Summary: | PHP could allow a remote attacker to bypass security restrictions, caused by a vulnerability in the include function. A remote attacker could send a specially-crafted URL request to the include function containing PHP code in a POST method, which would allow the attacker to bypass, include file filtering and execute unauthorized commands on the system. |