2024-02-25 19:00:42
@huntr_ai
PUBLISHED
Attacker, with permission to submit a link or submits a link via POST to be collected that is using the file:// protocol can then introspect host files and other relatively stored files.