The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
This Cyber News was published on www.tenable.com. Publication date: Sat, 05 Oct 2024 09:11:03 +0000