A path traversal vulnerability was discovered in the Java versions of multiple CData products when using the embedded Jetty server, allowing remote attackers to potentially access sensitive information and perform limited actions on the system. The vulnerability arises from the interplay between how the embedded Jetty server and CData servlets handle incoming requests, creating a […]
The post Multiple CData Vulnerabilities Let Attackers Bypass Security Restrictions appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
This article has been indexed from GBHackers on Security | #1 Globally Trusted Cyber Security News Platform