![]() This release provides additional mitigation that prevents BApps from introducing this vulnerability even if they contain Swing components that allow HTML rendering. This issue was caused by Swing GUI components that were insecurely configured to render HTML. This could leak NetNTLM hashes on Windows systems that failed to block outbound SMB. Several months ago, we fixed an HTML injection vulnerability that could result in Burp Suite sending requests that did not respect its upstream proxy configuration.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |