0 and categorised as significant. This issue affects some unknown processing from the file /classes/Customers.php?f=save. The manipulation from the argument img leads to unrestricted add. The attack could possibly be initiated remotely. The exploit has actually been disclosed to the public and will be utilized. The related identifier of the https://josephg567ere1.buscawiki.com/user