Attackers can call any existing functions at will,...
Critical severity
Unreviewed
Published
Nov 24, 2022
to the GitHub Advisory Database
•
Updated Feb 2, 2023
Description
Published by the National Vulnerability Database
Nov 24, 2022
Published to the GitHub Advisory Database
Nov 24, 2022
Last updated
Feb 2, 2023
Attackers can call any existing functions at will, control the target server to access, download, create files, delete files, etc. Access may make the server a dos server. Download, so that an attacker can download the PHP Trojan to the server. Creating and deleting will destroy normal services. More than ten IPs are using this service.
References