Corrupt a file II

Vulnerability