Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Exposure of Core Dump File to an Unauthorized Control Sphere

The product generates a core dump file in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.