The Includer is reported prone to a remote arbitrary command execution vulnerability. This issue presents itself due to insufficient sanitization of user-supplied data. A remote attacker may exploit this vulnerability to execute arbitrary command in the context of the Web server that is hosting the affected software.
The Includer is reported prone to a remote arbitrary command execution vulnerability. This issue presents itself due to insufficient sanitization of user-supplied data. A remote attacker may exploit this vulnerability to execute arbitrary command in the context of the Web server that is hosting the affected software.