Filtered by vendor J2eefast
Subscriptions
Filtered by product J2eefast
Subscriptions
Total
13 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-33147 | 1 J2eefast | 1 J2eefast | 2024-11-04 | 8.8 High |
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the authRoleList function. | ||||
CVE-2024-35083 | 1 J2eefast | 1 J2eefast | 2024-11-04 | 8.8 High |
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the findPage function in SysLoginInfoMapper.xml. | ||||
CVE-2024-45944 | 1 J2eefast | 1 J2eefast | 2024-10-21 | 9.8 Critical |
In J2eeFAST <=2.7, the backend function has unsafe filtering, which allows an attacker to trigger certain sensitive functions resulting in arbitrary code execution. | ||||
CVE-2021-28890 | 1 J2eefast | 1 J2eefast | 2024-08-03 | 9.8 Critical |
J2eeFAST 2.2.1 allows remote attackers to perform SQL injection via the (1) compId parameter to fast/sys/user/list, (2) deptId parameter to fast/sys/role/list, or (3) roleId parameter to fast/sys/role/authUser/list, related to the use of ${} to join SQL statements. | ||||
CVE-2023-2476 | 1 J2eefast | 1 J2eefast | 2024-08-02 | 3.5 Low |
A vulnerability was found in Dromara J2eeFAST up to 2.6.0. It has been classified as problematic. Affected is an unknown function of the component Announcement Handler. The manipulation of the argument 系统工具/公告管理 leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-227868. | ||||
CVE-2023-2475 | 1 J2eefast | 1 J2eefast | 2024-08-02 | 3.5 Low |
A vulnerability was found in Dromara J2eeFAST up to 2.6.0 and classified as problematic. This issue affects some unknown processing of the component System Message Handler. The manipulation of the argument 主题 leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-227867. | ||||
CVE-2024-33161 | 1 J2eefast | 1 J2eefast | 2024-08-02 | 5.3 Medium |
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the unallocatedList() function. | ||||
CVE-2024-33155 | 1 J2eefast | 1 J2eefast | 2024-08-02 | 9.8 Critical |
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the getDeptList() function. | ||||
CVE-2024-33149 | 1 J2eefast | 1 J2eefast | 2024-08-02 | 8.1 High |
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the myProcessList function. | ||||
CVE-2024-33139 | 1 J2eefast | 1 J2eefast | 2024-08-02 | 7.5 High |
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the findpage function. | ||||
CVE-2024-33164 | 1 J2eefast | 1 J2eefast | 2024-08-02 | 9.8 Critical |
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the authUserList() function. | ||||
CVE-2024-33146 | 1 J2eefast | 1 J2eefast | 2024-08-02 | 9.8 Critical |
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the export function. | ||||
CVE-2024-33144 | 1 J2eefast | 1 J2eefast | 2024-08-02 | 8.8 High |
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the findApplyedTasksPage function in BpmTaskMapper.xml. |
Page 1 of 1.