Total
2929 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2011-10004 | 1 Reciply Project | 1 Reciply | 2024-11-21 | 6.3 Medium |
A vulnerability was found in reciply Plugin up to 1.1.7 on WordPress. It has been rated as critical. This issue affects some unknown processing of the file uploadImage.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. Upgrading to version 1.1.8 is able to address this issue. The identifier of the patch is e3ff616dc08d3aadff9253f1085e13f677d0c676. It is recommended to upgrade the affected component. The identifier VDB-242189 was assigned to this vulnerability. | ||||
CVE-2010-4661 | 5 Debian, Fedoraproject, Opensuse and 2 more | 5 Debian Linux, Fedora, Opensuse and 2 more | 2024-11-21 | 7.8 High |
udisks before 1.0.3 allows a local user to load arbitrary Linux kernel modules. | ||||
CVE-2010-3663 | 1 Typo3 | 1 Typo3 | 2024-11-21 | 8.8 High |
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 contains an insecure default value of the variable fileDenyPattern which could allow remote attackers to execute arbitrary code on the backend. | ||||
CVE-2010-1433 | 1 Joomla | 1 Joomla\! | 2024-11-21 | 9.8 Critical |
Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 are vulnerable. | ||||
CVE-2006-6994 | 1 Indirmax.org | 1 Ozzywork Galeri | 2024-11-21 | N/A |
Unrestricted file upload vulnerability in add.asp in OzzyWork Gallery, possibly 2.0 and earlier, allows remote attackers to upload and execute arbitrary ASP files by removing the client-side security checks. | ||||
CVE-2006-5845 | 1 Speedywiki | 1 Speedywiki | 2024-11-21 | N/A |
Unrestricted file upload vulnerability in index.php in Speedywiki 2.0 allows remote authenticated users to upload and execute arbitrary PHP code by setting the upload parameter to 1. | ||||
CVE-2006-4558 | 1 Deluxebb | 1 Deluxebb | 2024-11-21 | N/A |
DeluxeBB 1.06 and earlier, when run on the Apache HTTP Server with the mod_mime module, allows remote attackers to execute arbitrary PHP code by uploading files with double extensions via the fileupload parameter in a newthread action in newpost.php. | ||||
CVE-2006-4471 | 1 Joomla | 1 Joomla\! | 2024-11-21 | N/A |
The Admin Upload Image functionality in Joomla! before 1.0.11 allows remote authenticated users to upload files outside of the /images/stories/ directory via unspecified vectors. | ||||
CVE-2006-2428 | 1 Duware Dubanner Project | 1 Duware Dubanner | 2024-11-21 | N/A |
add.asp in DUware DUbanner 3.1 allows remote attackers to execute arbitrary code by uploading files with arbitrary extensions, such as ASP files, probably due to client-side enforcement that can be bypassed. NOTE: some of these details are obtained from third party information, since the raw source is vague. | ||||
CVE-2005-3288 | 1 Rockliffe | 1 Mailsite Express | 2024-11-21 | N/A |
Mailsite Express allows remote attackers to upload and execute files with executable extensions such as ASP by attaching the file using the "compose page" feature, then accessing the file from the cache directory before saving or sending the message. | ||||
CVE-2005-1881 | 1 Yapig | 1 Yapig | 2024-11-20 | N/A |
upload.php in YaPiG 0.92b, 0.93u and 0.94u does not properly restrict the file extension for uploaded image files, which allows remote attackers to upload arbitrary files and execute arbitrary PHP code. | ||||
CVE-2005-1868 | 1 Yvesglodt | 1 I-man | 2024-11-20 | N/A |
I-Man 0.9, and possibly earlier versions, allows remote attackers to execute arbitrary PHP code by uploading a file attachment with a .php extension. | ||||
CVE-2004-2262 | 1 E107 | 1 E107 | 2024-11-20 | N/A |
ImageManager in e107 before 0.617 does not properly check the types of uploaded files, which allows remote attackers to execute arbitrary code by uploading a PHP file via the upload parameter to images.php. | ||||
CVE-2002-1841 | 1 Noguska | 1 Nola | 2024-11-20 | N/A |
The document management module in NOLA 1.1.1 and 1.1.2 does not restrict the types of files that are uploaded, which allows remote attackers to upload and execute arbitrary PHP files with extensions such as .php4. | ||||
CVE-2001-1099 | 2 Microsoft, Symantec | 2 Exchange Server, Norton Antivirus | 2024-11-20 | N/A |
The default configuration of Norton AntiVirus for Microsoft Exchange 2000 2.x allows remote attackers to identify the recipient's INBOX file path by sending an email with an attachment containing malicious content, which includes the path in the rejection notice. | ||||
CVE-2001-0901 | 1 Hypermail Development | 1 Hypermail | 2024-11-20 | N/A |
Hypermail allows remote attackers to execute arbitrary commands on a server supporting SSI via an attachment with a .shtml extension, which is archived on the server and can then be executed by requesting the URL for the attachment. | ||||
CVE-2001-0340 | 1 Microsoft | 1 Exchange Server | 2024-11-20 | N/A |
An interaction between the Outlook Web Access (OWA) service in Microsoft Exchange 2000 Server and Internet Explorer allows attackers to execute malicious script code against a user's mailbox via a message attachment that contains HTML code, which is executed automatically. | ||||
CVE-1999-0036 | 1 Sgi | 1 Irix | 2024-11-20 | 8.4 High |
IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files. | ||||
CVE-2024-52429 | 2 Anton Hoelstad, Antonhoelstad | 2 Wp Quick Setup, Wp Quick Setup | 2024-11-20 | 9.9 Critical |
Unrestricted Upload of File with Dangerous Type vulnerability in Anton Hoelstad WP Quick Setup allows Upload a Web Shell to a Web Server.This issue affects WP Quick Setup: from n/a through 2.0. | ||||
CVE-2024-11311 | 1 Trcore | 1 Dvc | 2024-11-20 | 9.8 Critical |
The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells. |