CVE-2024-5351

A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been declared as critical. Affected by this vulnerability is the function getValueFromJs of the component Javascript Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266263.
Configurations

Configuration 1 (hide)

cpe:2.3:a:anji-plus:aj-report:*:*:*:*:*:*:*:*

History

01 Mar 2025, 02:33

Type Values Removed Values Added
CPE cpe:2.3:a:anji-plus:aj-report:*:*:*:*:*:*:*:*
References () https://vuldb.com/?ctiid.266263 - () https://vuldb.com/?ctiid.266263 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.266263 - () https://vuldb.com/?id.266263 - VDB Entry, Third Party Advisory
References () https://github.com/anji-plus/report/issues/34 - () https://github.com/anji-plus/report/issues/34 - Broken Link
References () https://github.com/anji-plus/report/files/15363269/aj-report.pdf - () https://github.com/anji-plus/report/files/15363269/aj-report.pdf - Exploit
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Anji-plus aj-report
Anji-plus

26 May 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-26 00:15

Updated : 2025-03-01 02:33


NVD link : CVE-2024-5351

Mitre link : CVE-2024-5351


JSON object : View

Products Affected

anji-plus

  • aj-report
CWE

No CWE.