The WSDL/WADL import functionality in SoapUI before 4.6.4 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL file.Read More ...
Continue ReadingJuly 01, 2023
No description provided by source.Read More ...
Continue ReadingJuly 01, 2023
This host is running Apache Axis2, a Web Services / SOAP / WSDL engine, the successor to the widely used Apache Axis SOAP stack.Read More ...
Continue ReadingJuly 01, 2023
##### Vulnerable URL: https://passageminteligente.com.br/wsdl/server.php/1%22%3E%3C/a%3E%3C/div%3E%3Cscript%3Ealert%28%22XSSPOSED%22%29;document.write%28atob%28%27PGlmcmFtZSBzdHlsZT0icG9zaXRpb246Zm ...
Continue ReadingJuly 01, 2023
The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an e ...
Continue ReadingJuly 01, 2023
The remote host is missing a security patch.Read More ...
Continue ReadingJuly 01, 2023
### ç®è¦æè¿°ï¼ å æ¬ sqlæ³¨å ¥ ä»»ææ件ä¸è½½ è¶æ getshell xmlå®ä½æ³¨å ¥ æè°¢@loopx9大çå¸®å© ### � ...
Continue ReadingJuly 01, 2023
From Red Hat Security Advisory 2017:2424 : An update for java-1.7.0-openjdk is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this upda ...
Continue ReadingJune 30, 2023
Back to Main