CVE List

Id CVE No. Status Description Phase Votes Comments Actions
58561  CVE-2012-5318  Candidate  Unrestricted file upload vulnerability in uploadify/scripts/uploadify.php in the Kish Guest Posting plugin 1.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with a double extension, then accessing it via a direct request to the file in the directory specified by the folder parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1125.  Assigned (20121008)  None (candidate not yet proposed)    View
54368  CVE-2012-1125  Candidate  Unrestricted file upload vulnerability in uploadify/scripts/uploadify.php in the Kish Guest Posting plugin before 1.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the directory specified by the folder parameter.  Assigned (20120214)  None (candidate not yet proposed)    View
36939  CVE-2008-6822  Candidate  Unrestricted file upload vulnerability in uploadp.php in New Earth Programming Team (NEPT) imgupload (aka Image Uploader) 1.0 allows remote attackers to execute arbitrary code by uploading a file with an executable extension and a modified content type, then accessing this file via a direct request, as demonstrated by an upload with an image/jpeg content type. NOTE: some of these details are obtained from third party information.  Assigned (20090604)  None (candidate not yet proposed)    View
28758  CVE-2007-5401  Candidate  Unrestricted file upload vulnerability in uploadrequest.asp in Layton HelpBox 3.7.1 allows remote authenticated users to upload and execute arbitrary ASP files, related to not properly checking file extensions.  Assigned (20071012)  None (candidate not yet proposed)    View
76822  CVE-2014-9521  Candidate  Unrestricted file upload vulnerability in uploadScript.php in InfiniteWP Admin Panel before 2.4.4, when the allWPFiles query parameter is set, allows remote attackers to execute arbitrary code by uploading a file with a double extension, then accessing it via a direct request to the file in the uploads directory, as demonstrated by the .php.swp filename.  Assigned (20150105)  None (candidate not yet proposed)    View

Page 18782 of 20943, showing 5 records out of 104715 total, starting on record 93906, ending on 93910

Actions