Total
3291 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-29637 | 1 Iminho | 1 Mindoc | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
An arbitrary file upload vulnerability in Mindoc v2.1-beta.5 allows attackers to execute arbitrary commands via a crafted Zip file. | |||||
CVE-2022-29632 | 1 Roncoo | 1 Roncoo-education | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An arbitrary file upload vulnerability in the component /course/api/upload/pic of Roncoo Education v9.0.0 allows attackers to execute arbitrary code via a crafted file. | |||||
CVE-2022-29624 | 1 Tpcms Project | 1 Tpcms | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
An arbitrary file upload vulnerability in the Add File function of TPCMS v3.2 allows attackers to execute arbitrary code via a crafted PHP file. | |||||
CVE-2022-29622 | 1 Formidable Project | 1 Formidable | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability. | |||||
CVE-2022-29451 | 1 Rarathemes | 1 Rara One Click Demo Import | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
Cross-Site Request Forgery (CSRF) leading to Arbitrary File Upload vulnerability in Rara One Click Demo Import plugin <= 1.2.9 on WordPress allows attackers to trick logged-in admin users into uploading dangerous files into /wp-content/uploads/ directory. | |||||
CVE-2022-29354 | 1 Keystonejs | 1 Keystone | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An arbitrary file upload vulnerability in the file upload module of Keystone v4.2.1 allows attackers to execute arbitrary code via a crafted file. | |||||
CVE-2022-29353 | 1 Graphql-upload Project | 1 Graphql-upload | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An arbitrary file upload vulnerability in the file upload module of Graphql-upload v13.0.0 allows attackers to execute arbitrary code via a crafted filename. | |||||
CVE-2022-29351 | 1 Tiddlywiki | 1 Tiddlywiki5 | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An arbitrary file upload vulnerability in the file upload module of Tiddlywiki5 v5.2.2 allows attackers to execute arbitrary code via a crafted SVG file. Note: The vendor argues that this is not a legitimate issue and there is no vulnerability here. | |||||
CVE-2022-29347 | 1 Web\@rchiv Project | 1 Web\@rchiv | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An arbitrary file upload vulnerability in Web@rchiv 1.0 allows attackers to execute arbitrary commands via a crafted PHP file. | |||||
CVE-2022-29318 | 1 Car Rental Management System Project | 1 Car Rental Management System | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
An arbitrary file upload vulnerability in the New Entry module of Car Rental Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file. | |||||
CVE-2022-29001 | 1 Springbootmovie Project | 1 Springbootmovie | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
In SpringBootMovie <=1.2, the uploaded file suffix parameter is not filtered, resulting in arbitrary file upload vulnerability | |||||
CVE-2022-28927 | 1 Subconverter Project | 1 Subconverter | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
A remote code execution (RCE) vulnerability in Subconverter v0.7.2 allows attackers to execute arbitrary code via crafted config and url parameters. | |||||
CVE-2022-28863 | 1 Nokia | 1 Netact | 2024-11-21 | N/A | 8.8 HIGH |
An issue was discovered in Nokia NetAct 22. A remote user, authenticated to the website, can visit the Site Configuration Tool section and arbitrarily upload potentially dangerous files without restrictions via the /netact/sct dir parameter in conjunction with the operation=upload value. | |||||
CVE-2022-28606 | 1 Bosscms | 1 Bosscms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An arbitrary file upload vulnerability exists in Wenzhou Huoyin Information Technology Co., Ltd. BossCMS 1.0, which can be exploited by an attacker to gain control of the server. | |||||
CVE-2022-28568 | 1 Simple Doctor\'s Appointment System Project | 1 Simple Doctor\'s Appointment System | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Sourcecodester Doctor's Appointment System 1.0 is vulnerable to File Upload to RCE via Image upload from the administrator panel. An attacker can obtain remote command execution just by knowing the path where the images are stored. | |||||
CVE-2022-28528 | 1 Bloofox | 1 Bloofoxcms | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
bloofoxCMS v0.5.2.1 was discovered to contain an arbitrary file upload vulnerability via /admin/index.php?mode=content&page=media&action=edit. | |||||
CVE-2022-28525 | 1 Ed01-cms Project | 1 Ed01-cms | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
ED01-CMS v20180505 was discovered to contain an arbitrary file upload vulnerability via /admin/users.php?source=edit_user&id=1. | |||||
CVE-2022-28440 | 1 Ucms Project | 1 Ucms | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
An arbitrary file upload vulnerability in UCMS v1.6 allows attackers to execute arbitrary code via a crafted PHP file. | |||||
CVE-2022-28397 | 1 Ghost | 1 Ghost | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An arbitrary file upload vulnerability in the file upload module of Ghost CMS v4.42.0 allows attackers to execute arbitrary code via a crafted file. NOTE: Vendor states as detailed in Ghost's security documentation, files can only be uploaded and published by trusted users, this is intentional | |||||
CVE-2022-28372 | 1 Verizon | 4 Lvskihp Indoorunit, Lvskihp Indoorunit Firmware, Lvskihp Outdoorunit and 1 more | 2024-11-21 | N/A | 7.5 HIGH |
On Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 and OutDoorUnit (ODU) 3.33.101.0 devices, the CRTC and ODU RPC endpoints provide a means of provisioning a firmware update for the device via crtc_fw_upgrade or crtcfwimage. The URL provided is not validated, and thus allows for arbitrary file upload to the device. This occurs in /lib/lua/luci/crtc.lua (IDU) and /lib/functions/wnc_jsonsh/wnc_crtc_fw.sh (ODU). |