Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 16 Apr 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo |
Mon, 21 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
J2eefast
J2eefast j2eefast |
|
| CPEs | cpe:2.3:a:j2eefast:j2eefast:*:*:*:*:*:*:*:* | |
| Vendors & Products |
J2eefast
J2eefast j2eefast |
|
| Metrics |
cvssV3_1
|
Fri, 18 Oct 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In J2eeFAST <=2.7, the backend function has unsafe filtering, which allows an attacker to trigger certain sensitive functions resulting in arbitrary code execution. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-21T18:07:32.534Z
Reserved: 2024-09-11T00:00:00.000Z
Link: CVE-2024-45944
Updated: 2024-10-21T18:07:25.680Z
Status : Analyzed
Published: 2024-10-18T19:15:14.293
Modified: 2025-04-16T15:04:00.610
Link: CVE-2024-45944
No data.
OpenCVE Enrichment
No data.