This question relates to cyber security and service side code execution.
In many cases I read about a vulnerability that allows an attacker to upload files. However, how do they get the file to execute? Normally it is mentioned as "vulnerability allowed for attacker to upload and execute the malicious payload". I would see uploading and being able to tell the server to execute it as two separate functions that require two separate exploits. Thoughts?