{"uuid": "1564fa77-8bf7-44db-849d-ddf9102062fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5352", "type": "seen", "source": "https://t.me/arvinclub1/1118", "content": "\ud83d\udea8 CVE-2024-5352\nA vulnerability was found in anji-plus AJ-Report up to 1.4.1. It has been rated as critical. Affected by this issue is the function validationRules of the component com.anjiplus.template.gaea.business.modules.datasetparam.controller.DataSetParamController#verification. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266264.", "creation_timestamp": "2024-06-21T20:37:55.000000Z"}