Total
3068 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-4311 | 1 Maurice | 1 Vrm360 | 2024-11-21 | N/A | 8.8 HIGH |
The Vrm 360 3D Model Viewer WordPress plugin through 1.2.1 is vulnerable to arbitrary file upload due to insufficient checks in a plugin shortcode. | |||||
CVE-2023-4243 | 1 Full | 1 Full - Customer | 2024-11-21 | N/A | 8.8 HIGH |
The FULL - Customer plugin for WordPress is vulnerable to Arbitrary File Upload via the /install-plugin REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to execute code by installing plugins from arbitrary remote locations including non-repository sources onto the site, granted they are packaged as a valid WordPress plugin. | |||||
CVE-2023-4226 | 1 Chamilo | 1 Chamilo Lms | 2024-11-21 | N/A | 8.8 HIGH |
Unrestricted file upload in `/main/inc/ajax/work.ajax.php` in Chamilo LMS <= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files. | |||||
CVE-2023-4225 | 1 Chamilo | 1 Chamilo Lms | 2024-11-21 | N/A | 8.8 HIGH |
Unrestricted file upload in `/main/inc/ajax/exercise.ajax.php` in Chamilo LMS <= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files. | |||||
CVE-2023-4224 | 1 Chamilo | 1 Chamilo Lms | 2024-11-21 | N/A | 8.8 HIGH |
Unrestricted file upload in `/main/inc/ajax/dropbox.ajax.php` in Chamilo LMS <= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files. | |||||
CVE-2023-4223 | 1 Chamilo | 1 Chamilo Lms | 2024-11-21 | N/A | 8.8 HIGH |
Unrestricted file upload in `/main/inc/ajax/document.ajax.php` in Chamilo LMS <= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files. | |||||
CVE-2023-4220 | 1 Chamilo | 1 Chamilo Lms | 2024-11-21 | N/A | 8.1 HIGH |
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell. | |||||
CVE-2023-4186 | 1 Pharmacy Management System Project | 1 Pharmacy Management System | 2024-11-21 | 6.5 MEDIUM | 6.3 MEDIUM |
A vulnerability was found in SourceCodester Pharmacy Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file manage_website.php. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-236221 was assigned to this vulnerability. | |||||
CVE-2023-4159 | 1 Omeka | 1 Omeka S | 2024-11-21 | N/A | 8.8 HIGH |
Unrestricted Upload of File with Dangerous Type in GitHub repository omeka/omeka-s prior to 4.0.3. | |||||
CVE-2023-4122 | 1 Imsurajghosh | 1 Student Information System | 2024-11-21 | N/A | 9.9 CRITICAL |
Student Information System v1.0 is vulnerable to an Insecure File Upload vulnerability on the 'photo' parameter of my-profile page, allowing an authenticated attacker to obtain Remote Code Execution on the server hosting the application. | |||||
CVE-2023-4121 | 1 Byzoro | 1 Smart S85f | 2024-11-21 | 6.5 MEDIUM | 6.3 MEDIUM |
A vulnerability was found in Byzoro Smart S85F Management Platform up to 20230722. It has been classified as critical. Affected is an unknown function. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235968. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | |||||
CVE-2023-4097 | 1 Qsige | 1 Qsige | 2024-11-21 | N/A | 8.8 HIGH |
The file upload functionality is not implemented correctly and allows uploading of any type of file. As a prerequisite, it is necessary for the attacker to log into the application with a valid username. | |||||
CVE-2023-49815 | 2024-11-21 | N/A | 10.0 CRITICAL | ||
Unrestricted Upload of File with Dangerous Type vulnerability in WappPress Team WappPress.This issue affects WappPress: from n/a through 5.0.3. | |||||
CVE-2023-49814 | 1 Symbiostock | 1 Symbiostock | 2024-11-21 | N/A | 9.1 CRITICAL |
Unrestricted Upload of File with Dangerous Type vulnerability in Symbiostock symbiostock.This issue affects Symbiostock: from n/a through 6.0.0. | |||||
CVE-2023-49715 | 1 Wwbn | 1 Avideo | 2024-11-21 | N/A | 4.3 MEDIUM |
A unrestricted php file upload vulnerability exists in the import.json.php temporary copy functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution when chained with an LFI vulnerability. An attacker can send a series of HTTP requests to trigger this vulnerability. | |||||
CVE-2023-49052 | 1 Microweber | 1 Microweber | 2024-11-21 | N/A | 8.8 HIGH |
File Upload vulnerability in Microweber v.2.0.4 allows a remote attacker to execute arbitrary code via a crafted script to the file upload function in the created forms component. | |||||
CVE-2023-48966 | 1 Thinkadmin | 1 Thinkadmin | 2024-11-21 | N/A | 8.8 HIGH |
An arbitrary file upload vulnerability in the component /admin/api.upload/file of ThinkAdmin v6.1.53 allows attackers to execute arbitrary code via a crafted Zip file. | |||||
CVE-2023-48965 | 1 Thinkadmin | 1 Thinkadmin | 2024-11-21 | N/A | 8.8 HIGH |
An issue in the component /admin/api.plugs/script of ThinkAdmin v6.1.53 allows attackers to getshell via providing a crafted URL to download a malicious PHP file. | |||||
CVE-2023-48930 | 1 Rockoa | 1 Xinhu | 2024-11-21 | N/A | 9.8 CRITICAL |
xinhu xinhuoa 2.2.1 contains a File upload vulnerability. | |||||
CVE-2023-48394 | 1 Kaifa | 1 Webitr Attendance System | 2024-11-21 | N/A | 8.8 HIGH |
Kaifa Technology WebITR is an online attendance system, its file uploading function does not restrict upload of file with dangerous type. A remote attacker with regular user privilege can exploit this vulnerability to upload arbitrary files to perform arbitrary command or disrupt service. |