![]() ![]() ![]() Users are recommended to upgrade to version 1.2.2, which fixes the issue. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.ĭeserialization of Untrusted Data vulnerability in Apache IoTDB.This issue affects Apache IoTDB: from 0.13.0 through 0.13.4. ![]() VDB-246134 is the identifier assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The manipulation leads to unrestricted upload. Affected by this issue is some unknown functionality of the component Apache Struts. The impact of this vulnerability is considered as Low, as the cluster_manager URL should not be exposed outside and is protected by user/password.Ī vulnerability, which was classified as critical, has been found in Xiamen Four-Faith Video Surveillance Management System 2016/2017. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. A flaw was found in the mod_proxy_cluster in the Apache server. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |