edit-icon download-icon

Backdoor file vulnerability

Last Updated: Nov 15, 2017


The file is inserted into a section of backdoor code. Hackers can directly access this file to generate webshell on the website, leading to intrusion into the website.


Get the latest version of your website application from official channels.

Thank you! We've received your feedback.