Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
file-type project file-type vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2022-36313
An issue exists in the file-type package prior to 16.5.4 and 17.x prior to 17.1.3 for Node.js. A malformed MKV file could cause the file type detector to get caught in an infinite loop. This would make the application become unresponsive and could be used to cause a DoS attack.
File-type Project File-type
4.8
CVSSv3
CVE-2023-25781
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Sebastian Krysmanski Upload File Type Settings plugin <= 1.1 versions.
Upload File Type Settings Plugin Project Upload File Type Settings Plugin
9.8
CVSSv3
CVE-2020-19802
File Upload vulnerability found in Milken DoyoCMS v.2.3 allows a remote malicious user to execute arbitrary code via the upload file type parameter.
Doyocms Project Doyocms 2.3
8.8
CVSSv3
CVE-2022-43436
The File Upload function of EasyTest has insufficient filtering for special characters and file type. A remote attacker authenticated as a general user can upload and execute arbitrary files, to manipulate system or disrupt service.
Easy Test Project Easy Test 22h29
8.8
CVSSv3
CVE-2021-4382
The Recently plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the fetch_external_image() function in versions up to, and including, 3.0.4. This makes it possible for authenticated malicious users to upload arbitrary files on the ...
Recently Project Recently
9.8
CVSSv3
CVE-2022-24136
Hospital Management System v1.0 is affected by an unrestricted upload of dangerous file type vulerability in treatmentrecord.php. To exploit, an attacker can upload any PHP file, and then execute it.
Hospital Management System Project Hospital Management System 1.0
NA
CVE-2007-3285
Mozilla Firefox prior to 2.0.0.5, when run on Windows, allows remote malicious users to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Fire...
Mozilla Firefox 0.10.1
Mozilla Firefox 1.0.1
Mozilla Firefox 1.0.3
Mozilla Firefox 1.5.0.1
Mozilla Firefox 1.5.0.11
Mozilla Firefox 1.5.0.6
Mozilla Firefox 1.5.0.8
Mozilla Firefox 1.5.6
Mozilla Firefox 1.5.8
Mozilla Firefox 2.0
Mozilla Firefox 1.0.5
Mozilla Firefox 1.0.6
Mozilla Firefox 1.0.7
Mozilla Firefox 1.0.8
Mozilla Firefox 1.5.1
Mozilla Firefox 1.5.2
Mozilla Firefox 1.5.3
Mozilla Firefox 1.5.4
Mozilla Firefox 0.9
Mozilla Firefox 0.9.1
Mozilla Firefox 0.9.2
Mozilla Firefox 0.9.3
9.8
CVSSv3
CVE-2023-6316
The MW WP Form plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the '_single_file_upload' function in versions up to, and including, 5.0.1. This makes it possible for unauthenticated malicious users to upload arbit...
Mw Wp Form Project Mw Wp Form
8.8
CVSSv3
CVE-2020-27386
An unrestricted file upload issue in FlexDotnetCMS before v1.5.9 allows an authenticated remote malicious user to upload and execute arbitrary files by using the FileManager to upload malicious code (e.g., ASP code) in the form of a safe file type (e.g., a TXT file), and then usi...
Flexdotnetcms Project Flexdotnetcms
9.8
CVSSv3
CVE-2016-15033
The Delete All Comments plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the via the delete-all-comments.php file in versions up to, and including, 2.0. This makes it possible for unauthenticated malicious users to upload arbitra...
Delete All Comments Project Delete All Comments
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »