jeecg Exploited Vulnerabilities
Jeecg vulnerabilities known to be exploited. Over the past 365 days, sorted by exploit discovery date.
Vulnerability Published:
ποΈ Published
- Anytime
Sort By:
ποΈ Published Date
- Descending
Improper Authorization Vulnerability in JeecgBoot by Jeecg Technology
CVE-2025-10981Jeecg TechnologyJeecgbootπΎπ‘5.3MEDIUMImproper Authorization in JeecgBoot Affects Multiple Versions
CVE-2025-10980JeecgJeecgbootπΎπ‘5.3MEDIUMImproper Authorization in JeecgBoot Affects Remote Functionality
CVE-2025-10979JeecgJeecgbootπΎπ‘5.3MEDIUMImproper Authorization in JeecgBoot Affects User Data Security
CVE-2025-10978JeecgJeecgbootπΎπ‘5.3MEDIUMImproper Authorization Vulnerability in JeecgBoot by Jeecg
CVE-2025-10977JeecgJeecgbootπΎπ‘2.3LOWImproper Authorization Vulnerability in JeecgBoot by Jeecg
CVE-2025-10976JeecgJeecgbootπΎπ‘2.3LOWImproper Authorization in JeecgBoot Versions Affects Remote Security
CVE-2025-10707JeecgJeecgbootπΎπ‘5.3MEDIUMImproper Authorization Vulnerability in JeecgBoot by Jeecg Technology
CVE-2025-10319Jeecg TechnologyJeecgbootπΎπ‘5.3MEDIUMImproper Authorization Vulnerability in JeecgBoot WebSocket Message Handler
CVE-2025-10318JeecgJeecgbootπΎπ‘5.3MEDIUMResource Consumption Vulnerability in JeecgBoot's Document Library Upload Function
CVE-2025-4533JeecgJeecgbootπΎπ‘5.1MEDIUM
