It was discovered that Apache Shiro mishandled specially crafted requests. An attacker could use this vulnerability to bypass authentication mechanisms.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.3.2-3~18.04.1", "binary_name": "libshiro-java" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.3.2-4ubuntu0.1", "binary_name": "libshiro-java" } ] }