Secunia Research has discovered a vulnerability in Pulse CMS, which can be exploited by malicious people to conduct cross-site scripting attacks. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to e.g. upload or delete image files and create blocks if a logged-in user visits a malicious web site. Pulse CMS basic versions 1.2.2 and 1.2.3 are affected.
6125e265cda0af2a8650aa059c2134fa2d781fb01d61df0b1eb67fb15ee25a7f