Total
2866 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-25277 | 1 Drupal | 1 Drupal | 2025-02-03 | 7.2 High |
Drupal core sanitizes filenames with dangerous extensions upon upload (reference: SA-CORE-2020-012) and strips leading and trailing dots from filenames to prevent uploading server configuration files (reference: SA-CORE-2019-010). However, the protections for these two vulnerabilities previously did not work correctly together. As a result, if the site were configured to allow the upload of files with an htaccess extension, these files' filenames would not be properly sanitized. This could allow bypassing the protections provided by Drupal core's default .htaccess files and possible remote code execution on Apache web servers. This issue is mitigated by the fact that it requires a field administrator to explicitly configure a file field to allow htaccess as an extension (a restricted permission), or a contributed module or custom code that overrides allowed file uploads. | ||||
CVE-2023-29240 | 1 F5 | 1 Big-iq Centralized Management | 2025-02-03 | 5.4 Medium |
An authenticated attacker granted a Viewer or Auditor role on a BIG-IQ can upload arbitrary files using an undisclosed iControl REST endpoint. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | ||||
CVE-2023-30266 | 1 Cltphp | 1 Cltphp | 2025-02-03 | 8.8 High |
CLTPHP <=6.0 is vulnerable to Unrestricted Upload of File with Dangerous Type. | ||||
CVE-2024-57761 | 2025-02-03 | 8.1 High | ||
An arbitrary file upload vulnerability in the parserXML() method of JeeWMS before v2025.01.01 allows attackers to execute arbitrary code via uploading a crafted file. | ||||
CVE-2024-40513 | 2025-02-03 | 4.6 Medium | ||
An issue in themesebrand Chatvia v.5.3.2 allows a remote attacker to execute arbitrary code via the User profile Upload image function. | ||||
CVE-2022-1565 | 1 Wpallimport | 1 Wp All Import | 2025-01-31 | 7.2 High |
The plugin WP All Import is vulnerable to arbitrary file uploads due to missing file type validation via the wp_all_import_get_gz.php file in versions up to, and including, 3.6.7. This makes it possible for authenticated attackers, with administrator level permissions and above, to upload arbitrary files on the affected sites server which may make remote code execution possible. | ||||
CVE-2024-46210 | 2025-01-31 | 7.2 High | ||
An arbitrary file upload vulnerability in the MediaPool module of Redaxo CMS v5.17.1 allows attackers to execute arbitrary code via uploading a crafted file. | ||||
CVE-2023-42248 | 2025-01-31 | 6.5 Medium | ||
An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can write arbitrary files by manipulating POST parameters of the page "common/vam_Sql.php". | ||||
CVE-2022-36769 | 2 Ibm, Redhat | 2 Cloud Pak For Data, Openshift | 2025-01-31 | 7.2 High |
IBM Cloud Pak for Data 4.5 and 4.6 could allow a privileged user to upload malicious files of dangerous types that can be automatically processed within the product's environment. IBM X-Force ID: 232034. | ||||
CVE-2023-29721 | 1 Sofawiki Project | 1 Sofawiki | 2025-01-31 | 9.8 Critical |
SofaWiki <= 3.8.9 has a file upload vulnerability that leads to command execution. | ||||
CVE-2023-29631 | 1 Joommasters | 1 Jms Slider | 2025-01-31 | 9.8 Critical |
PrestaShop jmsslider 1.6.0 is vulnerable to Incorrect Access Control via ajax_jmsslider.php. | ||||
CVE-2023-28409 | 1 Mw Wp Form Project | 1 Mw Wp Form | 2025-01-31 | 9.8 Critical |
Unrestricted upload of file with dangerous type exists in MW WP Form versions v4.4.2 and earlier, which may allow a remote unauthenticated attacker to upload an arbitrary file. | ||||
CVE-2023-27397 | 1 Microengine | 1 Mailform | 2025-01-31 | 9.8 Critical |
Unrestricted upload of file with dangerous type exists in MicroEngine Mailform version 1.1.0 to 1.1.8. If the product's file upload function and server save option are enabled, a remote attacker may save an arbitrary file on the server and execute it. | ||||
CVE-2023-29268 | 1 Tibco | 1 Spotfire Statistics Services | 2025-01-30 | 9.8 Critical |
The Splus Server component of TIBCO Software Inc.'s TIBCO Spotfire Statistics Services contains a vulnerability that allows an unauthenticated remote attacker to upload or modify arbitrary files within the web server directory on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Statistics Services: versions 11.4.10 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, and 12.0.2, versions 12.1.0 and 12.2.0. | ||||
CVE-2023-24269 | 1 Textpattern | 1 Textpattern | 2025-01-30 | 8.8 High |
An arbitrary file upload vulnerability in the plugin upload function of Textpattern v4.8.8 allows attackers to execute arbitrary code via a crafted Zip file. | ||||
CVE-2024-13448 | 1 Themerex | 1 Addons | 2025-01-30 | 9.8 Critical |
The ThemeREX Addons plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'trx_addons_uploads_save_data' function in all versions up to, and including, 2.32.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | ||||
CVE-2023-29635 | 1 Antabot White-jotter Project | 1 Antabot White-jotter | 2025-01-30 | 9.8 Critical |
File upload vulnerability in Antabot White-Jotter v0.2.2, allows remote attackers to execute malicious code via the file parameter to function coversUpload. | ||||
CVE-2022-47878 | 1 Jedox | 1 Jedox | 2025-01-30 | 9.1 Critical |
Incorrect input validation for the default-storage-path in the settings page in Jedox 2020.2.5 allows remote, authenticated users to specify the location as Webroot directory. Consecutive file uploads can lead to the execution of arbitrary code. | ||||
CVE-2023-0924 | 1 Zyrex | 1 Popup | 2025-01-30 | 7.2 High |
The ZYREX POPUP WordPress plugin through 1.0 does not validate the type of files uploaded when creating a popup, allowing a high privileged user (such as an Administrator) to upload arbitrary files, even when modifying the file system is disallowed, such as in a multisite install. | ||||
CVE-2023-30185 | 1 Crmeb | 1 Crmeb | 2025-01-29 | 9.8 Critical |
CRMEB v4.4 to v4.6 was discovered to contain an arbitrary file upload vulnerability via the component \attachment\SystemAttachmentServices.php. |