Show filters
540 Total Results
Displaying 31-40 of 540
Sort by:
Attacker Value
Unknown
CVE-2021-42125
Disclosure Date: December 07, 2021 (last updated February 23, 2025)
An unrestricted file upload vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to write dangerous files.
0
Attacker Value
Unknown
CVE-2021-43936
Disclosure Date: December 06, 2021 (last updated February 23, 2025)
The software allows the attacker to upload or transfer files of dangerous types to the WebHMI portal, that may be automatically processed within the product's environment or lead to arbitrary code execution.
0
Attacker Value
Unknown
CVE-2021-23562
Disclosure Date: December 03, 2021 (last updated February 23, 2025)
This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.
0
Attacker Value
Unknown
CVE-2020-29176
Disclosure Date: December 02, 2021 (last updated February 23, 2025)
An arbitrary file upload vulnerability in Z-BlogPHP v1.6.1.2100 allows attackers to execute arbitrary code via a crafted JPG file.
0
Attacker Value
Unknown
CVE-2021-42099
Disclosure Date: November 30, 2021 (last updated February 23, 2025)
Zoho ManageEngine M365 Manager Plus before 4421 is vulnerable to file-upload remote code execution.
0
Attacker Value
Unknown
CVE-2021-42123
Disclosure Date: November 30, 2021 (last updated February 23, 2025)
Unrestricted File Upload in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 in the File Upload Functions allows an authenticated remote attacker with Upload privileges to upload files with any file type, enabling client-side attacks.
0
Attacker Value
Unknown
CVE-2021-44094
Disclosure Date: November 28, 2021 (last updated February 23, 2025)
ZrLog 2.2.2 has a remote command execution vulnerability at plugin download function, it could execute any JAR file
0
Attacker Value
Unknown
CVE-2021-44093
Disclosure Date: November 28, 2021 (last updated February 23, 2025)
A Remote Command Execution vulnerability on the background in zrlog 2.2.2, at the upload avatar function, could bypass the original limit, upload the JSP file to get a WebShell
0
Attacker Value
Unknown
CVE-2021-22968
Disclosure Date: November 19, 2021 (last updated February 23, 2025)
A bypass of adding remote files in Concrete CMS (previously concrete5) File Manager leads to remote code execution in Concrete CMS (concrete5) versions 8.5.6 and below.The external file upload feature stages files in the public directory even if they have disallowed file extensions. They are stored in a directory with a random name, but it's possible to stall the uploads and brute force the directory name. You have to be an admin with the ability to upload files, but this bug gives you the ability to upload restricted file types and execute them depending on server configuration.To fix this, a check for allowed file extensions was added before downloading files to a tmp directory.Concrete CMS Security Team gave this a CVSS v3.1 score of 5.4 AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:NThis fix is also in Concrete version 9.0.0
0
Attacker Value
Unknown
CVE-2021-27860
Disclosure Date: November 16, 2021 (last updated February 23, 2025)
A vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p92 and 10.2.2r44p1 allows a remote, unauthenticated attacker to upload a file to any location on the filesystem. The FatPipe advisory identifier for this vulnerability is FPSA006.
0