Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/jeecgboot/JimuReport/issues/2904 |
|
Tue, 10 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jeecg
Jeecg jimureport |
|
| Weaknesses | CWE-269 | |
| CPEs | cpe:2.3:a:jeecg:jimureport:1.7.8:*:*:*:*:*:*:* | |
| Vendors & Products |
Jeecg
Jeecg jimureport |
|
| Metrics |
cvssV3_1
|
Tue, 10 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in the component /jeecg-boot/jmreport/dict/list of JimuReport v1.7.8 allows attacker to escalate privileges via a crafted GET request. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-10T19:17:18.983Z
Reserved: 2024-08-21T00:00:00.000Z
Link: CVE-2024-44893
Updated: 2024-09-10T19:17:14.213Z
Status : Analyzed
Published: 2024-09-10T17:15:37.597
Modified: 2025-09-29T13:52:01.757
Link: CVE-2024-44893
No data.
OpenCVE Enrichment
No data.