Show filters
237 Total Results
Displaying 1-10 of 237
Sort by:
Attacker Value
Very High

CVE-2020-25213

Disclosure Date: September 09, 2020 (last updated February 22, 2025)
The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.
Attacker Value
Very High

CVE-2020-24186

Disclosure Date: August 24, 2020 (last updated February 22, 2025)
A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.
Attacker Value
Very High

CVE-2020-11108

Disclosure Date: May 11, 2020 (last updated February 21, 2025)
The Gravity updater in Pi-hole through 4.4 allows an authenticated adversary to upload arbitrary files. This can be abused for Remote Code Execution by writing to a PHP file in the web directory. (Also, it can be used in conjunction with the sudo rule for the www-data user to escalate privileges to root.) The code error is in gravity_DownloadBlocklistFromUrl in gravity.sh.
Attacker Value
High

CVE-2020-10225

Disclosure Date: March 08, 2020 (last updated February 21, 2025)
An unauthenticated file upload vulnerability has been identified in admin/gallery.php in PHPGurukul Job Portal 1.0. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to the server, including PHP files, which could result in command execution.
Attacker Value
Very High

CVE-2020-7246

Disclosure Date: January 21, 2020 (last updated February 21, 2025)
A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An attacker can upload a malicious PHP code file via the profile photo functionality, by leveraging a path traversal vulnerability in the users['photop_preview'] delete photo feature, allowing bypass of .htaccess protection. NOTE: this issue exists because of an incomplete fix for CVE-2015-3884.
Attacker Value
Unknown

CVE-2020-12800

Disclosure Date: June 08, 2020 (last updated February 21, 2025)
The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file.
Attacker Value
Moderate

CVE-2020-10557

Disclosure Date: March 16, 2020 (last updated February 21, 2025)
An issue was discovered in AContent through 1.4. It allows the user to run commands on the server with a low-privileged account. The upload section in the file manager page contains an arbitrary file upload vulnerability via upload.php. The extension .php7 bypasses file upload restrictions.
Attacker Value
Very High

CVE-2020-10224

Disclosure Date: March 08, 2020 (last updated February 21, 2025)
An unauthenticated file upload vulnerability has been identified in admin_add.php in PHPGurukul Online Book Store 1.0. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to the server, including PHP files, which could result in command execution.
Attacker Value
Low

CVE-2020-8500

Disclosure Date: March 02, 2020 (last updated February 21, 2025)
In Artica Pandora FMS 7.42, Web Admin users can execute arbitrary code by uploading a .php file via the Updater or Extension component. NOTE: The vendor reports that this is intended functionality
Attacker Value
Unknown

CVE-2020-35797

Disclosure Date: December 30, 2020 (last updated February 22, 2025)
NETGEAR NMS300 devices before 1.6.0.27 are affected by command injection by an unauthenticated attacker.