![]() ![]() The exploit has been disclosed to the public and may be used. The manipulation leads to path traversal. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. The identifier of this vulnerability is VDB-241028.Ī vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. ![]() The attack needs to be initiated within the local network. The manipulation of the argument full leads to path traversal. Affected by this issue is some unknown functionality of the file /rest/dir/. A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause tampering of files on the personal computer running C-Bus when using the File Command.Ī vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |