Check CVE Id
Check CWE Id
Designed By Sevy INC. - SQL Injection Vulnerability, Unrestricted File Upload Vulnerability and Default Admin Credentials
WordPress Catch Themes Demo Import 1.6.1 Shell Upload
WordPress SP Project And Document Manager 4.21 Shell Upload
WordPress Modern Events Calendar 5.16.2 Shell Upload
OpenEMR 22.214.171.124 Shell Upload
VisualWare MyConnection Server 11.x Remote Code Execution
Moodle 3.8 Arbitary File Upload
XUpload Remote File Upload Vulnerability
Typesetter CMS 5.1 Remote Code Execution
ckeditor-elfinder Remote File Upload Vulnerability
Golo - Business Listing, City Travel Guide Laravel Theme v1.1.5 - Arbitrary File Upload
filemanager File Upload vulnerability
LifeRay CMS (Fckeditor) Arbitrary File Upload Vulnerability
NewsOne CMS – News, Magazine & Blog Script v1.1.0 Arbitrary File Upload
EwebTonic Services Pvt Ltd Software Authentication Bypass Backdoor Access Vulnerability
Giribala Creative Ventures Fluent Technology Software Authentication Bypass Backdoor Access Vulnerability
BKS EBK Ethernet-Buskoppler Pro Shell Upload
Sierra Wireless AirLink ES450 ACEManager upload.cgi Remote Code Execution
WordPress Ultimate-Member Plugins 2.0.38 CSRF Backdoor Access
WordPress MM-Forms-Community Plugins 2.2.7 Backdoor Access and SQL Injection Vulnerability
WordPress pitajte-strucnjaka Plugins 4.9.6 Backdoor Access Vulnerability
WordPress category-page-icons Plugins 3.6.1 CSRF Backdoor Access Vulnerability
Joomla Codextrous Com_B2jcontact Components 2.1.17 Shell Upload Vulnerability
Design & Developed by SoftBd Ltd. Bangladesh Education Portals Multiple Vulnerabilities
ShopNx - Angular5 Single Page Shopping Cart Application 1 - Arbitrary File Upload
Gardenoma Remote File Upload Vulnerability
WordPress Theme Sydney by aThemes 2018 GravityForms Input Remote File Upload Vulnerability
LifeRay (Fckeditor) Arbitrary File Upload Vulnerability
phpCollab 2.5.1 Arbitrary File Upload
PhpCollab 2.5.1 Shell Upload
Nuxeo Platform 6.x / 7.x Shell Upload
Trendmicro InterScan 6.5-SP2_Build_Linux_1548 Remote Root
Matt Bergin (@thatguyl...
Trendmicro InterScan 6.5-SP2_Build_Linux_1548 Arbitrary File Write
Cisco Firepower Threat Management Command Execution
WordPress Daily Edition 1.6.2 File Upload
Intrexx Professional 6.0 / 5.2 Remote Code Execution
HelpDEZk 1.0.1 Unrestricted File Upload
High-Tech Bridge Secur...
WordPress E-Commerce 126.96.36.199 File Upload / XSS / CSRF / Code Execution
DMXReady Registration Manager Arbitrary File Upload Vulnerability
CVEMAP Search Results
Unrestricted Upload of File with Dangerous Type vulnerability in Mollie Mollie Payments for WooCommerce.This issue affects Mollie Payments for WooCommerce: from n/a through 7.3.11.
Unrestricted Upload of File with Dangerous Type in freescout-helpdesk/freescout
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment. IBM X-Force ID: 247621.
A vulnerability, which was classified as critical, was found in osuuu LightPicture up to 1.2.2. Affected is an unknown function of the file /app/controller/Setup.php. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254856.
A vulnerability has been found in Beijing Baichuo Smart S42 Management Platform up to 20240219 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /useratte/userattestation.php. The manipulation of the argument hidwel leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-254839. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Ctcms 2.1.2. It has been declared as critical. This vulnerability affects unknown code of the file ctcms/apps/controllers/admin/Upsys.php. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254860.
Unrestricted Upload of File with Dangerous Type vulnerability in SYSBASICS WooCommerce Easy Checkout Field Editor, Fees & Discounts.This issue affects WooCommerce Easy Checkout Field Editor, Fees & Discounts: from n/a through 3.5.12.
Unrestricted Upload of File with Dangerous Type vulnerability in Skymoonlabs MoveTo.This issue affects MoveTo: from n/a through 6.2.
Unrestricted Upload of File with Dangerous Type vulnerability in JoomUnited WP Media folder.This issue affects WP Media folder: from n/a through 5.7.2.
Unrestricted Upload of File with Dangerous Type vulnerability in bPlugins LLC Icons Font Loader.This issue affects Icons Font Loader: from n/a through 1.1.4.
Back to Top