Do a bit if research into File Inclusion Vulnerability.
- What is it and Why it is dangerous and what are the difference of low and remote inclusion .What methods can me employed to prevent a security breach?
Do a bit if research into File Inclusion Vulnerability.