Total
2655 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-13294 | 1 Arox | 1 School-erp | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
AROX School-ERP Pro has a command execution vulnerability. import_stud.php and upload_fille.php do not have session control. Therefore an unauthenticated user can execute a command on the system. | |||||
CVE-2019-13187 | 1 Symphonyextensions | 1 Rich Text Formatter | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The Rich Text Formatter (Redactor) extension through v1.1.1 for Symphony CMS has an Unauthenticated arbitrary file upload vulnerability in content.fileupload.php and content.imageupload.php. | |||||
CVE-2019-13082 | 1 Chamilo | 1 Chamilo Lms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Chamilo LMS 1.11.8 and 2.x allows remote code execution through an lp_upload.php unauthenticated file upload feature. It extracts a ZIP archive before checking its content, and once it has been extracted, does not check files in a recursive way. This means that by putting a .php file in a folder and then this folder in a ZIP archive, the server will accept this file without any checks. Because one can access this file from the website, it is remote code execution. This is related to a scorm imsmanifest.xml file, the import_package function, and extraction in $courseSysDir.$newDir. | |||||
CVE-2019-12971 | 1 G-u | 2 Bks Ebk Ethernet-buskoppler Pro, Bks Ebk Ethernet-buskoppler Pro Firmware | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
BKS EBK Ethernet-Buskoppler Pro before 3.01 allows Unrestricted Upload of a File with a Dangerous Type. | |||||
CVE-2019-12803 | 1 Hunesion | 1 I-onenet | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, the specific upload web module doesn't verify the file extension and type, and an attacker can upload a webshell. After the webshell upload, an attacker can use the webshell to perform remote code exection such as running a system command. | |||||
CVE-2019-12744 | 1 Seeddms | 1 Seeddms | 2024-11-21 | 6.0 MEDIUM | 7.5 HIGH |
SeedDMS before 5.1.11 allows Remote Command Execution (RCE) because of unvalidated file upload of PHP scripts, a different vulnerability than CVE-2018-12940. | |||||
CVE-2019-12719 | 1 Auo | 1 Sunveillance Monitoring System \& Data Recorder | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in Picture_Manage_mvc.aspx in AUO SunVeillance Monitoring System before v1.1.9e. There is an incorrect access control vulnerability that can allow an unauthenticated user to upload files via a modified authority parameter. | |||||
CVE-2019-12548 | 1 Bludit | 1 Bludit | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Bludit before 3.9.0 allows remote code execution for an authenticated user by uploading a php file while changing the logo through /admin/ajax/upload-logo. | |||||
CVE-2019-12409 | 2 Apache, Linux | 2 Solr, Linux Kernel | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server. | |||||
CVE-2019-12377 | 1 Ivanti | 1 Landesk Management Suite | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
A vulnerable upl/async_upload.asp web API endpoint in Ivanti LANDESK Management Suite (LDMS, aka Endpoint Manager) 10.0.1.168 Service Update 5 allows arbitrary file upload, which may lead to arbitrary remote code execution. | |||||
CVE-2019-12326 | 1 Akuvox | 2 Sp-r50p, Sp-r50p Firmware | 2024-11-21 | 10.0 HIGH | 7.2 HIGH |
Missing file and path validation in the ringtone upload function of the Akuvox R50P VoIP phone 50.0.6.156 allows an attacker to upload a manipulated ringtone file, with an executable payload (shell commands within the file) and trigger code execution. | |||||
CVE-2019-12271 | 1 Sandline | 1 Centraleyezer | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Sandline Centraleyezer (On Premises) allows unrestricted File Upload with a dangerous type, because the feature of adding ".jpg" to any uploaded filename is not enforced on the server side. | |||||
CVE-2019-12185 | 1 Elabftw | 1 Elabftw | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component. This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request. This will allow for PHP files to be written to the web root, and for code to execute on the remote server. | |||||
CVE-2019-12170 | 1 Atutor | 1 Atutor | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PHP files to be written to the web root, and for code to execute on the remote server. | |||||
CVE-2019-12150 | 1 Karamasoft | 1 Ultimateeditor | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Karamasoft UltimateEditor 1 does not ensure that an uploaded file is an image or document (neither file types nor extensions are restricted). The attacker must use the Attach icon to perform an upload. An uploaded file is accessible under the UltimateEditorInclude/UserFiles/ URI. | |||||
CVE-2019-12099 | 1 Php-fusion | 1 Php-fusion | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
In PHP-Fusion 9.03.00, edit_profile.php allows remote authenticated users to execute arbitrary code because includes/dynamics/includes/form_fileinput.php and includes/classes/PHPFusion/Installer/Lib/Core.settings.inc mishandle executable files during avatar upload. | |||||
CVE-2019-11887 | 1 Simplybook | 1 Simplybook | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
SimplyBook.me through 2019-05-11 does not properly restrict File Upload which could allow remote code execution. | |||||
CVE-2019-11807 | 1 Visser | 1 Woocommerce Checkout Manager | 2024-11-21 | 6.4 MEDIUM | 7.5 HIGH |
The WooCommerce Checkout Manager plugin before 4.3 for WordPress allows media deletion via the wp-admin/admin-ajax.php?action=update_attachment_wccm wccm_default_keys_load parameter because of a nopriv_ registration and a lack of capabilities checks. | |||||
CVE-2019-11655 | 1 Hp | 1 Arcsight Logger | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Unrestricted file upload vulnerability in Micro Focus ArcSight Logger, version 6.7.0 and later. This vulnerability could allow Unrestricted Upload of File with Dangerous type. | |||||
CVE-2019-11615 | 1 Doorgets | 1 Doorgets Cms | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
/fileman/php/upload.php in doorGets 7.0 has an arbitrary file upload vulnerability. A remote normal registered user can use this vulnerability to upload backdoor files to control the server. |