5.5
CVSSv2

CVE-2022-21660

Published: 09/02/2022 Updated: 15/02/2022
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N

Vulnerability Summary

Gin-vue-admin is a backstage management system based on vue and gin. In versions before 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gin-vue-admin project gin-vue-admin

Github Repositories

Gin-Vue-admin垂直越权漏洞与代码分析-CVE-2022-21660 一、前言 欢迎各位大佬们给该项目点一个start githubcom/flipped-aurora/gin-vue-admin/ 文章写完了之后,申请CVE有一些麻烦,不过好在还是申请到了,github的员工响应迅速 ps 申请CVE前,已经提交了CNVD 二、环境搭

CVE-2022-2166 Improper Restriction of Excessive Authentication Attempts in GitHub repository mastodon/mastodon prior to 400 authentication complexity vector not available not available not available confidentiality integrity availability not available not available not available CVSS Score: not available References huntrdev/bounties/2f96f990-01

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f