![]() On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.Ī vulnerability was found in spider-flow up to 0.5.0. SAP BTP Security Services Integration Library ( cloud-security-services-integration-library) - versions below 2.17.0 and versions from 3.0.0 to before 3.3.0, allow under certain conditions an escalation of privileges. ![]() A bug in the parser means that an input string of modest size can lead to indefinite amounts of memory being used. The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.ĭenial of Service in JSON-Java versions up to and including 20230618. VDB-240866 is the identifier assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The manipulation leads to path traversal. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |