2026-02-04 10:26:53
NCSC-NL
PUBLISHED
This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.