lix up to and including 15.8.7 allows man-in-the-middle malicious users to execute arbitrary code by modifying the HTTP client-server data stream so that the Location header is associated with attacker-controlled executable content in the postDownload field.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
lix project lix |