Show filters
19 Total Results
Displaying 1-10 of 19
Sort by:
Attacker Value
Unknown

CVE-2025-0734

Disclosure Date: January 27, 2025 (last updated January 28, 2025)
A vulnerability has been found in y_project RuoYi up to 4.8.0 and classified as critical. This vulnerability affects the function getBeanName of the component Whitelist. The manipulation leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Attacker Value
Unknown

CVE-2024-9048

Disclosure Date: September 21, 2024 (last updated October 01, 2024)
A vulnerability was found in y_project RuoYi up to 4.7.9. It has been declared as problematic. Affected by this vulnerability is the function SysUserServiceImpl of the file ruoyi-system/src/main/java/com/ruoyi/system/service/impl/SysUserServiceImpl.java of the component Backend User Import. The manipulation of the argument loginName leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The patch is named 9b68013b2af87b9c809c4637299abd929bc73510. It is recommended to apply a patch to fix this issue.
Attacker Value
Unknown

CVE-2024-42913

Disclosure Date: August 26, 2024 (last updated September 06, 2024)
RuoYi CMS v4.7.9 was discovered to contain a SQL injection vulnerability via the job_id parameter at /sasfs1.
Attacker Value
Unknown

CVE-2024-41599

Disclosure Date: July 19, 2024 (last updated August 23, 2024)
Cross Site Scripting vulnerability in RuoYi v.4.7.9 and before allows a remote attacker to execute arbitrary code via the file upload method
Attacker Value
Unknown

CVE-2024-6511

Disclosure Date: July 04, 2024 (last updated July 05, 2024)
A vulnerability classified as problematic was found in y_project RuoYi up to 4.7.9. Affected by this vulnerability is the function isJsonRequest of the component Content-Type Handler. The manipulation of the argument HttpHeaders.CONTENT_TYPE leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-270343.
0
Attacker Value
Unknown

CVE-2023-7133

Disclosure Date: December 28, 2023 (last updated January 05, 2024)
A vulnerability was found in y_project RuoYi 4.7.8. It has been declared as problematic. This vulnerability affects unknown code of the file /login of the component HTTP POST Request Handler. The manipulation of the argument rememberMe with the input falsen3f0m<script>alert(1)</script>p86o0 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249136.
Attacker Value
Unknown

CVE-2023-49371

Disclosure Date: December 01, 2023 (last updated December 07, 2023)
RuoYi up to v4.6 was discovered to contain a SQL injection vulnerability via /system/dept/edit.
Attacker Value
Unknown

CVE-2021-28411

Disclosure Date: August 11, 2023 (last updated October 08, 2023)
An issue was discovered in getRememberedSerializedIdentity function in CookieRememberMeManager class in lerry903 RuoYi version 3.4.0, allows remote attackers to escalate privileges.
Attacker Value
Unknown

CVE-2023-3815

Disclosure Date: July 21, 2023 (last updated October 08, 2023)
A vulnerability, which was classified as problematic, has been found in y_project RuoYi up to 4.7.7. Affected by this issue is the function uploadFilesPath of the component File Upload. The manipulation of the argument originalFilenames leads to cross site scripting. The attack may be launched remotely. VDB-235118 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2023-3163

Disclosure Date: June 08, 2023 (last updated October 08, 2023)
A vulnerability was found in y_project RuoYi up to 4.7.7. It has been classified as problematic. Affected is the function filterKeyword. The manipulation of the argument value leads to resource consumption. VDB-231090 is the identifier assigned to this vulnerability.