Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown
CVE-2024-55885
Disclosure Date: December 12, 2024 (last updated December 18, 2024)
beego is an open-source web framework for the Go programming language. Versions of beego prior to 2.3.4 use MD5 as a hashing algorithm. MD5 is no longer considered secure against well-funded opponents due to its vulnerability to collision attacks. Version 2.3.4 replaces MD5 with SHA256.
0
Attacker Value
Unknown
CVE-2024-40465
Disclosure Date: July 31, 2024 (last updated August 16, 2024)
An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the getCacheFileName function in file.go file
0
Attacker Value
Unknown
CVE-2024-40464
Disclosure Date: July 31, 2024 (last updated August 16, 2024)
An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the sendMail function located in beego/core/logs/smtp.go file
0
Attacker Value
Unknown
CVE-2022-31836
Disclosure Date: July 05, 2022 (last updated October 07, 2023)
The leafInfo.match() function in Beego v2.0.3 and below uses path.join() to deal with wildcardvalues which can lead to cross directory risk.
0
Attacker Value
Unknown
CVE-2022-31259
Disclosure Date: May 21, 2022 (last updated October 07, 2023)
The route lookup process in beego before 1.12.9 and 2.x before 2.0.3 allows attackers to bypass access control. When a /p1/p2/:name route is configured, attackers can access it by appending .xml in various places (e.g., p1.xml instead of p1).
0
Attacker Value
Unknown
CVE-2021-30080
Disclosure Date: April 05, 2022 (last updated May 08, 2024)
An issue was discovered in the route lookup process in beego before 1.12.11 that allows attackers to bypass access control.
0
Attacker Value
Unknown
CVE-2021-27117
Disclosure Date: April 05, 2022 (last updated October 07, 2023)
An issue was discovered in file profile.go in function GetCPUProfile in beego through 2.0.2, allows attackers to launch symlink attacks locally.
0
Attacker Value
Unknown
CVE-2021-27116
Disclosure Date: April 05, 2022 (last updated October 07, 2023)
An issue was discovered in file profile.go in function MemProf in beego through 2.0.2, allows attackers to launch symlink attacks locally.
0
Attacker Value
Unknown
CVE-2021-39391
Disclosure Date: September 14, 2021 (last updated February 23, 2025)
Cross Site Scripting (XSS) vulnerability exists in the admin panel in Beego v2.0.1 via the URI path in an HTTP request, which is activated by administrators viewing the "Request Statistics" page.
0
Attacker Value
Unknown
CVE-2019-16355
Disclosure Date: September 16, 2019 (last updated November 27, 2024)
The File Session Manager in Beego 1.10.0 allows local users to read session files because of weak permissions for individual files.
0