Total
2641 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-13359 | 1 Control-webpanel | 1 Webpanel | 2024-02-28 | 8.5 HIGH | 7.5 HIGH |
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.836, a cwpsrv-xxx cookie allows a normal user to craft and upload a session file to the /tmp directory, and use it to become the root user. | |||||
CVE-2019-7912 | 1 Magento | 1 Magento | 2024-02-28 | 6.5 MEDIUM | 7.2 HIGH |
A file upload filter bypass exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with admin privileges to edit configuration keys to remove file extension filters, potentially resulting in the malicious upload and execution of malicious files on the server. | |||||
CVE-2015-9402 | 1 Usersultra | 1 Users Ultra Membership | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
The users-ultra plugin before 1.5.59 for WordPress has uultra-form-cvs-form-conf arbitrary file upload. | |||||
CVE-2015-9339 | 1 Iptanus | 1 Wordpress File Upload | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
The wp-file-upload plugin before 2.7.1 for WordPress has insufficient restrictions on upload of .js files. | |||||
CVE-2019-6839 | 1 Schneider-electric | 8 Meg6260-0410, Meg6260-0410 Firmware, Meg6260-0415 and 5 more | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
A CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could allow a user with low privileges to upload a rogue file. | |||||
CVE-2019-13979 | 1 Rangerstudio | 1 Directus 7 Api | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
In Directus 7 API before 2.2.1, uploading of PHP files is not blocked, leading to uploads/_/originals remote code execution. | |||||
CVE-2019-13984 | 1 Rangerstudio | 1 Directus 7 Api | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
Directus 7 API before 2.3.0 does not validate uploaded files. Regardless of the file extension or MIME type, there is a direct link to each uploaded file, accessible by unauthenticated users, as demonstrated by the EICAR Anti-Virus Test File. | |||||
CVE-2019-5395 | 1 Hp | 2 3par Service Processor, 3par Service Processor Firmware | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
A remote arbitrary file upload vulnerability was discovered in HPE 3PAR Service Processor version(s): prior to 5.0.5.1. | |||||
CVE-2017-18435 | 1 Cpanel | 1 Cpanel | 2024-02-28 | 7.5 HIGH | 7.3 HIGH |
cPanel before 64.0.21 allows demo accounts to execute code via the BoxTrapper API (SEC-238). | |||||
CVE-2019-1010062 | 1 Pluck-cms | 1 Pluckcms | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
PluckCMS 4.7.4 and earlier is affected by: CWE-434 Unrestricted Upload of File with Dangerous Type. The impact is: get webshell. The component is: data/inc/images.php line36. The attack vector is: modify the MIME TYPE on HTTP request to upload a php file. The fixed version is: after commit 09f0ab871bf633973cfd9fc4fe59d4a912397cf8. | |||||
CVE-2019-14748 | 1 Osticket | 1 Osticket | 2024-02-28 | 3.5 LOW | 5.4 MEDIUM |
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. The Ticket creation form allows users to upload files along with queries. It was found that the file-upload functionality has fewer (or no) mitigations implemented for file content checks; also, the output is not handled properly, causing persistent XSS that leads to cookie stealing or malicious actions. For example, a non-agent user can upload a .html file, and Content-Disposition will be set to inline instead of attachment. | |||||
CVE-2019-16192 | 1 Doccms | 1 Doccms | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
upload_model() in /admini/controllers/system/managemodel.php in DocCms 2016.5.17 allow remote attackers to execute arbitrary PHP code through module management files, as demonstrated by a .php file in a ZIP archive. | |||||
CVE-2019-1010209 | 1 Gorul | 1 Gourl | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
GoUrl.io GoURL Wordpress Plugin 1.4.13 and earlier is affected by: CWE-434. The impact is: unauthenticated/unzuthorized Attacker can upload executable file in website. The component is: gourl.php#L5637. The fixed version is: 1.4.14. | |||||
CVE-2019-13976 | 1 Egain | 1 Chat | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
eGain Chat 15.0.3 allows unrestricted file upload. | |||||
CVE-2017-18592 | 1 Wc-marketplace | 1 Wc Catalog Enquiry | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
The woocommerce-catalog-enquiry plugin before 3.1.0 for WordPress has an incorrect wp_upload directory for file uploads. | |||||
CVE-2019-8371 | 1 Open-emr | 1 Openemr | 2024-02-28 | 9.0 HIGH | 7.2 HIGH |
OpenEMR v5.0.1-6 allows code execution. | |||||
CVE-2019-3960 | 1 Wallaceit | 1 Wallacepos | 2024-02-28 | 6.5 MEDIUM | 7.2 HIGH |
Unrestricted upload of file with dangerous type in WallacePOS 1.4.3 allows a remote, authenticated attacker to execute arbitrary code by uploading a malicious PHP file. | |||||
CVE-2015-5601 | 1 Edx | 1 Edx-platform | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
edx-platform before 2015-07-20 allows code execution by privileged users because the course import endpoint mishandles .tar.gz files. | |||||
CVE-2018-18572 | 1 Oscommerce | 1 Oscommerce | 2024-02-28 | 6.5 MEDIUM | 7.2 HIGH |
osCommerce 2.3.4.1 has an incomplete '.htaccess' for blacklist filtering in the "product" page. Because of this filter, script files with certain PHP-related extensions (such as .phtml and .php5) didn't execute in the application. But this filter didn't prevent the '.pht' extension. Thus, remote authenticated administrators can upload '.pht' files for arbitrary PHP code execution via a /catalog/admin/categories.php?cPath=&action=new_product URI. | |||||
CVE-2019-1010123 | 1 Modx | 1 Modx Revolution | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
MODX Revolution Gallery 1.7.0 is affected by: CWE-434: Unrestricted Upload of File with Dangerous Type. The impact is: Creating file with custom a filename and content. The component is: Filtering user parameters before passing them into phpthumb class. The attack vector is: web request via /assets/components/gallery/connector.php. |