![]() Affected by this vulnerability is an unknown functionality of the file novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java of the component Friendly Link Handler. VDB-249510 is the identifier assigned to this vulnerability.Ī vulnerability was found in Novel-Plus up to 4.2.0. ![]() The exploit has been disclosed to the public and may be used. It is possible to launch the attack remotely. The manipulation leads to code injection. Affected is the function FunctionService.saveFunction of the file src/main/java/org/spiderflow/controller/FunctionController.java. ![]() The identifier of this vulnerability is VDB-249868.Ī vulnerability, which was classified as critical, was found in spider-flow 0.4.3. This vulnerability affects the function getData of the file src/main/java/com/xhb/pay/action/PayTempOrderAction.java. As a workaround, do not load data which originated from an untrusted source or that could have been tampered with.Ī vulnerability classified as critical was found in fhs-opensource iparking 1.5.22.RELEASE. ![]() The patch is included in `ion-java` 1.10.5. An actor could craft Ion data that, when loaded by the affected application and/or processed using the `IonValue` model, results in a `StackOverflowError` originating from the `ion-java` library. Prior to version 1.10.5, a potential denial-of-service issue exists in `ion-java` for applications that use `ion-java` to deserialize Ion text encoded data, or deserialize Ion text or binary encoded data into the `IonValue` model and then invoke certain `IonValue` methods on that in-memory representation. Amazon Ion is a Java implementation of the Ion data notation. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |