Download Batch Text Replacer 2.1512/10/2023 ![]() ![]() Unsafe deserialization in JSCAPE MFT Server versions prior to 2023.1.9 (Windows, Linux, and MacOS) permits an attacker to run arbitrary Java code (including OS commands) via its management interface This vulnerability was patched in version 5.18.0. Users of RabbitMQ may suffer from DoS attacks from RabbitMQ Java client which will ultimately exhaust the memory of the consumer. ![]() Attackers could send a very large Message causing a memory overflow and triggering an OOM Error. `maxBodyLebgth` was not used when receiving Message objects. ![]() The RabbitMQ Java client library allows Java and JVM-based applications to connect to and interact with RabbitMQ nodes. This vulnerability has been patched in version 1.9.7. Within sbt's main code, `IO.unzip` is used in `pullRemoteCache` task and `Resolvers.remote` however many projects use `IO.unzip(.)` directly to implement custom tasks. This would have potential to overwrite `/root/.ssh/authorized_keys`. Given a specially crafted zip or JAR file, `IO.unzip` allows writing of arbitrary file. Sbt is a build tool for Scala, Java, and others. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. The identifier VDB-239857 was assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The manipulation leads to deserialization. Affected by this vulnerability is the function DriverManager.getConnection of the file src/main/java/org/spiderflow/controller/DataSourceController.java of the component API. A bug in the parser means that an input string of modest size can lead to indefinite amounts of memory being used.Ī vulnerability was found in spider-flow up to 0.5.0. VDB-240866 is the identifier assigned to this vulnerability.ĭenial of Service in JSON-Java versions up to and including 20230618. ![]() The manipulation leads to path traversal. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |