The flaw in the popular file uploader allows an attacker to upload files and run their own command line shell on any affected server.
The flaw in the popular file uploader allows an attacker to upload files and run their own command line shell on any affected server.