An arbitrary file upload vulnerability in /admin/ajax.php?action=save_uploads of Dynamic Transaction Queuing System v1.0 allows malicious users to execute arbitrary code via a crafted PHP file.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
dynamic transaction queuing system project dynamic transaction queuing system 1.0 |