Количество 6
Количество 6
CVE-2023-33546
Janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. NOTE: this is disputed by multiple parties because Janino is not intended for use with untrusted input.
CVE-2023-33546
Janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. NOTE: this is disputed by multiple parties because Janino is not intended for use with untrusted input.
CVE-2023-33546
Janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. NOTE: this is disputed by multiple parties because Janino is not intended for use with untrusted input.
CVE-2023-33546
Janino 3.1.9 and earlier are subject to denial of service (DOS) attack ...
SUSE-SU-2023:3385-1
Security update for janino
GHSA-gcg6-xv4f-f749
janino vulnerable to denial of service due to stack overflow
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-33546 Janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. NOTE: this is disputed by multiple parties because Janino is not intended for use with untrusted input. | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад | |
CVE-2023-33546 Janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. NOTE: this is disputed by multiple parties because Janino is not intended for use with untrusted input. | CVSS3: 6.2 | 0% Низкий | больше 2 лет назад | |
CVE-2023-33546 Janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. NOTE: this is disputed by multiple parties because Janino is not intended for use with untrusted input. | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад | |
CVE-2023-33546 Janino 3.1.9 and earlier are subject to denial of service (DOS) attack ... | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад | |
SUSE-SU-2023:3385-1 Security update for janino | 0% Низкий | больше 2 лет назад | ||
GHSA-gcg6-xv4f-f749 janino vulnerable to denial of service due to stack overflow | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад |
Уязвимостей на страницу