Export limit exceeded: 10532 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 15477 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 23767 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 11459 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 43148 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (4109 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-29891 1 Zitadel 1 Zitadel 2025-01-08 8.7 High
ZITADEL users can upload their own avatar image and various image types are allowed. Due to a missing check, an attacker could upload HTML and pretend it is an image to gain access to the victim's account in certain scenarios. A possible victim would need to directly open the supposed image in the browser, where a session in ZITADEL needs to be active for this exploit to work. The exploit could only be reproduced if the victim was using Firefox. Chrome, Safari as well as Edge did not execute the code. This vulnerability is fixed in 2.48.3, 2.47.8, 2.46.5, 2.45.5, 2.44.7, 2.43.11, and 2.42.17.
CVE-2023-3032 1 Mobatime 1 Mobatime Web Application 2025-01-08 8.1 High
Unrestricted Upload of File with Dangerous Type vulnerability in Mobatime web application (Documentary proof upload modules) allows a malicious user to Upload a Web Shell to a Web Server.This issue affects Mobatime web application: through 06.7.22.
CVE-2023-28699 1 Wddgroup 1 Fantasy 2025-01-08 8.8 High
Wade Graphic Design FANTSY has a vulnerability of insufficient filtering for file type in its file update function. An authenticated remote attacker with general user privilege can exploit this vulnerability to upload a PHP file containing a webshell to perform arbitrary system operation or disrupt service.
CVE-2023-28700 1 Itpison 1 Omicard Edm 2025-01-08 6.8 Medium
OMICARD EDM backend system’s file uploading function does not restrict upload of file with dangerous type. A local area network attacker with administrator privileges can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
CVE-2023-33569 1 Faculty Evaluation System Project 1 Faculty Evaluation System 2025-01-08 7.2 High
Sourcecodester Faculty Evaluation System v1.0 is vulnerable to arbitrary code execution via ip/eval/ajax.php?action=update_user.
CVE-2023-32628 1 Advantech 1 Webaccess\/scada 2025-01-08 7.2 High
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to modify the file extension of a certificate file to ASP when uploading it, which can lead to remote code execution.
CVE-2023-22450 1 Advantech 1 Webaccess\/scada 2025-01-08 7.2 High
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to upload an ASP script file to a webserver when logged in as manager user, which can lead to arbitrary code execution.
CVE-2023-33601 1 Phpok 1 Phpok 2025-01-07 8.8 High
An arbitrary file upload vulnerability in /admin.php?c=upload of phpok v6.4.100 allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2023-34747 1 Ujcms 1 Ujcms 2025-01-06 9.8 Critical
File upload vulnerability in ujcms 6.0.2 via /api/backend/core/web-file-upload/upload.
CVE-2023-27881 1 Ptc 1 Vuforia Studio 2025-01-06 8 High
A user could use the “Upload Resource” functionality to upload files to any location on the disk.
CVE-2024-11211 1 Eyoucms 1 Eyoucms 2025-01-06 4.7 Medium
A vulnerability classified as critical has been found in EyouCMS up to 1.6.7. Affected is an unknown function of the component Website Logo Handler. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2023-33253 1 Agilebio 1 Labcollector 2025-01-03 8.8 High
LabCollector 6.0 though 6.15 allows remote code execution. An authenticated remote low-privileged user can upload an executable PHP file and execute system commands. The vulnerability is in the message function, and is due to insufficient validation of the file (such as shell.jpg.php.shell) being sent.
CVE-2023-31541 1 Ckeditor 1 Ckeditor 2025-01-03 9.8 Critical
A unrestricted file upload vulnerability was discovered in the ‘Browse and upload images’ feature of the CKEditor v1.2.3 plugin for Redmine, which allows arbitrary files to be uploaded to the server.
CVE-2023-3049 1 Tmtmakine 2 Lockcell, Lockcell Firmware 2025-01-03 9.8 Critical
Unrestricted Upload of File with Dangerous Type vulnerability in TMT Lockcell allows Command Injection.This issue affects Lockcell: before 15.
CVE-2023-34944 1 Chamilo 1 Chamilo Lms 2025-01-03 9.8 Critical
An arbitrary file upload vulnerability in the /fileUpload.lib.php component of Chamilo 1.11.* up to v1.11.18 allows attackers to execute arbitrary code via uploading a crafted SVG file.
CVE-2024-27923 1 Getgrav 1 Grav 2025-01-02 8.8 High
Grav is a content management system (CMS). Prior to version 1.7.43, users who may write a page may use the `frontmatter` feature due to insufficient permission validation and inadequate file name validation. This may lead to remote code execution. Version 1.7.43 fixes this issue.
CVE-2024-2148 1 Oretnom23 1 Online Mobile Store Management System 2025-01-02 6.3 Medium
A vulnerability classified as critical has been found in SourceCodester Online Mobile Management Store 1.0. This affects an unknown part of the file /classes/Users.php. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255501 was assigned to this vulnerability.
CVE-2024-1644 1 Salesagility 1 Suitecrm 2024-12-31 9.9 Critical
Suite CRM version 7.14.2 allows including local php files. This is possible because the application is vulnerable to LFI.
CVE-2024-47528 1 Librenms 1 Librenms 2024-12-19 4.8 Medium
LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Stored Cross-Site Scripting (XSS) can be achieved by uploading a new Background for a Custom Map. Users with "admin" role can set background for a custom map, this allow the upload of SVG file that can contain XSS payload which will trigger on load. This led to Stored Cross-Site Scripting (XSS). The vulnerability is fixed in 24.9.0.
CVE-2024-25623 1 Joinmastodon 1 Mastodon 2024-12-18 8.5 High
Mastodon is a free, open-source social network server based on ActivityPub. Prior to versions 4.2.7, 4.1.15, 4.0.15, and 3.5.19, when fetching remote statuses, Mastodon doesn't check that the response from the remote server has a `Content-Type` header value of the Activity Streams media type, which allows a threat actor to upload a crafted Activity Streams document to a remote server and make a Mastodon server fetch it, if the remote server accepts arbitrary user uploads. The vulnerability allows a threat actor to impersonate an account on a remote server that satisfies all of the following properties: allows the attacker to register an account; accepts arbitrary user-uploaded documents and places them on the same domain as the ActivityPub actors; and serves user-uploaded document in response to requests with an `Accept` header value of the Activity Streams media type. Versions 4.2.7, 4.1.15, 4.0.15, and 3.5.19 contain a fix for this issue.