CVE-2025-12305
- EPSS 0.08%
- Veröffentlicht 27.10.2025 18:32:08
- Zuletzt bearbeitet 05.11.2025 20:30:25
A vulnerability was found in quequnlong shiyi-blog up to 1.2.1. This impacts an unknown function of the file src/main/java/com/mojian/controller/SysJobController.java of the component Job Handler. The manipulation results in deserialization. The atta...
CVE-2025-5513
- EPSS 0.05%
- Veröffentlicht 03.06.2025 17:31:04
- Zuletzt bearbeitet 03.10.2025 01:07:07
A vulnerability has been found in quequnlong shiyi-blog up to 1.2.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dev-api/api/comment/add. The manipulation of the argument content leads to cros...
CVE-2025-5512
- EPSS 0.32%
- Veröffentlicht 03.06.2025 17:00:21
- Zuletzt bearbeitet 03.10.2025 01:14:16
A vulnerability, which was classified as critical, was found in quequnlong shiyi-blog up to 1.2.1. Affected is an unknown function of the file /api/sys/user/verifyPassword/ of the component Administrator Backend. The manipulation leads to improper au...
CVE-2025-5511
- EPSS 0.07%
- Veröffentlicht 03.06.2025 17:00:19
- Zuletzt bearbeitet 03.10.2025 01:15:42
A vulnerability, which was classified as critical, has been found in quequnlong shiyi-blog up to 1.2.1. This issue affects some unknown processing of the file /dev api/app/album/photos/. The manipulation leads to improper authorization. The attack ma...
CVE-2025-5510
- EPSS 0.1%
- Veröffentlicht 03.06.2025 16:31:04
- Zuletzt bearbeitet 09.06.2025 15:13:41
A vulnerability classified as critical was found in quequnlong shiyi-blog up to 1.2.1. This vulnerability affects unknown code of the file /app/sys/article/optimize. The manipulation of the argument url leads to server-side request forgery. The attac...
CVE-2025-5509
- EPSS 0.27%
- Veröffentlicht 03.06.2025 16:00:21
- Zuletzt bearbeitet 09.06.2025 15:14:15
A vulnerability classified as critical has been found in quequnlong shiyi-blog up to 1.2.1. This affects an unknown part of the file /api/file/upload. The manipulation of the argument file/source leads to path traversal. It is possible to initiate th...