0 and categorized as significant. This challenge affects some mysterious processing of the file /lessons/Buyers.php?file=preserve. The manipulation in the argument img contributes to unrestricted upload. The assault may very well be initiated remotely. The exploit is disclosed to the public and may be applied. The related identifier of the vulnerability https://harryp795seg4.wikiexpression.com/user