![]() Also, within the specific context of Thorn SFTP gateway, this leads to remote code execution.Īn issue was identified that allowed the unsafe deserialization of java objects from hadoop or spark configuration properties that could have been modified by authenticated users. Thorn SFTP gateway 3.4.x before 3.4.4 uses Pivotal Spring Framework for Java deserialization of untrusted data, which is not supported by Pivotal, a related issue to CVE-2016-1000027. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. This vulnerability has been patched in version 3.9.0 HtmlUnit is vulnerable to Remote Code Execution (RCE) via XSTL, when browsing the attacker’s webpage. HtmlUnit is a GUI-less browser for Java programs. NETGEAR ProSAFE Network Management System has Java Debug Wire Protocol (JDWP) listening on port 11611 and it is remotely accessible by unauthenticated users, allowing attackers to execute arbitrary code. The identifier VDB-239857 was assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The manipulation leads to deserialization. Affected by this vulnerability is the function DriverManager.getConnection of the file src/main/java/org/spiderflow/controller/DataSourceController.java of the component API. A bug in the parser means that an input string of modest size can lead to indefinite amounts of memory being used.Ī vulnerability was found in spider-flow up to 0.5.0. VDB-240866 is the identifier assigned to this vulnerability.ĭenial of Service in JSON-Java versions up to and including 20230618. ![]() ![]() ![]() The manipulation leads to path traversal. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |