exploit the possibilities
Showing 1 - 1 of 1 RSS Feed


Pulse CMS Arbitrary File Upload
Posted Apr 9, 2010
Site secunia.com

Secunia Research has discovered a vulnerability in Pulse CMS, which can be exploited by malicious users to compromise a vulnerable system. An error in the validation of uploaded image files can be exploited to upload files with an arbitrary extension to a folder within the web root. This can be exploited to upload and execute arbitrary PHP code. Successful exploitation requires authentication. Pulse CMS basic versions 1.2.2 and 1.2.3 are affected.

tags | advisory, web, arbitrary, root, php
advisories | CVE-2010-0993
MD5 | ffae58df4cfdea31c67e9fa56010a619
Page 1 of 1

Top Authors In Last 30 Days

packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By