Metrics
Affected Vendors & Products
Tue, 13 May 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ruoyi
Ruoyi ruoyi |
|
| CPEs | cpe:2.3:a:ruoyi:ruoyi:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ruoyi
Ruoyi ruoyi |
Wed, 12 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in y_project RuoYi up to 4.8.0 and classified as critical. This vulnerability affects the function getBeanName of the component Whitelist. The manipulation leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | y_project RuoYi Whitelist getBeanName deserialization | |
| Weaknesses | CWE-20 CWE-502 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-01-27T19:00:12.136Z
Updated: 2025-02-12T20:01:11.854Z
Reserved: 2025-01-27T11:01:11.692Z
Link: CVE-2025-0734
Updated: 2025-02-12T19:53:13.246Z
Status : Analyzed
Published: 2025-01-27T19:15:19.130
Modified: 2025-05-13T20:47:37.097
Link: CVE-2025-0734
No data.