First published: Tue Jun 11 2024(Updated: )
If exploited an attacker could traverse the file system to access files or directories that would otherwise be inaccessible
Credit: cybersecurity@hitachienergy.com
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.