2024-05-14 04:16:06
sap
PUBLISHED
An unauthenticated attacker can upload a malicious file to the server which when accessed by a victim can allow an attacker to completely compromise system.