0 and categorised as vital. This situation influences some unknown processing from the file /classes/Customers.php?f=save. The manipulation from the argument img leads to unrestricted upload. The assault can be initiated remotely. The exploit has been disclosed to the general public and should be utilised. The linked identifier of this vulnerability https://allano913fbw1.bloggadores.com/profile