This security bulletin contains one medium risk vulnerability.
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a lack of validation when filtering on the public API endpoints. A remote attacker can gain unauthorized access to sensitive information on the system.Mitigation
Install updates from vendor's website.Vulnerable software versions
Ghost: 5.0.0 - 5.46.0Fixed software versions
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?