Total
3070 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-34944 | 1 Chamilo | 1 Chamilo Lms | 2024-11-21 | N/A | 9.8 CRITICAL |
An arbitrary file upload vulnerability in the /fileUpload.lib.php component of Chamilo 1.11.* up to v1.11.18 allows attackers to execute arbitrary code via uploading a crafted SVG file. | |||||
CVE-2023-34845 | 1 Bludit | 1 Bludit | 2024-11-21 | N/A | 5.4 MEDIUM |
Bludit v3.14.1 was discovered to contain an arbitrary file upload vulnerability in the component /admin/new-content. This vulnerability allows attackers to execute arbitrary web scripts or HTML via uploading a crafted SVG file. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration). | |||||
CVE-2023-34833 | 1 Thinkadmin | 1 Thinkadmin | 2024-11-21 | N/A | 6.1 MEDIUM |
An arbitrary file upload vulnerability in the component /api/upload.php of ThinkAdmin v6 allows attackers to execute arbitrary code via a crafted file. | |||||
CVE-2023-34798 | 1 Weaver | 1 E-office | 2024-11-21 | N/A | 9.8 CRITICAL |
An arbitrary file upload vulnerability in eoffice before v9.5 allows attackers to execute arbitrary code via uploading a crafted file. | |||||
CVE-2023-34738 | 1 Chemex | 1 Chemex | 2024-11-21 | N/A | 9.8 CRITICAL |
Chemex through 3.7.1 is vulnerable to arbitrary file upload. | |||||
CVE-2023-34736 | 1 Guantang Equipment Management System Project | 1 Guantang Equipment Management System | 2024-11-21 | N/A | 7.2 HIGH |
Guantang Equipment Management System version 4.12 is vulnerable to Arbitrary File Upload. | |||||
CVE-2023-34660 | 1 Jeecg | 1 Jeecg Boot | 2024-11-21 | N/A | 6.5 MEDIUM |
jjeecg-boot V3.5.0 has an unauthorized arbitrary file upload in /jeecg-boot/jmreport/upload interface. | |||||
CVE-2023-34394 | 1 Keysight | 1 Geolocation Server | 2024-11-21 | N/A | 7.8 HIGH |
In Keysight Geolocation Server v2.4.2 and prior, an attacker could upload a specially crafted malicious file or delete any file or directory with SYSTEM privileges due to an improper path validation, which could result in local privilege escalation or a denial-of-service condition. | |||||
CVE-2023-34385 | 1 Akshaymenariya | 1 Export Import Menus | 2024-11-21 | N/A | 9.9 CRITICAL |
Unrestricted Upload of File with Dangerous Type vulnerability in Akshay Menariya Export Import Menus.This issue affects Export Import Menus: from n/a through 1.8.0. | |||||
CVE-2023-34207 | 1 Easyuse | 1 Mailhunter Ultimate | 2024-11-21 | N/A | 9.9 CRITICAL |
Unrestricted upload of file with dangerous type vulnerability in create template function in EasyUse MailHunter Ultimate 2023 and earlier allows remote authenticated users to perform arbitrary system commands with ‘NT Authority\SYSTEM‘ privilege via a crafted ZIP archive. | |||||
CVE-2023-34193 | 1 Zimbra | 1 Collaboration | 2024-11-21 | N/A | 8.8 HIGH |
File Upload vulnerability in Zimbra ZCS 8.8.15 allows an authenticated privileged user to execute arbitrary code and obtain sensitive information via the ClientUploader function. | |||||
CVE-2023-34136 | 1 Sonicwall | 2 Analytics, Global Management System | 2024-11-21 | N/A | 9.8 CRITICAL |
Vulnerability in SonicWall GMS and Analytics allows unauthenticated attacker to upload files to a restricted location not controlled by the attacker. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions. | |||||
CVE-2023-34126 | 1 Sonicwall | 2 Analytics, Global Management System | 2024-11-21 | N/A | 8.8 HIGH |
Vulnerability in SonicWall GMS and Analytics allows an authenticated attacker to upload files on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions. | |||||
CVE-2023-34007 | 1 Wpchill | 1 Download Monitor | 2024-11-21 | N/A | 9.9 CRITICAL |
Unrestricted Upload of File with Dangerous Type vulnerability in WPChill Download Monitor.This issue affects Download Monitor: from n/a through 4.8.3. | |||||
CVE-2023-33493 | 1 Ajaxmanager Project | 1 Ajaxmanager | 2024-11-21 | N/A | 9.8 CRITICAL |
An Unrestricted Upload of File with Dangerous Type vulnerability in the Ajaxmanager File and Database explorer (ajaxmanager) module for PrestaShop through 2.3.0, allows remote attackers to upload dangerous files without restrictions. | |||||
CVE-2023-33480 | 1 Remoteclinic | 1 Remote Clinic | 2024-11-21 | N/A | 8.8 HIGH |
RemoteClinic 2.0 contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target system via a PHP shell. The vulnerabilities are caused by a lack of input validation and access control in the staff/register.php endpoint and the edit-my-profile.php page. By sending a series of specially crafted requests to the RemoteClinic application, an attacker can create admin users with more privileges than their own, upload a PHP file containing arbitrary code, and execute arbitrary commands via the PHP shell. | |||||
CVE-2023-33404 | 1 Blogengine | 1 Blogengine.net | 2024-11-21 | N/A | 9.8 CRITICAL |
An Unrestricted Upload vulnerability, due to insufficient validation on UploadControlled.cs file, in BlogEngine.Net version 3.3.8.0 and earlier allows remote attackers to execute remote code. | |||||
CVE-2023-33318 | 1 Woocommerce | 1 Automatewoo | 2024-11-21 | N/A | 9.9 CRITICAL |
Unrestricted Upload of File with Dangerous Type vulnerability in WooCommerce AutomateWoo.This issue affects AutomateWoo: from n/a through 4.9.40. | |||||
CVE-2023-33253 | 1 Agilebio | 1 Labcollector | 2024-11-21 | N/A | 8.8 HIGH |
LabCollector 6.0 though 6.15 allows remote code execution. An authenticated remote low-privileged user can upload an executable PHP file and execute system commands. The vulnerability is in the message function, and is due to insufficient validation of the file (such as shell.jpg.php.shell) being sent. | |||||
CVE-2023-32757 | 1 Edetw | 1 U-office Force | 2024-11-21 | N/A | 9.8 CRITICAL |
e-Excellence U-Office Force file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker without logging the service can exploit this vulnerability to upload arbitrary files to perform arbitrary command or disrupt service. |