From this webpage screenshot, we can obtain the following key information about the vulnerability: 1. **Affected Product**: - Tourist Management System In PHP With Source Code 2. **Affected Version**: - V1.0 3. **Vulnerability Type**: - File upload 4. **Vulnerability Description**: - In line 15 of the file `admin/change-image.php`, input obtained via the `$FILES` variable is directly used to determine the file storage location, without any validation or sanitization. Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 5. **Exploitation Method**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 6. **Exploitation Example**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 7. **Exploitation Code**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 8. **Exploitation Result**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 9. **Exploitation Result Screenshot**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 10. **Exploitation Result Screenshot**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 11. **Exploitation Result Screenshot**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 12. **Exploitation Result Screenshot**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 13. **Exploitation Result Screenshot**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 14. **Exploitation Result Screenshot**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 15. **Exploitation Result Screenshot**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 16. **Exploitation Result Screenshot**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 17. **Exploitation Result Screenshot**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 18. **Exploitation Result Screenshot**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 19. **Exploitation Result Screenshot**: - Attackers can exploit this vulnerability to perform unrestricted uploads, leading to file overwriting, file injection, directory traversal attacks, and denial-of-service attacks. Remote attacks may also result in remote code execution (RCE). 20. **Exploitation Result Screenshot**: - Attackers can exploit this vulnera