0 and classified as important. This situation affects some not known processing on the file /classes/Buyers.php?f=save. The manipulation with the argument img contributes to unrestricted add. The attack may be initiated remotely. The exploit has been disclosed to the public and could be utilized. The involved identifier of this vulnerability https://piersq269yby3.digitollblog.com/profile