📦 Jeewms
by Huayi Tec
🔍 What is Jeewms?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
An arbitrary file upload vulnerability in JeeWMS allows attackers to upload malicious files that can lead to remote code execution. This affects all JeeWMS installations before version 2025.01.01. Att...
A stored cross-site scripting (XSS) vulnerability exists in erzhongxmu JEEWMS up to version 3.7, specifically in the doAdd function of JeecgListDemoController.java. This allows remote attackers to inj...
JEEWMS 1.0 contains a SQL injection vulnerability in the /systemControl.do interface where attackers can inject malicious SQL through id1 and id2 parameters. This allows unauthorized database access a...
This critical vulnerability in JeeWMS allows remote attackers to bypass access controls on the file handling component, potentially accessing or manipulating files without proper authorization. All Je...
This critical SQL injection vulnerability in JeeWMS allows attackers to execute arbitrary SQL commands through the /generateController.do?dogenerate endpoint. All JeeWMS installations up to version 20...
This critical SQL injection vulnerability in JeeWMS allows remote attackers to execute arbitrary SQL commands through the transEditor function. Any organization using JeeWMS up to May 4, 2025 is affec...
CVE-2025-5384 is a critical SQL injection vulnerability in JeeWMS that allows remote attackers to execute arbitrary SQL commands through the /cgAutoListController.do?datagrid endpoint. This affects al...
This critical SQL injection vulnerability in Jeewms allows remote attackers to execute arbitrary SQL commands by manipulating the store_code parameter in the datagridGraph function. Organizations usin...
This critical path traversal vulnerability in Jeewms allows attackers to access arbitrary files on the server by manipulating the /wmOmNoticeHController.do endpoint. Attackers can exploit this remotel...
This CVE describes an improper authorization vulnerability in the Druid monitoring interface of Jeewms warehouse management software. Attackers can remotely access sensitive monitoring data without au...