Total
1580 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-37426 | 2 Linux, Opennebula | 2 Linux Kernel, Opennebula | 2022-11-01 | N/A | 7.5 HIGH |
Unrestricted Upload of File with Dangerous Type vulnerability in OpenNebula OpenNebula core on Linux allows File Content Injection. | |||||
CVE-2022-41681 | 1 Formalms | 1 Formalms | 2022-11-01 | N/A | 8.8 HIGH |
There is a vulnerability on Forma LMS version 3.1.0 and earlier that could allow an authenticated attacker (with the role of student) to privilege escalate in order to upload a Zip file through the SCORM importer feature. The exploitation of this vulnerability could lead to a remote code injection. | |||||
CVE-2022-39019 | 1 M-files | 1 Hubshare | 2022-11-01 | N/A | 7.5 HIGH |
Broken access controls on PDFtron WebviewerUI in M-Files Hubshare before 3.3.11.3 allows unauthenticated attackers to upload malicious files to the application server. | |||||
CVE-2022-33859 | 1 Eaton | 1 Foreseer Electrical Power Monitoring System | 2022-11-01 | N/A | 9.8 CRITICAL |
A security vulnerability was discovered in the Eaton Foreseer EPMS software. Foreseer EPMS connects an operation’s vast array of devices to assist in the reduction of energy consumption and avoid unplanned downtime caused by the failures of critical systems. A threat actor may upload arbitrary files using the file upload feature. This vulnerability is present in versions 4.x, 5.x, 6.x & 7.0 to 7.5. A new version (v7.6) containing the remediation has been made available by Eaton and a mitigation has been provided for the affected versions that are currently supported. Customers are advised to update the software to the latest version (v7.6). Foreseer EPMS versions 4.x, 5.x, 6.x are no longer supported by Eaton. Please refer to the End-of-Support notification https://www.eaton.com/in/en-us/catalog/services/foreseer/foreseer-legacy.html . | |||||
CVE-2022-42925 | 1 Formalms | 1 Formalms | 2022-11-01 | N/A | 8.8 HIGH |
There is a vulnerability on Forma LMS version 3.1.0 and earlier that could allow an authenticated attacker (with the role of student) to privilege escalate in order to upload a Zip file through the plugin upload component. The exploitation of this vulnerability could lead to a remote code injection. | |||||
CVE-2022-43283 | 1 Webassembly | 1 Wabt | 2022-11-01 | N/A | 5.5 MEDIUM |
wasm2c v1.0.29 was discovered to contain an abort in CWriter::Write. | |||||
CVE-2022-3770 | 1 Xjyunjing | 1 Yunjing Content Management System | 2022-11-01 | N/A | 8.8 HIGH |
A vulnerability classified as critical was found in Yunjing CMS. This vulnerability affects unknown code of the file /index/user/upload_img.html. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212500. | |||||
CVE-2022-40471 | 1 Clinic\'s Patient Management System Project | 1 Clinic\'s Patient Management System | 2022-11-01 | N/A | 9.8 CRITICAL |
Remote Code Execution in Clinic's Patient Management System v 1.0 allows Attacker to Upload arbitrary php webshell via profile picture upload functionality in users.php | |||||
CVE-2022-3771 | 1 Easyiicms | 1 Easyiicms | 2022-11-01 | N/A | 9.8 CRITICAL |
A vulnerability, which was classified as critical, has been found in easyii CMS. This issue affects the function file of the file helpers/Upload.php of the component File Upload Management. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The identifier VDB-212501 was assigned to this vulnerability. | |||||
CVE-2022-36452 | 1 Mitel | 1 Micollab | 2022-10-31 | N/A | 9.8 CRITICAL |
A vulnerability in the web conferencing component of Mitel MiCollab through 9.5.0.101 could allow an unauthenticated attacker to upload malicious files. A successful exploit could allow an attacker to execute arbitrary code within the context of the application. | |||||
CVE-2022-43231 | 1 Canteen Management System Project | 1 Canteen Management System | 2022-10-28 | N/A | 7.2 HIGH |
Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /youthappam/manage_website.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. | |||||
CVE-2022-39977 | 1 Online Pet Shop We App Project | 1 Online Pet Shop We App | 2022-10-28 | N/A | 7.2 HIGH |
Online Pet Shop We App v1.0 was discovered to contain an arbitrary file upload vulnerability via the Editing function in the User module. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file uploaded through the picture upload point. | |||||
CVE-2022-39978 | 1 Online Pet Shop We App Project | 1 Online Pet Shop We App | 2022-10-28 | N/A | 7.2 HIGH |
Online Pet Shop We App v1.0 was discovered to contain an arbitrary file upload vulnerability via the Editing function in the Product List module. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file uploaded through the picture upload point. | |||||
CVE-2022-43275 | 1 Canteen Management System Project | 1 Canteen Management System | 2022-10-28 | N/A | 7.2 HIGH |
Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /youthappam/php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. | |||||
CVE-2022-41711 | 1 Uatech | 1 Badaso | 2022-10-28 | N/A | 9.8 CRITICAL |
Badaso version 2.6.0 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application does not properly validate the data uploaded by users. | |||||
CVE-2022-34115 | 1 Dataease Project | 1 Dataease | 2022-10-27 | N/A | 9.8 CRITICAL |
DataEase v1.11.1 was discovered to contain a arbitrary file write vulnerability via the parameter dataSourceId. | |||||
CVE-2022-32176 | 1 Gin-vue-admin Project | 1 Gin-vue-admin | 2022-10-26 | N/A | 9.0 CRITICAL |
In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3b are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the "Compress Upload" functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin's cookie leading to account takeover. | |||||
CVE-2021-41178 | 1 Nextcloud | 1 Server | 2022-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading. | |||||
CVE-2021-24252 | 1 Wp-eventmanager | 1 Event Banner | 2022-10-25 | 6.5 MEDIUM | 7.2 HIGH |
The Event Banner WordPress plugin through 1.3 does not verify the uploaded image file, allowing admin accounts to upload arbitrary files, such as .exe, .php, or others executable, leading to RCE. Due to the lack of CSRF check, the issue can also be used via such vector to achieve the same result, or via a LFI as authorisation checks are missing (but would require WP to be loaded) | |||||
CVE-2021-24620 | 1 Simple-e-commerce-shopping-cart Project | 1 Simple-e-commerce-shopping-cart | 2022-10-25 | 6.8 MEDIUM | 8.8 HIGH |
The WordPress Simple Ecommerce Shopping Cart Plugin- Sell products through Paypal plugin through 2.2.5 does not check for the uploaded Downloadable Digital product file, allowing any file, such as PHP to be uploaded by an administrator. Furthermore, as there is no CSRF in place, attackers could also make a logged admin upload a malicious PHP file, which would lead to RCE |