![]() The exploit has been disclosed to the public and may be used. ![]() The manipulation of the argument processId leads to os command injection. Affected by this issue is some unknown functionality of the file /api/log/killJob of the component HTTP POST Request Handler. Commit db560de0b56476c87a2f967466407939196dd254 contains a fix for this issue.Ī vulnerability, which was classified as critical, has been found in WeiYe-Jing datax-web 2.1.2. Prior to commit db560de0b56476c87a2f967466407939196dd254, the /mehah/otclient "`Analysis - SonarCloud`" workflow is vulnerable to an expression injection in Actions, allowing an attacker to run commands remotely on the runner, leak secrets, and alter the repository using this workflow. ![]() OTCLient is an alternative tibia client for otserv. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |