![]() ![]() The exploit has been disclosed to the public and may be used. ![]() The manipulation leads to deserialization. Affected by this vulnerability is the function DriverManager.getConnection of the file src/main/java/org/spiderflow/controller/DataSourceController.java of the component API. A bug in the parser means that an input string of modest size can lead to indefinite amounts of memory being used.Ī vulnerability was found in spider-flow up to 0.5.0. VDB-240866 is the identifier assigned to this vulnerability.ĭenial of Service in JSON-Java versions up to and including 20230618. The manipulation leads to path traversal. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |