The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells.

Censys Search


Censys helps organizations, individuals, and researchers find and monitor every server on the Internet to reduce exposure and improve security.

Highlights

  • It's helpful to gather information on IP addresses, organizations, or other entities.
Listed: