Show filters
27 Total Results
Displaying 1-10 of 27
Sort by:
Attacker Value
Unknown
CVE-2024-9506
Disclosure Date: October 15, 2024 (last updated October 16, 2024)
Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability.
0
Attacker Value
Unknown
CVE-2024-6783
Disclosure Date: July 23, 2024 (last updated July 24, 2024)
A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as `Object.prototype.staticClass` or `Object.prototype.staticStyle` to execute arbitrary JavaScript code.
0
Attacker Value
Unknown
CVE-2023-5718
Disclosure Date: October 23, 2023 (last updated November 01, 2023)
The Vue.js Devtools extension was found to leak screenshot data back to a malicious web page via the standard `postMessage()` API. By creating a malicious web page with an iFrame targeting a sensitive resource (i.e. a locally accessible file or sensitive website), and registering a listener on the web page, the extension sent messages back to the listener, containing the base64 encoded screenshot data of the sensitive resource.
0
Attacker Value
Unknown
CVE-2023-27748
Disclosure Date: April 13, 2023 (last updated October 08, 2023)
BlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authenticity check for uploaded firmware. This can allow attackers to upload crafted firmware which contains backdoors and enables arbitrary code execution.
0
Attacker Value
Unknown
CVE-2023-27747
Disclosure Date: April 13, 2023 (last updated October 08, 2023)
BlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authentication in its web server. This vulnerability allows attackers to access sensitive information such as configurations and recordings.
0
Attacker Value
Unknown
CVE-2023-27746
Disclosure Date: April 13, 2023 (last updated October 08, 2023)
BlackVue DR750-2CH LTE v.1.012_2022.10.26 was discovered to contain a weak default passphrase which can be easily cracked via a brute force attack if the WPA2 handshake is intercepted.
0
Attacker Value
Unknown
CVE-2022-47762
Disclosure Date: February 03, 2023 (last updated October 08, 2023)
In gin-vue-admin < 2.5.5, the download module has a Path Traversal vulnerability.
0
Attacker Value
Unknown
CVE-2022-39345
Disclosure Date: October 25, 2022 (last updated February 24, 2025)
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin prior to 2.5.4 is vulnerable to path traversal, which leads to file upload vulnerabilities. Version 2.5.4 contains a patch for this issue. There are no workarounds aside from upgrading to a patched version.
0
Attacker Value
Unknown
CVE-2022-39305
Disclosure Date: October 24, 2022 (last updated February 24, 2025)
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Versions prior to 2.5.4 contain a file upload ability. The affected code fails to validate fileMd5 and fileName parameters, resulting in an arbitrary file being read. This issue is patched in 2.5.4b. There are no known workarounds.
0
Attacker Value
Unknown
CVE-2022-32176
Disclosure Date: October 17, 2022 (last updated February 24, 2025)
In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3b are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the "Compress Upload" functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin's cookie leading to account takeover.
0