Filtered by vendor Gin-vue-admin Project
Subscriptions
Total
9 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-32176 | 1 Gin-vue-admin Project | 1 Gin-vue-admin | 2024-09-17 | 9.0 Critical |
In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3b are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the "Compress Upload" functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin's cookie leading to account takeover. | ||||
CVE-2022-32177 | 1 Gin-vue-admin Project | 1 Gin-vue-admin | 2024-09-16 | 9.0 Critical |
In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3beta are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the 'Normal Upload' functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin’s cookie leading to account takeover. | ||||
CVE-2021-44219 | 1 Gin-vue-admin Project | 1 Gin-vue-admin | 2024-08-04 | 9.8 Critical |
Gin-Vue-Admin before 2.4.6 mishandles a SQL database. | ||||
CVE-2022-47762 | 1 Gin-vue-admin Project | 1 Gin-vue-admin | 2024-08-03 | 7.5 High |
In gin-vue-admin < 2.5.5, the download module has a Path Traversal vulnerability. | ||||
CVE-2022-39345 | 1 Gin-vue-admin Project | 1 Gin-vue-admin | 2024-08-03 | 9.8 Critical |
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin prior to 2.5.4 is vulnerable to path traversal, which leads to file upload vulnerabilities. Version 2.5.4 contains a patch for this issue. There are no workarounds aside from upgrading to a patched version. | ||||
CVE-2022-39305 | 1 Gin-vue-admin Project | 1 Gin-vue-admin | 2024-08-03 | 9.8 Critical |
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Versions prior to 2.5.4 contain a file upload ability. The affected code fails to validate fileMd5 and fileName parameters, resulting in an arbitrary file being read. This issue is patched in 2.5.4b. There are no known workarounds. | ||||
CVE-2022-24844 | 2 Gin-vue-admin Project, Postgresql | 2 Gin-vue-admin, Postgresql | 2024-08-03 | 8.1 High |
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. The problem occurs in the following code in server/service/system/sys_auto_code_pgsql.go, which means that PostgreSQL must be used as the database for this vulnerability to occur. Users must: Require JWT login) and be using PostgreSQL to be affected. This issue has been resolved in version 2.5.1. There are no known workarounds. | ||||
CVE-2022-24843 | 1 Gin-vue-admin Project | 1 Gin-vue-admin | 2024-08-03 | 7.5 High |
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin 2.50 has arbitrary file read vulnerability due to a lack of parameter validation. This has been resolved in version 2.5.1. There are no known workarounds for this issue. | ||||
CVE-2022-21660 | 1 Gin-vue-admin Project | 1 Gin-vue-admin | 2024-08-03 | 8.1 High |
Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds. |
Page 1 of 1.