2023-08-21 20:30:03
DIVD
PUBLISHED
Due to improper restriction, authenticated attackers could retrieve and read system files of the underlying server through the XML interface. The information that can be read can lead to a full system compromise.