Metrics
Affected Vendors & Products
Wed, 12 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 27 Jan 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been found in y_project RuoYi up to 4.8.0 and classified as critical. This vulnerability affects the function getBeanName of the component Whitelist. The manipulation leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | y_project RuoYi Whitelist getBeanName deserialization | |
Weaknesses | CWE-20 CWE-502 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-02-12T20:01:11.854Z
Reserved: 2025-01-27T11:01:11.692Z
Link: CVE-2025-0734

Updated: 2025-02-12T19:53:13.246Z

Status : Received
Published: 2025-01-27T19:15:19.130
Modified: 2025-01-27T19:15:19.130
Link: CVE-2025-0734

No data.