[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194074 Download | Alert*

net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname nor Port, and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.

The advisory is missing the security advisory description. For more information please visit the reference link

wpa: client support for WPA and WPA2 wpa_supplicant and hostapd could be made to expose sensitive information over the network.

The host is installed with Apache HTTP Server 2.4.20 through 2.4.39 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an issue in very early pushes of http/2. Successful exploitation could allow attackers to overwrite memory in the pushing request's pool, leading to crashes.

wpa: client support for WPA and WPA2 wpa_supplicant and hostapd could be made to expose sensitive information over the network.

The advisory is missing the security advisory description. For more information please visit the reference link

In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean

The Apache Commons BeanUtils library provides utility methods for accessing and modifying properties of arbitrary JavaBeans. Security Fix: * apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in th ...

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0, 12.2.1.3 or 12.2.1.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Console (Apache Commons Beanutils). Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0, 12.2.1.3 or 12.2.1.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Console (Apache Commons Beanutils). Successful exploitation can cause unspecified impact.


Pages:      Start    9206    9207    9208    9209    9210    9211    9212    9213    9214    9215    9216    9217    9218    9219    ..   19407

© SecPod Technologies