Show filters
1,053 Total Results
Displaying 101-110 of 1,053
Sort by:
Attacker Value
Unknown
CVE-2022-43074
Disclosure Date: November 10, 2022 (last updated February 24, 2025)
AyaCMS v3.1.2 was discovered to contain an arbitrary file upload vulnerability via the component /admin/fst_upload.inc.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
0
Attacker Value
Unknown
CVE-2022-39036
Disclosure Date: November 10, 2022 (last updated February 24, 2025)
The file upload function of Agentflow BPM has insufficient filtering for special characters in URLs. An unauthenticated remote attacker can exploit this vulnerability to upload arbitrary file and execute arbitrary code to manipulate system or disrupt service.
0
Attacker Value
Unknown
CVE-2022-43277
Disclosure Date: November 09, 2022 (last updated February 24, 2025)
Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via ip/youthappam/php_action/editFile.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
0
Attacker Value
Unknown
CVE-2022-40200
Disclosure Date: November 09, 2022 (last updated February 24, 2025)
Auth. (subscriber+) Arbitrary File Upload vulnerability in wpForo Forum plugin <= 2.0.9 on WordPress.
0
Attacker Value
Unknown
CVE-2022-40797
Disclosure Date: November 09, 2022 (last updated February 24, 2025)
Roxy Fileman 1.4.6 allows Remote Code Execution via a .phar upload, because the default FORBIDDEN_UPLOADS value in conf.json only blocks .php, .php4, and .php5 files. (Visiting any .phar file invokes the PHP interpreter in some realistic web-server configurations.)
0
Attacker Value
Unknown
CVE-2022-43050
Disclosure Date: November 07, 2022 (last updated February 24, 2025)
Online Tours & Travels Management System v1.0 was discovered to contain an arbitrary file upload vulnerability in the component update_profile.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
0
Attacker Value
Unknown
CVE-2022-43305
Disclosure Date: November 07, 2022 (last updated February 24, 2025)
The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-algorithms package. The affected version of d8s-htm is 0.1.0.
0
Attacker Value
Unknown
CVE-2022-44052
Disclosure Date: November 07, 2022 (last updated February 24, 2025)
The d8s-dates for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-timezones package. The affected version of d8s-htm is 0.1.0.
0
Attacker Value
Unknown
CVE-2022-44053
Disclosure Date: November 07, 2022 (last updated February 24, 2025)
The d8s-networking for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-user-agents package. The affected version of d8s-htm is 0.1.0.
0
Attacker Value
Unknown
CVE-2022-43303
Disclosure Date: November 07, 2022 (last updated February 24, 2025)
The d8s-strings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-uuids package. The affected version of d8s-htm is 0.1.0.
0