Filter
-Infinity
0

maven/io.dataease:commonDataEase's H2 datasource has a remote command execution risk

First published (updated )

DataeaseDataease PostgreSQL Data Source JDBC Connection Parameters Not Verified Leads to Deserialization Vulnerability

First published (updated )

DataeaseDataEase has a forged JWT token vulnerability

First published (updated )

DataeaseDataEase has an unauthorized vulnerability

First published (updated )

DataeaseCode Injection

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

DataeaseDataEase has an improper authentication vulnerability

EPSS
0.08%
First published (updated )

DataeaseDataEase data source has deserialization vulnerability

First published (updated )

DataeaseDataEase has a SQL injection vulnerability that can bypass blacklists

First published (updated )

DataeaseDataease Mysql Data Source JDBC Connection Parameters Not Verified Leads to Deserialization Vulnerability

First published (updated )

maven/io.dataease:dataease-plugin-commonCode Injection

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

DataeaseSQL injection vulnerability due to the keyword blacklist for defending against SQL injection will be bypassed

First published (updated )

DataeaseDataease arbitrary interface access vulnerability

First published (updated )

DataeaseThe Dataease datasource exists deserialization and arbitrary file read vulnerability

EPSS
0.05%
First published (updated )

DataeaseDataease Redshift Data Source JDBC Connection Parameters Not Verified Leads to RCE Vulnerability

8.8
First published (updated )

DataeaseIn DataEase v1.6.1, an authenticated user can gain unauthorized access to all user information and c…

8.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

DataeaseDataEase AWS redshift data source exists for remote code execution vulnerability

8.8
First published (updated )

DataeaseDataease Mysql JDBC Connection Parameters Not Verified Leads to Deserialization and Arbitrary File Read Vulnerability

8.6
First published (updated )

DataeaseDataease H2 JDBC Connection Remote Code Execution

8.2
EPSS
0.05%
First published (updated )

maven/io.dataease:dataease-plugin-commonDataEase API interface has IDOR vulnerability

8.1
First published (updated )

DataeaseUnauthorized users can delete applications in DataEase

8.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

DataeaseArbitrary File Reading in DataEase

7.5
First published (updated )

maven/io.dataease:dataease-plugin-commonSQL Injection

7.5
First published (updated )

maven/io.dataease:commonDataEase has an XXE vulnerability

7.5
First published (updated )

DataeaseDataEase has a vulnerability to obtain user cookies

7.5
First published (updated )

DataeaseSQL Injection

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

DataeaseDataEase Mysql JDBC Connection Parameters Not Being Verified Leads to Arbitrary File Read Vulnerability

7.3
First published (updated )

DataeaseDataease Mysql JDBC Connection Parameters Not Being Verified Leads to Arbitrary File Read Vulnerability​

7.3
EPSS
0.04%
First published (updated )

DataeaseDataEase dashboard has a stored XSS vulnerability

7.2
First published (updated )

DataeaseDataease file upload interface does not verify permission or file type

First published (updated )

DataeaseDataEase has a privilege bypass vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203