<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>File Upload on gryfman</title><link>https://gryfman.fr/tags/file-upload/</link><description>Recent content in File Upload on gryfman</description><generator>Hugo</generator><language>en-us</language><managingEditor>sussetnoe2004@gmail.com (gryfman)</managingEditor><webMaster>sussetnoe2004@gmail.com (gryfman)</webMaster><lastBuildDate>Mon, 27 Apr 2026 00:00:01 +0200</lastBuildDate><atom:link href="https://gryfman.fr/tags/file-upload/index.xml" rel="self" type="application/rss+xml"/><item><title>When uploaded files become scripts : CVE-2026-41467</title><link>https://gryfman.fr/cves/cve-2026-41467/</link><pubDate>Mon, 27 Apr 2026 00:00:01 +0200</pubDate><author>sussetnoe2004@gmail.com (gryfman)</author><guid>https://gryfman.fr/cves/cve-2026-41467/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;This post covers another stored XSS vulnerability in ProjeQtOr, this time through file upload.&lt;/p&gt;
&lt;h1 id="i-already-introduced-projeqtor-and-why-this-kind-of-application-can-contain-sensitive-business-data-in-the-first-article-of-the-series-from-login-to-admin--cve-2026-41462"&gt;&amp;laquo;&amp;laquo;&amp;laquo;&amp;lt; HEAD
I already introduced ProjeQtOr and why this kind of application can contain sensitive business data in the first article of the series: 
&lt;a href="https://gryfman.fr/cves/cve-2026-41462/"&gt;From login to admin : CVE-2026-41462&lt;/a&gt;
.&lt;/h1&gt;
&lt;p&gt;I already introduced ProjeQtOr and why this kind of application can contain sensitive business data in the first article of the series: 
&lt;a href="https://gryfman.fr/cve/cve-2026-41462/"&gt;From login to admin : CVE-2026-41462&lt;/a&gt;
.&lt;/p&gt;</description></item></channel></rss>