Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Farisc0de
Farisc0de uploady |
|
| Vendors & Products |
Farisc0de
Farisc0de uploady |
Thu, 26 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ulloady is a file uploader script with multi-file upload support. A Stored Cross-Site Scripting (XSS) vulnerability exists in versions prior to 3.1.2 due to improper sanitization of filenames during the file upload process. An attacker can upload a file with a malicious filename containing JavaScript code, which is later rendered in the application without proper escaping. When the filename is displayed in the file list or file details page, the malicious script executes in the browser of any user who views the page. Version 3.1.2 fixes the issue. | |
| Title | Uploady Vulnerable to Stored Cross-Site Scripting (XSS) | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T20:16:06.700Z
Reserved: 2026-03-23T15:23:42.218Z
Link: CVE-2026-33653
Updated: 2026-03-27T20:16:03.762Z
Status : Received
Published: 2026-03-26T22:16:29.220
Modified: 2026-03-26T22:16:29.220
Link: CVE-2026-33653
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:23:19Z