[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 80959 Download | Alert*

Libcue is intended for parsing a so-called cue sheet from a char string or a file pointer. For handling of the parsed data a convenient API is available.

Libcue is intended for parsing a so-called cue sheet from a char string or a file pointer. For handling of the parsed data a convenient API is available.

libcue: CUE Sheet Parser Library - development files CUE could be made to execute arbitrary code if it received a specially crafted file.

The host is missing a patch containing a security fixes, which affects the following package(s): invscout.rte

apache-log4j2: Apache Log4j - Logging Framework for Java Apache Log4j 2 could be made to crash or run programs as an administrator if it received a specially crafted input.

apache-log4j2: Apache Log4j - Logging Framework for Java Apache Log4j 2 could be made to crash if it received specially crafted input.

apache-log4j2: Apache Log4j - Logging Framework for Java Apache Log4j 2 could be made to crash or run programs as an administrator if it received a specially crafted input.

apache-log4j2: Apache Log4j - Logging Framework for Java Apache Log4j 2 could be made to crash if it received specially crafted input.

It was found that the fix to address CVE-2021-44228 in Apache Log4j, a Logging Framework for Java, was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup or a Thread Context Map pattern to craft malicious input data using a JNDI ...

Chen Zhaojun of Alibaba Cloud Security Team discovered a critical security vulnerability in Apache Log4j, a popular Logging Framework for Java. JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LD ...


Pages:      Start    3748    3749    3750    3751    3752    3753    3754    3755    3756    3757    3758    3759    3760    3761    ..   8095

© SecPod Technologies