You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
Gin-vue-admin is a backstage management system based on vue and gin.
Gin-vue-admin <= v2.6.5 has SQL injection vulnerability. The SQL injection
vulnerabilities occur when a web application allows users to input data into SQL
queries without sufficiently validating or sanitizing the input. Failing to
properly enforce restrictions on user input could mean that even a basic form
input field can be used to inject arbitrary and potentially dangerous SQL
commands. This could lead to unauthorized access to the database, data leakage,
data manipulation, or even complete compromise of the database serv...
Advisory CVE-2024-37896 references a vulnerability in the following Go modules:
Description:
Gin-vue-admin is a backstage management system based on vue and gin.
Gin-vue-admin <= v2.6.5 has SQL injection vulnerability. The SQL injection
vulnerabilities occur when a web application allows users to input data into SQL
queries without sufficiently validating or sanitizing the input. Failing to
properly enforce restrictions on user input could mean that even a basic form
input field can be used to inject arbitrary and potentially dangerous SQL
commands. This could lead to unauthorized access to the database, data leakage,
data manipulation, or even complete compromise of the database serv...
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: