![]() This vulnerability affects applications with a request handler that accepts a `Body(media_type=RequestEncodingType.MULTI_PART)`. This is a remote, potentially unauthenticated Denial of Service vulnerability. The multipart body parser processes an unlimited number of file parts and an unlimited number of field parts. ![]() Prior to version 1.5.2, the request body parsing in `starlite` allows a potentially unauthenticated attacker to consume a large amount of CPU time and RAM. ![]() Starlite is an Asynchronous Server Gateway Interface (ASGI) framework. In the Linux kernel 6.0.8, there is a use-after-free in run_unpack in fs/ntfs3/run.c, related to a difference between NTFS sector size and media sector size.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |