Proof of concept exploit for Check Point Security Gateways that allows an unauthenticated remote attacker to read the contents of an arbitrary file located on the affected appliance.
7bb4866aa20c857a3bde162427591e069c170227d7fad3568d19f0f03e9a2e1e
© 2022 Packet Storm. All rights reserved.