📦 Holmes
by Wipro
🔍 What is Holmes?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows remote attackers to access sensitive log files in Wipro Holmes Orchestrator by exploiting a predictable /log URI. Attackers can read application logs containing potentially s...
This vulnerability allows remote attackers to read arbitrary files on Wipro Holmes Orchestrator servers via path traversal in the File Download API. Attackers can exploit this by sending specially cra...