|
314911
|
- |
|
-
|
-
|
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
|
-
|
CVE-2023-45916
|
2024-01-29 18:15 |
2024-01-29 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
314912
|
- |
|
-
|
-
|
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER.
|
-
|
CVE-2023-6470
|
2024-01-27 06:15 |
2024-01-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
314913
|
- |
|
noguska
|
nola
|
The document management module in NOLA 1.1.1 and 1.1.2 does not restrict the types of files that are uploaded, which allows remote attackers to upload and execute arbitrary PHP files with extensions …
|
CWE-434
Unrestricted Upload of File with Dangerous Type
|
CVE-2002-1841
|
2024-01-27 05:01 |
2002-12-31 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
314914
|
- |
|
apache
|
http_server
|
Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat)…
|
CWE-78
OS Command
|
CVE-2002-0061
|
2024-01-27 05:01 |
2002-03-21 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
314915
|
- |
|
hypermail_development
|
hypermail
|
Hypermail allows remote attackers to execute arbitrary commands on a server supporting SSI via an attachment with a .shtml extension, which is archived on the server and can then be executed by reque…
|
CWE-434
Unrestricted Upload of File with Dangerous Type
|
CVE-2001-0901
|
2024-01-27 05:01 |
2001-11-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
314916
|
- |
|
apache ncsa
|
http_server ncsa_httpd
|
phf CGI program allows remote command execution through shell metacharacters.
|
CWE-78
OS Command
|
CVE-1999-0067
|
2024-01-27 05:00 |
1996-03-20 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
314917
|
- |
|
e107
|
e107
|
ImageManager in e107 before 0.617 does not properly check the types of uploaded files, which allows remote attackers to execute arbitrary code by uploading a PHP file via the upload parameter to imag…
|
CWE-434
Unrestricted Upload of File with Dangerous Type
|
CVE-2004-2262
|
2024-01-27 04:10 |
2004-12-31 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
314918
|
- |
|
yvesglodt
|
i-man
|
I-Man 0.9, and possibly earlier versions, allows remote attackers to execute arbitrary PHP code by uploading a file attachment with a .php extension.
|
CWE-434
Unrestricted Upload of File with Dangerous Type
|
CVE-2005-1868
|
2024-01-27 04:07 |
2005-06-9 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
314919
|
- |
|
yapig
|
yapig
|
upload.php in YaPiG 0.92b, 0.93u and 0.94u does not properly restrict the file extension for uploaded image files, which allows remote attackers to upload arbitrary files and execute arbitrary PHP co…
|
CWE-434
Unrestricted Upload of File with Dangerous Type
|
CVE-2005-1881
|
2024-01-27 04:07 |
2005-06-6 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
314920
|
- |
|
deluxebb
|
deluxebb
|
DeluxeBB 1.06 and earlier, when run on the Apache HTTP Server with the mod_mime module, allows remote attackers to execute arbitrary PHP code by uploading files with double extensions via the fileupl…
|
CWE-434
Unrestricted Upload of File with Dangerous Type
|
CVE-2006-4558
|
2024-01-27 04:02 |
2006-09-6 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|