![]() ![]() The exploit has been disclosed to the public and may be used. The manipulation of the argument processId leads to os command injection. Affected by this issue is some unknown functionality of the file /api/log/killJob of the component HTTP POST Request Handler. Commit db560de0b56476c87a2f967466407939196dd254 contains a fix for this issue.Ī vulnerability, which was classified as critical, has been found in WeiYe-Jing datax-web 2.1.2. Prior to commit db560de0b56476c87a2f967466407939196dd254, the /mehah/otclient "`Analysis - SonarCloud`" workflow is vulnerable to an expression injection in Actions, allowing an attacker to run commands remotely on the runner, leak secrets, and alter the repository using this workflow. OTCLient is an alternative tibia client for otserv. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |