![]() The exploit has been disclosed to the public and may be used. The manipulation leads to path traversal. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. The identifier of this vulnerability is VDB-241028.Ī vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. The attack needs to be initiated within the local network. ![]() The manipulation of the argument full leads to path traversal. Affected by this issue is some unknown functionality of the file /rest/dir/. A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause tampering of files on the personal computer running C-Bus when using the File Command.Ī vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |