A Remote Command Execution vulnerability on the background in zrlog 2.2.2, at the upload avatar function, could bypass the original limit, upload the JSP file to get a WebShell
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
zrlog zrlog 2.2.2 |