In ABB IP GATEWAY 3.39 and prior, some configuration files contain passwords stored in plain-text, which may allow an attacker to gain unauthorized access. In ABB IP GATEWAY 3.39 and prior, the web server does not sufficiently verify that a request was performed by the authenticated user, which may allow an attacker to launch a request impersonating that user. This affects Useragent 2.1.12 and earlier.Ħ26 node module suffers from a Path Traversal vulnerability due to lack of validation of file, which allows a malicious user to read content of any file with known path. An attacker could edit their own headers, creating an arbitrarily long useragent string, causing the event loop and server to block. It uses several regular expressions to accomplish this. Useragent is used to parse useragent headers. 360class.jansenhm is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "./" in the url. 22lixian is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "./" in the url.ģ60class.jansenhm is a static file server. 11xiaoli is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "./" in the url.Ģ2lixian is a simple file server.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |