|
ASCET Interactive Huski CMS 'i' Parameter Local File Include Vulnerability
An attacker can exploit this issue via a browser. The following example URI is available: http://www.example.com/size.php?i=index.php Proof-of-concept code is also available: |
|
Privacy Statement |