An attacker may leverage these issues to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application.
Vendor Status:
Currently we are not aware of any vendor-supplied patches.