An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
At this point, the exploit attempts are attempting to enumerate vulnerable systems. Next, the attacker attempts to find the uploaded script. So far, the scans originate only from 169.150.226[.]162.
Collection
[
|
...
]