Total
2602 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-14028 | 1 Wordpress | 1 Wordpress | 2024-02-28 | 6.5 MEDIUM | 7.2 HIGH |
In WordPress 4.9.7, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uploads location, allowing for an attacker to then execute the file. This represents a security risk in limited scenarios where an attacker (who does have the required capabilities for plugin uploads) cannot simply place arbitrary PHP code into a valid plugin ZIP file and upload that plugin, because a machine's wp-content/plugins directory permissions were set up to block all new plugins. | |||||
CVE-2018-9207 | 1 Hayageek | 1 Jquery Upload File | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
Arbitrary file upload in jQuery Upload File <= 4.0.2 | |||||
CVE-2018-1000839 | 1 Librehealth | 1 Librehealth Ehr | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
LH-EHR version REL-2_0_0 contains a Arbitrary File Upload vulnerability in Profile picture upload that can result in Remote Code Execution. This attack appear to be exploitable via Uploading a PHP file with image MIME type. | |||||
CVE-2018-9208 | 1 Tuyoshi | 1 Jquery Picture Cut | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
Unauthenticated arbitrary file upload vulnerability in jQuery Picture Cut <= v1.1Beta | |||||
CVE-2018-0645 | 1 Bit-part | 1 Mtappjquery | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
MTAppjQuery 1.8.1 and earlier allows remote PHP code execution via unspecified vectors. | |||||
CVE-2018-12468 | 1 Microfocus | 1 Groupwise | 2024-02-28 | 6.5 MEDIUM | 7.2 HIGH |
A vulnerability in the administration console of Micro Focus GroupWise prior to version 18.0.2 may allow a remote attacker authenticated as an administrator to upload files to an arbitrary path on the server. In certain circumstances this could result in remote code execution. | |||||
CVE-2018-19692 | 1 Tp5cms Project | 1 Tp5cms | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in tp5cms through 2017-05-25. admin.php/upload/picture.html allows remote attackers to execute arbitrary PHP code by uploading a .php file with the image/jpeg content type. | |||||
CVE-2018-16093 | 1 Lenovo | 1 Xclarity Integrator | 2024-02-28 | 4.0 MEDIUM | 6.5 MEDIUM |
In versions prior to 5.5, LXCI for VMware allows an authenticated user to write to any system file due to insufficient sanitization during the upload of a backup file. | |||||
CVE-2018-1969 | 1 Ibm | 1 Security Identity Manager | 2024-02-28 | 6.5 MEDIUM | 9.9 CRITICAL |
IBM Security Identity Manager 6.0.0 allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment. IBM X-Force ID: 153750. | |||||
CVE-2018-12980 | 1 Wago | 8 762-3000, 762-3000 Firmware, 762-3001 and 5 more | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. The vulnerability allows an authenticated user to upload arbitrary files to the file system with the permissions of the web server. | |||||
CVE-2015-9271 | 1 Videowhisper | 1 Video Conference | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
The VideoWhisper videowhisper-video-conference-integration plugin 4.91.8 for WordPress allows remote attackers to execute arbitrary code because vc/vw_upload.php considers a file safe when "html" are the last four characters, as demonstrated by a .phtml file containing PHP code, a different vulnerability than CVE-2014-1905. | |||||
CVE-2018-19537 | 1 Tp-link | 2 Archer C5, Archer C5 Firmware | 2024-02-28 | 9.0 HIGH | 7.2 HIGH |
TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF key and uploaded through the web GUI by using the web admin account. The default password of admin may be used in some cases. | |||||
CVE-2018-16821 | 1 Seacms | 1 Seacms | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
SeaCMS 6.64 allows arbitrary directory listing via upload/admin/admin_template.php?path=../templets/../../ requests. | |||||
CVE-2018-1000658 | 1 Limesurvey | 1 Limesurvey | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
LimeSurvey version prior to 3.14.4 contains a file upload vulnerability in upload functionality that can result in an attacker gaining code execution via webshell. This attack appear to be exploitable via an authenticated user uploading a zip archive which can contains malicious php files that can be called under certain circumstances. This vulnerability appears to have been fixed in after commit 91d143230eb357260a19c8424b3005deb49a47f7 / version 3.14.4. | |||||
CVE-2019-8942 | 2 Debian, Wordpress | 2 Debian Linux, Wordpress | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943. | |||||
CVE-2018-9206 | 1 Jquery File Upload Project | 1 Jquery File Upload | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0 | |||||
CVE-2019-9181 | 1 Schoolcms | 1 Schoolcms | 2024-02-28 | 6.5 MEDIUM | 7.2 HIGH |
SchoolCMS version 2.3.1 allows file upload via the logo upload feature at admin.php?m=admin&c=site&a=save by using the .jpg extension, changing the Content-Type to image/php, and placing PHP code after the JPEG data. This ultimately allows execution of arbitrary PHP code. | |||||
CVE-2018-13981 | 1 Zeta-producer | 1 Zeta Producer Desktop Cms | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
The websites that were built from Zeta Producer Desktop CMS before 14.2.1 are vulnerable to unauthenticated remote code execution due to a default component that permits arbitrary upload of PHP files, because the formmailer widget blocks .php files but not .php5 or .phtml files. This is related to /assets/php/formmailer/SendEmail.php and /assets/php/formmailer/functions.php. | |||||
CVE-2018-20063 | 1 Gurock | 1 Testrail | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in Gurock TestRail 5.6.0.3853. An "Unrestricted Upload of File" vulnerability exists in the image-upload form (available in the description editor), allowing remote authenticated users to execute arbitrary code by uploading an image file with an executable extension but a safe Content-Type value, and then accessing it via a direct request to the file in the file-upload directory (if it's accessible according to the server configuration). | |||||
CVE-2018-18874 | 1 Nconsulting | 1 Nc-cms | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
nc-cms through 2017-03-10 allows remote attackers to execute arbitrary PHP code via the "Upload File or Image" feature, with a .php filename and "Content-Type: application/octet-stream" to the index.php?action=file_manager_upload URI. |