Total
3244 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-30448 | 1 Hospital Management System Project | 1 Hospital Management System | 2024-11-21 | 9.8 Critical |
Hospital Management System in PHP with Source Code (HMS) 1.0 was discovered to contain a File upload vulnerability in treatmentrecord.php. | ||||
CVE-2022-30423 | 1 Merchandise Online Store Project | 1 Merchandise Online Store | 2024-11-21 | 9.8 Critical |
Merchandise Online Store v1.0 by oretnom23 has an arbitrary code execution (RCE) vulnerability in the user profile upload point in the system information. | ||||
CVE-2022-30007 | 1 Gxcms Project | 1 Gxcms | 2024-11-21 | 7.2 High |
GXCMS V1.5 has a file upload vulnerability in the background. The vulnerability is the template management page. You can edit any template content and then rename to PHP suffix file, after calling PHP file can control the server. | ||||
CVE-2022-2594 | 1 Advancedcustomfields | 1 Advanced Custom Fields | 2024-11-21 | 8.8 High |
The Advanced Custom Fields WordPress plugin before 5.12.3, Advanced Custom Fields Pro WordPress plugin before 5.12.3 allows unauthenticated users to upload files allowed in a default WP configuration (so PHP is not possible) if there is a frontend form available. This vulnerability was introduced in the 5.0 rewrite and did not exist prior to that release. | ||||
CVE-2022-2356 | 1 Mediajedi | 1 User Private Files | 2024-11-21 | 8.8 High |
The Frontend File Manager & Sharing WordPress plugin before 1.1.3 does not filter file extensions when letting users upload files on the server, which may lead to malicious code being uploaded. | ||||
CVE-2022-2268 | 1 Soflyy | 1 Wp All Import | 2024-11-21 | 7.2 High |
The Import any XML or CSV File to WordPress plugin before 3.6.8 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE | ||||
CVE-2022-2180 | 1 Greyd | 1 Greyd.suite | 2024-11-21 | 9.8 Critical |
The GREYD.SUITE WordPress theme does not properly validate uploaded custom font packages, and does not perform any authorization or csrf checks, allowing an unauthenticated attacker to upload arbitrary files including php source files, leading to possible remote code execution (RCE). | ||||
CVE-2022-2128 | 1 Trudesk Project | 1 Trudesk | 2024-11-21 | 9.8 Critical |
Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.4. | ||||
CVE-2022-2111 | 1 Inventree Project | 1 Inventree | 2024-11-21 | 8.8 High |
Unrestricted Upload of File with Dangerous Type in GitHub repository inventree/inventree prior to 0.7.2. | ||||
CVE-2022-2046 | 1 Wpwax | 1 Directorist | 2024-11-21 | 4.9 Medium |
The Directorist WordPress plugin before 7.2.3 allows administrators to download other plugins from the same vendor directly to the site, but does not check the URL domain it gets the zip files from. This could allow administrators to run code on the server, which is a problem in multisite configurations. | ||||
CVE-2022-29725 | 1 Creatiwity | 1 Witycms | 2024-11-21 | 8.8 High |
An arbitrary file upload in the image upload component of wityCMS v0.6.2 allows attackers to execute arbitrary code via a crafted PHP file. | ||||
CVE-2022-29655 | 1 Wedding Management System Project | 1 Wedding Management System | 2024-11-21 | 7.2 High |
An arbitrary file upload vulnerability in the Upload Photos module of Wedding Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file. | ||||
CVE-2022-29651 | 1 Online Food Ordering System Project | 1 Online Food Ordering System | 2024-11-21 | 7.2 High |
An arbitrary file upload vulnerability in the Select Image function of Online Food Ordering System v1.0 allows attackers to execute arbitrary code via a crafted PHP file. | ||||
CVE-2022-29637 | 1 Iminho | 1 Mindoc | 2024-11-21 | 7.8 High |
An arbitrary file upload vulnerability in Mindoc v2.1-beta.5 allows attackers to execute arbitrary commands via a crafted Zip file. | ||||
CVE-2022-29632 | 1 Roncoo | 1 Roncoo-education | 2024-11-21 | 9.8 Critical |
An arbitrary file upload vulnerability in the component /course/api/upload/pic of Roncoo Education v9.0.0 allows attackers to execute arbitrary code via a crafted file. | ||||
CVE-2022-29624 | 1 Tpcms Project | 1 Tpcms | 2024-11-21 | 8.8 High |
An arbitrary file upload vulnerability in the Add File function of TPCMS v3.2 allows attackers to execute arbitrary code via a crafted PHP file. | ||||
CVE-2022-29622 | 1 Formidable Project | 1 Formidable | 2024-11-21 | 9.8 Critical |
An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability. | ||||
CVE-2022-29354 | 1 Keystonejs | 1 Keystone | 2024-11-21 | 9.8 Critical |
An arbitrary file upload vulnerability in the file upload module of Keystone v4.2.1 allows attackers to execute arbitrary code via a crafted file. | ||||
CVE-2022-29353 | 1 Graphql-upload Project | 1 Graphql-upload | 2024-11-21 | 9.8 Critical |
An arbitrary file upload vulnerability in the file upload module of Graphql-upload v13.0.0 allows attackers to execute arbitrary code via a crafted filename. | ||||
CVE-2022-29351 | 1 Tiddlywiki | 1 Tiddlywiki5 | 2024-11-21 | 9.8 Critical |
An arbitrary file upload vulnerability in the file upload module of Tiddlywiki5 v5.2.2 allows attackers to execute arbitrary code via a crafted SVG file. Note: The vendor argues that this is not a legitimate issue and there is no vulnerability here. |