Page 2 of 10 results (0.004 seconds)

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been rated as critical. Affected by this issue is the function validationRules of the component com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification. The manipulation leads to deserialization. The attack may be launched remotely. • https://github.com/anji-plus/report/files/15363269/aj-report.pdf https://github.com/anji-plus/report/issues/34 https://vuldb.com/?ctiid.266264 https://vuldb.com/?id.266264 • CWE-502: Deserialization of Untrusted Data •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been declared as critical. Affected by this vulnerability is the function getValueFromJs of the component Javascript Handler. The manipulation leads to deserialization. The attack can be launched remotely. • https://github.com/anji-plus/report/files/15363269/aj-report.pdf https://github.com/anji-plus/report/issues/34 https://vuldb.com/?ctiid.266263 https://vuldb.com/?id.266263 • CWE-502: Deserialization of Untrusted Data •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been classified as critical. Affected is the function pageList of the file /pageList. The manipulation of the argument p leads to sql injection. It is possible to launch the attack remotely. • https://github.com/anji-plus/report/files/15363269/aj-report.pdf https://github.com/anji-plus/report/issues/34 https://vuldb.com/?ctiid.266262 https://vuldb.com/?id.266262 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Report v0.9.8.6 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability. • https://github.com/Fw-fW-fw/UPDATE-CVE/blob/main/CVE-2022-46973 https://github.com/anji-plus/report/issues/15 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 2

anji-plus AJ-Report 0.9.8.6 allows remote attackers to bypass login authentication by spoofing JWT Tokens. anji-plus AJ-Report versión 0.9.8.6, permite a atacantes remotos omitir la autenticación de inicio de sesión mediante la suplantación de tokens JWT • https://gitee.com/anji-plus/report/issues/I5VVZ0 https://github.com/anji-plus/report/issues/7 • CWE-290: Authentication Bypass by Spoofing •