Vulnerabilities (CVE)

Filtered by CWE-434
Total 2641 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-13359 1 Control-webpanel 1 Webpanel 2024-02-28 8.5 HIGH 7.5 HIGH
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.836, a cwpsrv-xxx cookie allows a normal user to craft and upload a session file to the /tmp directory, and use it to become the root user.
CVE-2019-7912 1 Magento 1 Magento 2024-02-28 6.5 MEDIUM 7.2 HIGH
A file upload filter bypass exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with admin privileges to edit configuration keys to remove file extension filters, potentially resulting in the malicious upload and execution of malicious files on the server.
CVE-2015-9402 1 Usersultra 1 Users Ultra Membership 2024-02-28 6.8 MEDIUM 8.8 HIGH
The users-ultra plugin before 1.5.59 for WordPress has uultra-form-cvs-form-conf arbitrary file upload.
CVE-2015-9339 1 Iptanus 1 Wordpress File Upload 2024-02-28 5.0 MEDIUM 7.5 HIGH
The wp-file-upload plugin before 2.7.1 for WordPress has insufficient restrictions on upload of .js files.
CVE-2019-6839 1 Schneider-electric 8 Meg6260-0410, Meg6260-0410 Firmware, Meg6260-0415 and 5 more 2024-02-28 6.5 MEDIUM 8.8 HIGH
A CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could allow a user with low privileges to upload a rogue file.
CVE-2019-13979 1 Rangerstudio 1 Directus 7 Api 2024-02-28 6.8 MEDIUM 8.8 HIGH
In Directus 7 API before 2.2.1, uploading of PHP files is not blocked, leading to uploads/_/originals remote code execution.
CVE-2019-13984 1 Rangerstudio 1 Directus 7 Api 2024-02-28 6.8 MEDIUM 8.8 HIGH
Directus 7 API before 2.3.0 does not validate uploaded files. Regardless of the file extension or MIME type, there is a direct link to each uploaded file, accessible by unauthenticated users, as demonstrated by the EICAR Anti-Virus Test File.
CVE-2019-5395 1 Hp 2 3par Service Processor, 3par Service Processor Firmware 2024-02-28 6.5 MEDIUM 8.8 HIGH
A remote arbitrary file upload vulnerability was discovered in HPE 3PAR Service Processor version(s): prior to 5.0.5.1.
CVE-2017-18435 1 Cpanel 1 Cpanel 2024-02-28 7.5 HIGH 7.3 HIGH
cPanel before 64.0.21 allows demo accounts to execute code via the BoxTrapper API (SEC-238).
CVE-2019-1010062 1 Pluck-cms 1 Pluckcms 2024-02-28 7.5 HIGH 9.8 CRITICAL
PluckCMS 4.7.4 and earlier is affected by: CWE-434 Unrestricted Upload of File with Dangerous Type. The impact is: get webshell. The component is: data/inc/images.php line36. The attack vector is: modify the MIME TYPE on HTTP request to upload a php file. The fixed version is: after commit 09f0ab871bf633973cfd9fc4fe59d4a912397cf8.
CVE-2019-14748 1 Osticket 1 Osticket 2024-02-28 3.5 LOW 5.4 MEDIUM
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. The Ticket creation form allows users to upload files along with queries. It was found that the file-upload functionality has fewer (or no) mitigations implemented for file content checks; also, the output is not handled properly, causing persistent XSS that leads to cookie stealing or malicious actions. For example, a non-agent user can upload a .html file, and Content-Disposition will be set to inline instead of attachment.
CVE-2019-16192 1 Doccms 1 Doccms 2024-02-28 7.5 HIGH 9.8 CRITICAL
upload_model() in /admini/controllers/system/managemodel.php in DocCms 2016.5.17 allow remote attackers to execute arbitrary PHP code through module management files, as demonstrated by a .php file in a ZIP archive.
CVE-2019-1010209 1 Gorul 1 Gourl 2024-02-28 5.0 MEDIUM 7.5 HIGH
GoUrl.io GoURL Wordpress Plugin 1.4.13 and earlier is affected by: CWE-434. The impact is: unauthenticated/unzuthorized Attacker can upload executable file in website. The component is: gourl.php#L5637. The fixed version is: 1.4.14.
CVE-2019-13976 1 Egain 1 Chat 2024-02-28 7.5 HIGH 9.8 CRITICAL
eGain Chat 15.0.3 allows unrestricted file upload.
CVE-2017-18592 1 Wc-marketplace 1 Wc Catalog Enquiry 2024-02-28 5.0 MEDIUM 7.5 HIGH
The woocommerce-catalog-enquiry plugin before 3.1.0 for WordPress has an incorrect wp_upload directory for file uploads.
CVE-2019-8371 1 Open-emr 1 Openemr 2024-02-28 9.0 HIGH 7.2 HIGH
OpenEMR v5.0.1-6 allows code execution.
CVE-2019-3960 1 Wallaceit 1 Wallacepos 2024-02-28 6.5 MEDIUM 7.2 HIGH
Unrestricted upload of file with dangerous type in WallacePOS 1.4.3 allows a remote, authenticated attacker to execute arbitrary code by uploading a malicious PHP file.
CVE-2015-5601 1 Edx 1 Edx-platform 2024-02-28 6.5 MEDIUM 8.8 HIGH
edx-platform before 2015-07-20 allows code execution by privileged users because the course import endpoint mishandles .tar.gz files.
CVE-2018-18572 1 Oscommerce 1 Oscommerce 2024-02-28 6.5 MEDIUM 7.2 HIGH
osCommerce 2.3.4.1 has an incomplete '.htaccess' for blacklist filtering in the "product" page. Because of this filter, script files with certain PHP-related extensions (such as .phtml and .php5) didn't execute in the application. But this filter didn't prevent the '.pht' extension. Thus, remote authenticated administrators can upload '.pht' files for arbitrary PHP code execution via a /catalog/admin/categories.php?cPath=&action=new_product URI.
CVE-2019-1010123 1 Modx 1 Modx Revolution 2024-02-28 5.0 MEDIUM 7.5 HIGH
MODX Revolution Gallery 1.7.0 is affected by: CWE-434: Unrestricted Upload of File with Dangerous Type. The impact is: Creating file with custom a filename and content. The component is: Filtering user parameters before passing them into phpthumb class. The attack vector is: web request via /assets/components/gallery/connector.php.