![]() ![]() The associated identifier of this vulnerability is VDB-240867.Ī vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. The exploit has been disclosed to the public and may be used. ![]() It is possible to initiate the attack remotely. The manipulation of the argument id leads to sql injection. This affects an unknown part of the file /resource/addgood.php. The associated identifier of this vulnerability is VDB-240871.Ī vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. The manipulation of the argument fileName leads to unrestricted upload. ![]() Affected by this vulnerability is the function isImg of the file /admin/config/uploadicon.php. A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |