Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 22 Nov 2025 21:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anji-plus aj-report
|
|
| CPEs | cpe:2.3:a:anji-plus:aj-report:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Anji-plus aj-report
|
Fri, 21 Nov 2025 06:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-19 UTC. | anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC. |
Fri, 21 Nov 2025 02:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 21 Nov 2025 02:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server. | anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-19 UTC. |
Fri, 26 Sep 2025 04:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-280 |
Fri, 26 Sep 2025 03:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-288 |
Wed, 16 Jul 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 18 Sep 2024 01:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-Other |
Thu, 08 Aug 2024 01:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anji-plus
Anji-plus report |
|
| CPEs | cpe:2.3:a:anji-plus:report:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Anji-plus
Anji-plus report |
|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-22T12:13:00.900Z
Reserved: 2024-07-30T20:15:25.496Z
Link: CVE-2024-7314
Updated: 2024-08-07T15:51:18.034Z
Status : Modified
Published: 2024-08-02T17:16:41.400
Modified: 2025-11-20T22:15:53.973
Link: CVE-2024-7314
No data.
OpenCVE Enrichment
No data.