In spring cloud gateway versions before 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
vmware spring cloud gateway |
||
vmware spring cloud gateway 3.1.0 |
||
oracle commerce guided search 11.3.2 |
||
oracle communications cloud native core binding support function 1.11.0 |
||
oracle communications cloud native core binding support function 22.1.3 |
||
oracle communications cloud native core console 22.2.0 |
||
oracle communications cloud native core network exposure function 22.1.0 |
||
oracle communications cloud native core network function cloud native environment 1.10.0 |
||
oracle communications cloud native core network repository function 1.15.0 |
||
oracle communications cloud native core network repository function 1.15.1 |
||
oracle communications cloud native core network repository function 22.1.2 |
||
oracle communications cloud native core network repository function 22.2.0 |
||
oracle communications cloud native core network slice selection function 1.8.0 |
||
oracle communications cloud native core network slice selection function 22.1.0 |
||
oracle communications cloud native core security edge protection proxy 22.1.1 |
||
oracle communications cloud native core service communication proxy 1.15.0 |
IT threat evolution in Q1 2022 IT threat evolution in Q1 2022. Non-mobile statistics IT threat evolution in Q1 2022. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q1 2022: Kaspersky solutions blocked 1,216,350,437 attacks from online resources across the globe. Web Anti-Virus recognized 313,164,030 unique URLs as ma...
Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Sysrv-K malware infects unpatched tin, Microsoft warns
The latest variant of the Sysrv botnet malware is menacing Windows and Linux systems with an expanded list of vulnerabilities to exploit, according to Microsoft. The strain, which Microsoft's Security Intelligence team calls Sysrv-K, scans the internet for web servers that have security holes, such as path traversal, remote file disclosure, and arbitrary file download bugs, that can be exploited to infect the machines. The vulnerabilities, all of which have patches available, include flaws in Wo...