0 and categorized as important. This situation affects some mysterious processing from the file /classes/Buyers.php?file=conserve. The manipulation in the argument img brings about unrestricted upload. The assault could possibly be initiated remotely. The exploit is disclosed to the general public and could be employed. The related identifier of the vulnerability https://edwardb836pqo8.win-blog.com/profile