Show filters
1,053 Total Results
Displaying 101-110 of 1,053
Sort by:
Attacker Value
Unknown

CVE-2022-43074

Disclosure Date: November 10, 2022 (last updated February 24, 2025)
AyaCMS v3.1.2 was discovered to contain an arbitrary file upload vulnerability via the component /admin/fst_upload.inc.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
Attacker Value
Unknown

CVE-2022-39036

Disclosure Date: November 10, 2022 (last updated February 24, 2025)
The file upload function of Agentflow BPM has insufficient filtering for special characters in URLs. An unauthenticated remote attacker can exploit this vulnerability to upload arbitrary file and execute arbitrary code to manipulate system or disrupt service.
Attacker Value
Unknown

CVE-2022-43277

Disclosure Date: November 09, 2022 (last updated February 24, 2025)
Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via ip/youthappam/php_action/editFile.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
Attacker Value
Unknown

CVE-2022-40200

Disclosure Date: November 09, 2022 (last updated February 24, 2025)
Auth. (subscriber+) Arbitrary File Upload vulnerability in wpForo Forum plugin <= 2.0.9 on WordPress.
Attacker Value
Unknown

CVE-2022-40797

Disclosure Date: November 09, 2022 (last updated February 24, 2025)
Roxy Fileman 1.4.6 allows Remote Code Execution via a .phar upload, because the default FORBIDDEN_UPLOADS value in conf.json only blocks .php, .php4, and .php5 files. (Visiting any .phar file invokes the PHP interpreter in some realistic web-server configurations.)
Attacker Value
Unknown

CVE-2022-43050

Disclosure Date: November 07, 2022 (last updated February 24, 2025)
Online Tours & Travels Management System v1.0 was discovered to contain an arbitrary file upload vulnerability in the component update_profile.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
Attacker Value
Unknown

CVE-2022-43305

Disclosure Date: November 07, 2022 (last updated February 24, 2025)
The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-algorithms package. The affected version of d8s-htm is 0.1.0.
Attacker Value
Unknown

CVE-2022-44052

Disclosure Date: November 07, 2022 (last updated February 24, 2025)
The d8s-dates for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-timezones package. The affected version of d8s-htm is 0.1.0.
Attacker Value
Unknown

CVE-2022-44053

Disclosure Date: November 07, 2022 (last updated February 24, 2025)
The d8s-networking for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-user-agents package. The affected version of d8s-htm is 0.1.0.
Attacker Value
Unknown

CVE-2022-43303

Disclosure Date: November 07, 2022 (last updated February 24, 2025)
The d8s-strings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-uuids package. The affected version of d8s-htm is 0.1.0.