2024-08-07 23:04:45
KoreLogic
PUBLISHED
Attacker controlled files can be uploaded to arbitrary locations on the web servers filesystem by abusing a path traversal vulnerability.