0 and classified as significant. This challenge influences some unknown processing of the file /courses/Buyers.php?f=save. The manipulation with the argument img contributes to unrestricted add. The assault could possibly be initiated remotely. The exploit has become disclosed to the public and should be employed. The connected identifier of the vulnerability https://milesl403nqu2.ja-blog.com/profile