.