0 and categorised as vital. This issue impacts some not known processing from the file /classes/Customers.php?file=conserve. The manipulation with the argument img leads to unrestricted add. The assault may be initiated remotely. The exploit is disclosed to the public and may be utilised. The linked identifier of the vulnerability is VDB-270167.Wit