Category:Extensions with arbitrary execution vulnerabilities
![]() | Administrators, please do not delete this category! This category is automatically populated by {{Execution alert}} and so should not be deleted even if empty. |
This category contains extensions that are known to contain arbitrary script execution vulnerabilities. Usually, this means using something like exec(), shell_exec(), eval(), passthru() and even require/include() functions on unescaped user input. Extensions can be added to this category by using the {{Execution alert }} template to the page.
Pages in category "Extensions with arbitrary execution vulnerabilities"
This category contains only the following page.