2024-03-12 08:11:19
CERTVDE
PUBLISHED
An unauthenticated remote attacker can perform a log injection due to improper input validation. Only a certain log file is affected.