National Cyber Warfare Foundation (NCWF) Forums


Multiple CData Vulnerabilities Let Attackers Bypass Security Restrictions


0 user ratings
2024-04-08 09:45:21
milo
Red Team (CNA)

 - archive -- 

A path traversal vulnerability was discovered in the Java versions of multiple CData products when using the embedded Jetty server, allowing remote attackers to potentially access sensitive information and perform limited actions on the system.  The vulnerability arises from the interplay between how the embedded Jetty server and CData servlets handle incoming requests, creating a […]


The post Multiple CData Vulnerabilities Let Attackers Bypass Security Restrictions appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.



Stop Advanced Phishing Attack With AI



AI-Powered Protection for Business Email Security


Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by
other email security solutions. .




Source: gbHackers
Source Link: https://gbhackers.com/multiple-cdata-vulnerabilities/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.