Vulnerabilities (CVE)

Filtered by CWE-434
Total 2641 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-11445 1 Openkm 1 Openkm 2024-11-21 9.0 HIGH 7.2 HIGH
OpenKM 6.3.2 through 6.3.7 allows an attacker to upload a malicious JSP file into the /okm:root directories and move that file to the home directory of the site, via frontend/FileUpload and admin/repository_export.jsp. This is achieved by interfering with the Filesystem path control in the admin's Export field. As a result, attackers can gain remote code execution through the application server with root privileges.
CVE-2019-11401 1 Siteserver 1 Siteserver Cms 2024-11-21 6.5 MEDIUM 7.2 HIGH
A issue was discovered in SiteServer CMS 6.9.0. It allows remote attackers to execute arbitrary code because an administrator can add the permitted file extension .aassp, which is converted to .asp because the "as" substring is deleted.
CVE-2019-11377 1 Wcms 1 Wcms 2024-11-21 6.5 MEDIUM 8.8 HIGH
wcms/wex/finder/action.php in WCMS v0.3.2 has a Arbitrary File Upload Vulnerability via developer/finder because .php is a valid extension according to the fm_get_text_exts function.
CVE-2019-11344 1 Pluck-cms 1 Pluck 2024-11-21 7.5 HIGH 9.8 CRITICAL
data/inc/files.php in Pluck 4.7.8 allows remote attackers to execute arbitrary code by uploading a .htaccess file that specifies SetHandler x-httpd-php for a .txt file, because only certain PHP-related filename extensions are blocked.
CVE-2019-11223 1 Supportcandy 1 Supportcandy 2024-11-21 7.5 HIGH 9.8 CRITICAL
An Unrestricted File Upload Vulnerability in the SupportCandy plugin through 2.0.0 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension.
CVE-2019-11028 1 Gatship 1 Web Module 2024-11-21 6.5 MEDIUM 8.8 HIGH
GAT-Ship Web Module before 1.40 suffers from a vulnerability allowing authenticated attackers to upload any file type to the server via the "Documents" area. This vulnerability is related to "uploadDocFile.aspx".
CVE-2019-10869 1 Ninjaforms 1 Ninja Forms File Uploads 2024-11-21 6.8 MEDIUM 8.1 HIGH
Path Traversal and Unrestricted File Upload exists in the Ninja Forms plugin before 3.0.23 for WordPress (when the Uploads add-on is activated). This allows an attacker to traverse the file system to access files and execute code via the includes/fields/upload.php (aka upload/submit page) name and tmp_name parameters.
CVE-2019-10652 1 Flatcore 1 Flatcore 2024-11-21 6.5 MEDIUM 7.2 HIGH
An issue was discovered in flatCore 1.4.7. acp/acp.php allows remote authenticated administrators to upload arbitrary .php files, related to the addons feature.
CVE-2019-10647 1 Zzzcms 1 Zzzphp 2024-11-21 7.5 HIGH 9.8 CRITICAL
ZZZCMS zzzphp v1.6.3 allows remote attackers to execute arbitrary PHP code via a .php URL in the plugins/ueditor/php/controller.php?action=catchimage source[] parameter because of a lack of inc/zzz_file.php restrictions. For example, source%5B%5D=http%3A%2F%2F192.168.0.1%2Ftest.php can be used if the 192.168.0.1 web server sends the contents of a .php file (i.e., it does not interpret a .php file).
CVE-2019-10478 1 Glory-global 2 Rbw-100, Rbw-100 Firmware 2024-11-21 9.0 HIGH 7.2 HIGH
An issue was discovered on Glory RBW-100 devices with firmware ISP-K05-02 7.0.0. An unrestricted file upload vulnerability in the Front Circle Controller glytoolcgi/settingfile_upload.cgi allows attackers to upload supplied data. This can be used to place attacker controlled code on the filesystem that can be executed and can lead to a reverse root shell.
CVE-2019-10276 1 Cobub 1 Razor 2024-11-21 7.5 HIGH 9.8 CRITICAL
Western Bridge Cobub Razor 0.8.0 has a file upload vulnerability via the web/assets/swf/uploadify.php URI, as demonstrated by a .php file with the image/jpeg content type.
CVE-2019-10012 2 Jenzabar, Tiny 2 Internet Campus Solution, Moxiemanager 2024-11-21 6.0 MEDIUM 7.5 HIGH
Jenzabar JICS (aka Internet Campus Solution) before 9 allows remote attackers to upload and execute arbitrary .aspx code by placing it in a ZIP archive and using the MoxieManager (for .NET) plugin before 2.1.4 in the moxiemanager directory within the installation folder ICS\ICS.NET\ICSFileServer.
CVE-2019-0259 1 Sap 1 Businessobjects 2024-11-21 7.5 HIGH 9.8 CRITICAL
SAP BusinessObjects, versions 4.2 and 4.3, (Visual Difference) allows an attacker to upload any file (including script files) without proper file format validation.
CVE-2019-0017 1 Juniper 1 Junos Space 2024-11-21 6.5 MEDIUM 6.5 MEDIUM
The Junos Space application, which allows Device Image files to be uploaded, has insufficient validity checking which may allow uploading of malicious images or scripts, or other content types. Affected releases are Juniper Networks Junos Space versions prior to 18.3R1.
CVE-2018-9209 1 Fineuploader 1 Php-traditional-server 2024-11-21 7.5 HIGH 9.8 CRITICAL
Unauthenticated arbitrary file upload vulnerability in FineUploader php-traditional-server <= v1.2.2
CVE-2018-9208 1 Tuyoshi 1 Jquery Picture Cut 2024-11-21 7.5 HIGH 9.8 CRITICAL
Unauthenticated arbitrary file upload vulnerability in jQuery Picture Cut <= v1.1Beta
CVE-2018-9207 1 Hayageek 1 Jquery Upload File 2024-11-21 7.5 HIGH 9.8 CRITICAL
Arbitrary file upload in jQuery Upload File <= 4.0.2
CVE-2018-9206 1 Jquery File Upload Project 1 Jquery File Upload 2024-11-21 7.5 HIGH 9.8 CRITICAL
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0
CVE-2018-9157 1 Axis 2 M1033-w, M1033-w Firmware 2024-11-21 7.6 HIGH 7.5 HIGH
An issue was discovered on AXIS M1033-W (IP camera) Firmware version 5.40.5.1 devices. The upload web page doesn't verify the file type, and an attacker can upload a webshell by making a fileUpload.shtml request for a custom .shtml file, which is interpreted by the Apache HTTP Server mod_include module with "<!--#exec cmd=" support. The file needs to include a specific string to meet the internal system architecture. After the webshell upload, an attacker can use the webshell to perform remote code execution such as running a system command (ls, ping, cat /etc/passwd, etc.). NOTE: the vendor reportedly indicates that this is an intended feature or functionality
CVE-2018-9156 1 Axis 2 P1354, P1354 Firmware 2024-11-21 7.6 HIGH 7.5 HIGH
An issue was discovered on AXIS P1354 (IP camera) Firmware version 5.90.1.1 devices. The upload web page doesn't verify the file type, and an attacker can upload a webshell by making a fileUpload.shtml request for a custom .shtml file, which is interpreted by the Apache HTTP Server mod_include module with "<!--#exec cmd=" support. The file needs to include a specific string to meet the internal system architecture. After the webshell upload, an attacker can use the webshell to perform remote code execution such as running a system command (ls, ping, cat /etc/passwd, etc.). NOTE: the vendor reportedly indicates that this is an intended feature or functionality