Total
2650 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-40531 | 2 Apple, Sketch | 2 Macos, Sketch | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Sketch before 75 allows library feeds to be used to bypass file quarantine. Files are automatically downloaded and opened, without the com.apple.quarantine extended attribute. This results in remote code execution, as demonstrated by CommandString in a terminal profile to Terminal.app. | |||||
CVE-2021-40524 | 1 Pureftpd | 1 Pure-ftpd | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In Pure-FTPd before 1.0.50, an incorrect max_filesize quota mechanism in the server allows attackers to upload files of unbounded size, which may lead to denial of service or a server hang. This occurs because a certain greater-than-zero test does not anticipate an initial -1 value. (Versions 1.0.23 through 1.0.49 are affected.) | |||||
CVE-2021-40344 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
An issue was discovered in Nagios XI 5.8.5. In the Custom Includes section of the Admin panel, an administrator can upload files with arbitrary extensions as long as the MIME type corresponds to an image. Therefore it is possible to upload a crafted PHP script to achieve remote command execution. | |||||
CVE-2021-40324 | 1 Cobbler Project | 1 Cobbler | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data. | |||||
CVE-2021-40189 | 1 Php-fusion | 1 Phpfusion | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
PHPFusion 9.03.110 is affected by a remote code execution vulnerability. The theme function will extract a file to "webroot/themes/{Theme Folder], where an attacker can access and execute arbitrary code. | |||||
CVE-2021-40188 | 1 Php-fusion | 1 Phpfusion | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
PHPFusion 9.03.110 is affected by an arbitrary file upload vulnerability. The File Manager function in admin panel does not filter all PHP extensions such as ".php, .php7, .phtml, .php5, ...". An attacker can upload a malicious file and execute code on the server. | |||||
CVE-2021-40175 | 1 Zohocorp | 1 Manageengine Log360 | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Zoho ManageEngine Log360 before Build 5219 allows unrestricted file upload with resultant remote code execution. | |||||
CVE-2021-3915 | 1 Bookstackapp | 1 Bookstack | 2024-11-21 | 3.5 LOW | 5.7 MEDIUM |
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type | |||||
CVE-2021-3906 | 1 Bookstackapp | 1 Bookstack | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type | |||||
CVE-2021-3846 | 1 Firefly-iii | 1 Firefly Iii | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
firefly-iii is vulnerable to Unrestricted Upload of File with Dangerous Type | |||||
CVE-2021-3832 | 1 Artica | 1 Integria Ims | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Integria IMS in its 5.0.92 version is vulnerable to a Remote Code Execution attack through file uploading. An unauthenticated attacker could abuse the AsyncUpload() function in order to exploit the vulnerability. | |||||
CVE-2021-3745 | 1 Flatcore | 1 Flatcore-cms | 2024-11-21 | 6.0 MEDIUM | 6.6 MEDIUM |
flatcore-cms is vulnerable to Unrestricted Upload of File with Dangerous Type | |||||
CVE-2021-3378 | 1 Fortilogger | 1 Fortilogger | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp. | |||||
CVE-2021-3277 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
Nagios XI 5.7.5 and earlier allows authenticated admins to upload arbitrary files due to improper validation of the rename functionality in custom-includes component, which leads to remote code execution by uploading php files. | |||||
CVE-2021-3267 | 1 Kitesky | 1 Kitecms | 2024-11-21 | N/A | 7.2 HIGH |
File Upload vulnerability found in KiteCMS v.1.1 allows a remote attacker to execute arbitrary code via the uploadFile function. | |||||
CVE-2021-3166 | 1 Asus | 2 Dsl-n14u B1, Dsl-n14u B1 Firmware | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered on ASUS DSL-N14U-B1 1.1.2.3_805 devices. An attacker can upload arbitrary file content as a firmware update when the filename Settings_DSL-N14U-B1.trx is used. Once this file is loaded, shutdown measures on a wide range of services are triggered as if it were a real update, resulting in a persistent outage of those services. | |||||
CVE-2021-3164 | 1 Churchdesk | 1 Churchrota | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
ChurchRota 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file via a POST request to resources.php. | |||||
CVE-2021-3120 | 1 Yithemes | 1 Yith Woocommerce Gift Cards | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
An arbitrary file upload vulnerability in the YITH WooCommerce Gift Cards Premium plugin before 3.3.1 for WordPress allows remote attackers to achieve remote code execution on the operating system in the security context of the web server. In order to exploit this vulnerability, an attacker must be able to place a valid Gift Card product into the shopping cart. An uploaded file is placed at a predetermined path on the web server with a user-specified filename and extension. This occurs because the ywgc-upload-picture parameter can have a .php value even though the intention was to only allow uploads of Gift Card images. | |||||
CVE-2021-39608 | 1 Flatcore | 1 Flatcore-cms | 2024-11-21 | 9.0 HIGH | 7.2 HIGH |
Remote Code Execution (RCE) vulnerabilty exists in FlatCore-CMS 2.0.7 via the upload addon plugin, which could let a remote malicious user exeuct arbitrary php code. | |||||
CVE-2021-39384 | 1 Diaowen | 1 Dwsurvey | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
DWSurvey v3.2.0 was discovered to contain an arbitrary file write vulnerability via the component /utils/ToHtmlServlet.java. |