The affected product is vulnerable to directory traversal, which may allow an attacker to access unauthorized files and execute arbitrary code.
The affected product is vulnerable to directory traversal, which may allow an attacker to access unauthorized files and execute arbitrary code.