Unrestricted file upload vulnerability in Pulse CMS Basic 1.2.2 and 1.2.3, and possibly Pulse Pro before 1.3.2, allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory.
                
            References
                    | Link | Resource | 
|---|---|
| http://secunia.com/secunia_research/2010-47/ | Vendor Advisory | 
| http://pulsecms.com/blog.php | Patch Vendor Advisory | 
| http://secunia.com/advisories/39046 | Vendor Advisory | 
| http://www.securityfocus.com/archive/1/510617/100/0/threaded | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Information
                Published : 2010-04-09 10:30
Updated : 2018-10-10 12:55
NVD link : CVE-2010-0993
Mitre link : CVE-2010-0993
JSON object : View
CWE
                Products Affected
                pulsecms
- pulse_cms


