We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent c376efe commit 1604a9cCopy full SHA for 1604a9c
1 file changed
docs/releases.md
@@ -51,7 +51,7 @@ This leads the attacker to be able to execute any GET request on your local netw
51
52
#### The vulnerability
53
54
-The attack makes use of an unsanized input on an `fopen` call during a photo import.
+The attack makes use of an unsanitized input on an `fopen` call during a photo import.
55
This vulnerability would allow an attacker to effectively read any file on your internal network, including localhost.
56
57
In itself Lychee is not impacted. As in the attack will not compromise your photos, albums, etc.
0 commit comments