An issue was discovered in RuoYi v4.5.1, allows attackers to obtain sensitive information via the status parameter.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/Fr1ezy/RuoYi_info |
|
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 14 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ruoyi
Ruoyi ruoyi |
|
| CPEs | cpe:2.3:a:ruoyi:ruoyi:4.5.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Ruoyi
Ruoyi ruoyi |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T01:10:55.371Z
Reserved: 2024-03-19T00:00:00
Link: CVE-2024-29400
Updated: 2024-08-02T01:10:55.371Z
Status : Analyzed
Published: 2024-04-12T07:15:08.667
Modified: 2025-05-14T17:50:52.600
Link: CVE-2024-29400
No data.
OpenCVE Enrichment
No data.