Genivia

Gsoap

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 15.01.2025 08:15:25
  • Zuletzt bearbeitet 15.01.2025 08:15:25

In Genivia gSOAP with a specific configuration an unauthenticated remote attacker can generate a high CPU load when forcing to parse an XML having duplicate ID attributes which can lead to a DoS.

Exploit
  • EPSS 1.36%
  • Veröffentlicht 25.03.2021 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:48:57

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

Exploit
  • EPSS 0.15%
  • Veröffentlicht 10.02.2021 20:15:15
  • Zuletzt bearbeitet 21.11.2024 05:01:32

A denial-of-service vulnerability exists in the WS-Security plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.

Exploit
  • EPSS 0.15%
  • Veröffentlicht 10.02.2021 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:01:31

A denial-of-service vulnerability exists in the WS-Security plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.

Exploit
  • EPSS 0.14%
  • Veröffentlicht 10.02.2021 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:01:31

A denial-of-service vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.

Exploit
  • EPSS 0.76%
  • Veröffentlicht 10.02.2021 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:01:32

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

Exploit
  • EPSS 0.15%
  • Veröffentlicht 10.02.2021 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:01:32

A denial-of-service vulnerability exists in the WS-Security plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.

Exploit
  • EPSS 15.69%
  • Veröffentlicht 21.03.2019 16:01:10
  • Zuletzt bearbeitet 21.11.2024 04:47:20

Sricam IP CCTV cameras are vulnerable to denial of service via multiple incomplete HTTP requests because the web server (based on gSOAP 2.8.x) is configured for an iterative queueing approach (aka non-threaded operation) with a timeout of several sec...

  • EPSS 0.68%
  • Veröffentlicht 09.02.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:48:28

Genivia gSOAP 2.7.x and 2.8.x before 2.8.75 allows attackers to cause a denial of service (application abort) or possibly have unspecified other impact if a server application is built with the -DWITH_COOKIES flag. This affects the C/C++ libgsoapck/l...

Exploit
  • EPSS 23.65%
  • Veröffentlicht 20.07.2017 00:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x before 2.8.48, as used on Axis cameras and other devices, allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and appli...