IMG2ASCII may allow remote users to upload arbitrary files. If a malicious PHP script is uploaded to the vulnerable computer, it may be possible to request the script remotely and cause its contents to be executed. This would occur in the context of the Web server hosting the application. The vendor has not released any further information about this vulnerability except to state that it has been addressed with the release of IMG2ASCII 1.17.
IMG2ASCII may allow remote users to upload arbitrary files. If a malicious PHP script is uploaded to the vulnerable computer, it may be possible to request the script remotely and cause its contents to be executed. This would occur in the context of the Web server hosting the application. The vendor has not released any further information about this vulnerability except to state that it has been addressed with the release of IMG2ASCII 1.17.