It is recommended to upgrade the affected component. Upgrading to version 4.52.01 is able to address this issue. The exploit has been disclosed to the public and may be used. The manipulation of the argument path/file leads to unrestricted upload. This vulnerability affects unknown code of the file /index.php?pluginApp/to/yzOffice/getFile of the component API Endpoint Handler. ![]() ![]() ![]() Authenticated attacker can exhaust server storage space to a point where the server can no longer serve requests.Ī vulnerability was found in kalcaddle KodExplorer up to 4.51.03. A vulnerable API method in M-Files Server before 5.0 allows for uncontrolled resource consumption.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |