#path-traversal

[ follow ]
#vulnerabilities
Zero Day Initiative
1 week ago
JavaScript

Zero Day Initiative - Exploiting Exchange PowerShell After ProxyNotShell: Part 2 - ApprovedApplicationCollection

The blog post details two significant vulnerabilities in Microsoft Exchange related to RCE and a path traversal issue in a Windows utility. [ more ]
Hackernoon
3 years ago
Information security

A Deep Dive into Path Traversal Vulnerabilities | HackerNoon

Path traversal is a vulnerability in web applications allowing unauthorized access to files outside the web root folder. [ more ]
Zero Day Initiative
1 week ago
JavaScript

Zero Day Initiative - Exploiting Exchange PowerShell After ProxyNotShell: Part 2 - ApprovedApplicationCollection

The blog post details two significant vulnerabilities in Microsoft Exchange related to RCE and a path traversal issue in a Windows utility. [ more ]
Hackernoon
3 years ago
Information security

A Deep Dive into Path Traversal Vulnerabilities | HackerNoon

Path traversal is a vulnerability in web applications allowing unauthorized access to files outside the web root folder. [ more ]
morevulnerabilities
The Hacker News
3 weeks ago
Information security

Critical Flaws in Traccar GPS System Expose Users to Remote Attacks

Traccar GPS system has critical vulnerabilities allowing remote code execution via path traversal if guest registration is enabled, posing serious security risks. [ more ]
[ Load more ]