Last updated 2 years ago
Was this helpful?
You can create malicious files if you can upload them, and then use that, see RCE.