Show filters
16 Total Results
Displaying 11-16 of 16
Sort by:
Attacker Value
Unknown
CVE-2021-38241
Disclosure Date: December 16, 2022 (last updated February 24, 2025)
Deserialization issue discovered in Ruoyi before 4.6.1 allows remote attackers to run arbitrary code via weak cipher in Shiro framework.
0
Attacker Value
Unknown
CVE-2022-4566
Disclosure Date: December 16, 2022 (last updated February 24, 2025)
A vulnerability, which was classified as critical, has been found in y_project RuoYi 4.7.5. This issue affects some unknown processing of the file com/ruoyi/generator/controller/GenController. The manipulation leads to sql injection. The name of the patch is 167970e5c4da7bb46217f576dc50622b83f32b40. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215975.
0
Attacker Value
Unknown
CVE-2022-4348
Disclosure Date: December 08, 2022 (last updated February 24, 2025)
A vulnerability was found in y_project RuoYi-Cloud. It has been rated as problematic. Affected by this issue is some unknown functionality of the component JSON Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215108.
0
Attacker Value
Unknown
CVE-2022-32065
Disclosure Date: July 13, 2022 (last updated February 24, 2025)
An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file.
0
Attacker Value
Unknown
CVE-2022-23869
Disclosure Date: March 30, 2022 (last updated February 23, 2025)
In RuoYi v4.7.2 through the WebUI, user test1 does not have permission to reset the password of user test3, but the password of user test3 can be reset through the /system/user/resetPwd request.
0
Attacker Value
Unknown
CVE-2022-23868
Disclosure Date: March 30, 2022 (last updated February 23, 2025)
RuoYi v4.7.2 contains a CSV injection vulnerability through ruoyi-admin when a victim opens .xlsx log file.
0