Total vulnerabilities in the database
Red Hat Conga 0.12.2 allows remote attackers to obtain sensitive information via a crafted request to the (1) homebase, (2) cluster, (3) storage, (4) portal_skins/custom, or (5) logs Luci extension.
Software | From | Fixed in |
---|---|---|
redhat / conga | 0.12.2 | 0.12.2.x |