0 and categorized as significant. This problem influences some not known processing in the file /courses/Buyers.php?f=preserve. The manipulation with the argument img leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be employed. The linked identifier of the vulnerability https://ferdinandc579vts9.blogtov.com/profile