An unauthenticated attacker can use Joomla eXtplorer, in order to access to the file system. Impacted products: Joomla Extensions. Severity: 2/4.
確定! 回上一頁