TorrentFlux-file.txt...

- AV AC AU C I A
发布: 2006-10-20
修订: 2025-04-13

Input passed to the file variable is not properly sanitized before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in an administrators browser session in context of an affected site when the Activity Log is viewed. An example is attempting to login with an incorrect username or password. Where the username field of /login.php contains the arbitrary code.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息