![]() ![]() Snappy-java is a Java port of the snappy, a fast C++ compresser/decompresser developed by Google. The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. Unsafe deserialization in JSCAPE MFT Server versions prior to 2023.1.9 (Windows, Linux, and MacOS) permits an attacker to run arbitrary Java code (including OS commands) via its management interface Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. The identifier VDB-239857 was assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The manipulation leads to deserialization. ![]() Affected by this vulnerability is the function DriverManager.getConnection of the file src/main/java/org/spiderflow/controller/DataSourceController.java of the component API. A bug in the parser means that an input string of modest size can lead to indefinite amounts of memory being used.Ī vulnerability was found in spider-flow up to 0.5.0. VDB-240866 is the identifier assigned to this vulnerability.ĭenial of Service in JSON-Java versions up to and including 20230618. The manipulation leads to path traversal. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |