No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Taoofagi
Taoofagi easegen-admin |
|
| Vendors & Products |
Taoofagi
Taoofagi easegen-admin |
Mon, 16 Mar 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in taoofagi easegen-admin up to 8f87936ac774065b92fb20aab55b274a6ea76433. This issue affects the function downloadFile of the file - yudao-module-digitalcourse/yudao-module-digitalcourse-biz/src/main/java/cn/iocoder/yudao/module/digitalcourse/util/PPTUtil.java of the component PPT File Handler. This manipulation of the argument url causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | taoofagi easegen-admin PPT File PPTUtil.java downloadFile server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-16T23:02:43.594Z
Reserved: 2026-03-16T16:26:03.909Z
Link: CVE-2026-4284
No data.
Status : Received
Published: 2026-03-16T23:16:21.703
Modified: 2026-03-16T23:16:21.703
Link: CVE-2026-4284
No data.
OpenCVE Enrichment
Updated: 2026-03-17T09:52:04Z