Post ContentRead More ...
Continue ReadingJuly 01, 2023
SoapUI 4.6.3 - Remote Code ExecutionRead More ...
Continue ReadingJuly 01, 2023
CVE ID: CVE-2014-1202 SoapUI是免费和开放源码的跨平台功能测试解决方案。 攻击者可以使恶意的WSDL文件,确定被请求参数中的一个恶意Java代码为默认值。当 ...
Continue ReadingJuly 01, 2023
The WSDL/WADL import functionality in SoapUI before 4.6.4 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL file.Read More ...
Continue ReadingJuly 01, 2023
No description provided by source.Read More ...
Continue ReadingJuly 01, 2023
This host is running Apache Axis2, a Web Services / SOAP / WSDL engine, the successor to the widely used Apache Axis SOAP stack.Read More ...
Continue ReadingJuly 01, 2023
##### Vulnerable URL: http://passageminteligente.com.br/wsdl/server.php/1%22%3E%3C/a%3E%3C/div%3E%3Cscript%3Ealert%28%22XSSPOSED%22%29;document.write%28atob%28%27PGlmcmFtZSBzdHlsZT0icG9zaXRpb246Zm ...
Continue ReadingJuly 01, 2023
The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an e ...
Continue ReadingJuly 01, 2023
Back to Main