0 and categorised as important. This issue influences some unidentified processing in the file /classes/Users.php?file=preserve. The manipulation from the argument img leads to unrestricted add. The assault can be initiated remotely. The exploit has actually been disclosed to the public and will be employed. The connected identifier of the vulnerability https://anatolev282hkm8.answerblogs.com/profile