![]() The manipulation of the argument searchdata leads to sql injection. Affected by this vulnerability is an unknown functionality of the file /view-pass-detail.php of the component POST Request Handler. As a workaround, one may use environment variables instead of `config*.py` files to configure this project, or use docker-compose installation to configure this project.Ī vulnerability classified as critical was found in PHPGurukul Rail Pass Management System 1.0. This affects users that uses file configurations via `config.py`, `config_private.py`, `Dockerfile`. Since no sensitive files are configured to be off-limits, sensitive information files in some working directories can be read through the `/file` route, leading to sensitive information leakage. The manipulation of the argument file leads to information disclosure. This issue affects some unknown processing of the component Configuration File Handler. ![]() ![]() A vulnerability was found in gpt_academic 3.37 and prior. Gpt_academic provides a graphical interface for ChatGPT/GLM. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |