Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2022-32065

An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 65.7%
CVSS Severity
CVSS v3 Score 5.4
CVSS v2 Score 3.5
Products affected by CVE-2022-32065
  • Ruoyi » Ruoyi » Version: N/A
    cpe:2.3:a:ruoyi:ruoyi:-
  • Ruoyi » Ruoyi » Version: 2.2
    cpe:2.3:a:ruoyi:ruoyi:2.2
  • Ruoyi » Ruoyi » Version: 2.3
    cpe:2.3:a:ruoyi:ruoyi:2.3
  • Ruoyi » Ruoyi » Version: 2.4
    cpe:2.3:a:ruoyi:ruoyi:2.4
  • Ruoyi » Ruoyi » Version: 3.0
    cpe:2.3:a:ruoyi:ruoyi:3.0
  • Ruoyi » Ruoyi » Version: 3.1
    cpe:2.3:a:ruoyi:ruoyi:3.1
  • Ruoyi » Ruoyi » Version: 3.2
    cpe:2.3:a:ruoyi:ruoyi:3.2
  • Ruoyi » Ruoyi » Version: 3.3
    cpe:2.3:a:ruoyi:ruoyi:3.3
  • Ruoyi » Ruoyi » Version: 3.4
    cpe:2.3:a:ruoyi:ruoyi:3.4
  • Ruoyi » Ruoyi » Version: 3.4.0
    cpe:2.3:a:ruoyi:ruoyi:3.4.0
  • Ruoyi » Ruoyi » Version: 4.0
    cpe:2.3:a:ruoyi:ruoyi:4.0
  • Ruoyi » Ruoyi » Version: 4.1
    cpe:2.3:a:ruoyi:ruoyi:4.1
  • Ruoyi » Ruoyi » Version: 4.2
    cpe:2.3:a:ruoyi:ruoyi:4.2
  • Ruoyi » Ruoyi » Version: 4.3
    cpe:2.3:a:ruoyi:ruoyi:4.3
  • Ruoyi » Ruoyi » Version: 4.3.1
    cpe:2.3:a:ruoyi:ruoyi:4.3.1
  • Ruoyi » Ruoyi » Version: 4.4
    cpe:2.3:a:ruoyi:ruoyi:4.4
  • Ruoyi » Ruoyi » Version: 4.5.0
    cpe:2.3:a:ruoyi:ruoyi:4.5.0
  • Ruoyi » Ruoyi » Version: 4.5.1
    cpe:2.3:a:ruoyi:ruoyi:4.5.1
  • Ruoyi » Ruoyi » Version: 4.6.0
    cpe:2.3:a:ruoyi:ruoyi:4.6.0
  • Ruoyi » Ruoyi » Version: 4.6.1
    cpe:2.3:a:ruoyi:ruoyi:4.6.1
  • Ruoyi » Ruoyi » Version: 4.6.2
    cpe:2.3:a:ruoyi:ruoyi:4.6.2
  • Ruoyi » Ruoyi » Version: 4.7.0
    cpe:2.3:a:ruoyi:ruoyi:4.7.0
  • Ruoyi » Ruoyi » Version: 4.7.1
    cpe:2.3:a:ruoyi:ruoyi:4.7.1
  • Ruoyi » Ruoyi » Version: 4.7.2
    cpe:2.3:a:ruoyi:ruoyi:4.7.2
  • Ruoyi » Ruoyi » Version: 4.7.3
    cpe:2.3:a:ruoyi:ruoyi:4.7.3


Contact Us

Shodan ® - All rights reserved