Show filters
540 Total Results
Displaying 31-40 of 540
Sort by:
Attacker Value
Unknown

CVE-2021-42125

Disclosure Date: December 07, 2021 (last updated February 23, 2025)
An unrestricted file upload vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to write dangerous files.
Attacker Value
Unknown

CVE-2021-43936

Disclosure Date: December 06, 2021 (last updated February 23, 2025)
The software allows the attacker to upload or transfer files of dangerous types to the WebHMI portal, that may be automatically processed within the product's environment or lead to arbitrary code execution.
Attacker Value
Unknown

CVE-2021-23562

Disclosure Date: December 03, 2021 (last updated February 23, 2025)
This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.
Attacker Value
Unknown

CVE-2020-29176

Disclosure Date: December 02, 2021 (last updated February 23, 2025)
An arbitrary file upload vulnerability in Z-BlogPHP v1.6.1.2100 allows attackers to execute arbitrary code via a crafted JPG file.
Attacker Value
Unknown

CVE-2021-42099

Disclosure Date: November 30, 2021 (last updated February 23, 2025)
Zoho ManageEngine M365 Manager Plus before 4421 is vulnerable to file-upload remote code execution.
Attacker Value
Unknown

CVE-2021-42123

Disclosure Date: November 30, 2021 (last updated February 23, 2025)
Unrestricted File Upload in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 in the File Upload Functions allows an authenticated remote attacker with Upload privileges to upload files with any file type, enabling client-side attacks.
Attacker Value
Unknown

CVE-2021-44094

Disclosure Date: November 28, 2021 (last updated February 23, 2025)
ZrLog 2.2.2 has a remote command execution vulnerability at plugin download function, it could execute any JAR file
Attacker Value
Unknown

CVE-2021-44093

Disclosure Date: November 28, 2021 (last updated February 23, 2025)
A Remote Command Execution vulnerability on the background in zrlog 2.2.2, at the upload avatar function, could bypass the original limit, upload the JSP file to get a WebShell
Attacker Value
Unknown

CVE-2021-22968

Disclosure Date: November 19, 2021 (last updated February 23, 2025)
A bypass of adding remote files in Concrete CMS (previously concrete5) File Manager leads to remote code execution in Concrete CMS (concrete5) versions 8.5.6 and below.The external file upload feature stages files in the public directory even if they have disallowed file extensions. They are stored in a directory with a random name, but it's possible to stall the uploads and brute force the directory name. You have to be an admin with the ability to upload files, but this bug gives you the ability to upload restricted file types and execute them depending on server configuration.To fix this, a check for allowed file extensions was added before downloading files to a tmp directory.Concrete CMS Security Team gave this a CVSS v3.1 score of 5.4 AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:NThis fix is also in Concrete version 9.0.0
Attacker Value
Unknown

CVE-2021-27860

Disclosure Date: November 16, 2021 (last updated February 23, 2025)
A vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p92 and 10.2.2r44p1 allows a remote, unauthenticated attacker to upload a file to any location on the filesystem. The FatPipe advisory identifier for this vulnerability is FPSA006.