Download
| Alert*
oval:org.secpod.oval:def:602415
Alvaro Muñoz and Christian Schneider discovered that BeanShell, an embeddable Java source interpreter, could be leveraged to execute arbitrary commands: applications including BeanShell in their classpath are vulnerable to this flaw if they deserialize data from an untrusted source. oval:org.secpod.oval:def:52731 bsh: Java scripting environment BeanShell could be made to run programs if it processed specially crafted input. oval:org.secpod.oval:def:703015 bsh: Java scripting environment BeanShell could be made to run programs if it processed specially crafted input. |