A path traversal vulnerability was discovered in the Java versions of multiple CData products when using the embedded Jetty server, allowing remote attackers to potentially access sensitive information and perform limited actions on the system. The vulnerability arises from the interplay between how the embedded Jetty server and CData servlets handle incoming requests, creating a […]
The post Multiple CData Vulnerabilities Let Attackers Bypass Security Restrictions appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
Stop Advanced Phishing Attack With AI
AI-Powered Protection for Business Email Security
Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by
other email security solutions. .
Source: gbHackers
Source Link: https://gbhackers.com/multiple-cdata-vulnerabilities/