2/5/2024 0 Comments RSS Guard 4.5.1 instal the new![]() allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. However, there is no check on the compilation parameters of Maven. In streampark, there is a project module that integrates Maven's compilation capability. The identifier VDB-239857 was assigned to this vulnerability. ![]() The exploit has been disclosed to the public and may be used. The manipulation leads to deserialization. Affected by this vulnerability is the function DriverManager.getConnection of the file src/main/java/org/spiderflow/controller/DataSourceController.java of the component API. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.Ī vulnerability was found in spider-flow up to 0.5.0. SAP BTP Security Services Integration Library ( cloud-security-services-integration-library) - versions below 2.17.0 and versions from 3.0.0 to before 3.3.0, allow under certain conditions an escalation of privileges. ![]() A bug in the parser means that an input string of modest size can lead to indefinite amounts of memory being used. VDB-240866 is the identifier assigned to this vulnerability.ĭenial of Service in JSON-Java versions up to and including 20230618. The manipulation leads to path traversal. ![]() Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |