A CMS plugin creates two filters that are accessible from the Internet: myplugin.html and exploitable.php. A newly discovered exploit takes advantage of an injection vulnerability in exploitable.php. To exploit the vulnerability, one must send an HTTP POST with specific variables to exploitable.php. You see traffic to your webserver that consists of only HTTP GET requests to myplugin.html.
Which category best describes this activity?
Urhan
Highly Voted 5 years, 6 months agoandikabram
Highly Voted 5 years, 1 month agoMcsonic00
Most Recent 4 years, 4 months agoanonymous1966
4 years, 4 months agoAlan2036
4 years, 8 months agoRedByte
4 years, 11 months ago