0 and classified as critical. This problem affects some unfamiliar processing with the file /courses/Consumers.php?file=preserve. The manipulation of the argument img leads to unrestricted add. The attack could possibly be initiated remotely. The exploit has been disclosed to the general public and could be made use of. The related identifier https://hughw112yph4.popup-blog.com/profile