Multiple vulnerabilities have been identified in the software that may allow a remote attacker to access sensitive files and source code, carry out SQL injection and cross-site scripting attacks.
Multiple vulnerabilities have been identified in the software that may allow a remote attacker to access sensitive files and source code, carry out SQL injection and cross-site scripting attacks.