Vulnerabilities (CVE)

Filtered by CWE-434
Total 2651 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-34257 1 Wpanel Cms Project 1 Wpanel Cms 2024-11-21 6.5 MEDIUM 8.8 HIGH
Multiple Remote Code Execution (RCE) vulnerabilities exist in WPanel 4 4.3.1 and below via a malicious PHP file upload to (1) Dashboard's Avatar image, (2) Posts Folder image, (3) Pages Folder image and (4) Gallery Folder image.
CVE-2021-34128 1 Laiketui 1 Laiketui 2024-11-21 6.5 MEDIUM 8.8 HIGH
LaikeTui 3.5.0 allows remote authenticated users to execute arbitrary PHP code by using index.php?module=system&action=pay to upload a ZIP archive containing a .php file, as demonstrated by the ../../../../phpinfo.php pathname.
CVE-2021-34076 1 Phpok 1 Phpok 2024-11-21 N/A 8.8 HIGH
File Upload vulnerability in PHPOK 5.7.140 allows remote attackers to run arbitrary code and gain escalated privileges via crafted zip file upload.
CVE-2021-34074 1 Pandorafms 1 Pandora Fms 2024-11-21 7.5 HIGH 9.8 CRITICAL
PandoraFMS <=7.54 allows arbitrary file upload, it leading to remote command execution via the File Manager. To bypass the built-in protection, a relative path is used in the requests.
CVE-2021-33884 1 Bbraun 3 Infusomat Large Volume Pump 871305u, Spacecom2, Spacestation 8713142u 2024-11-21 5.0 MEDIUM 6.5 MEDIUM
An Unrestricted Upload of File with Dangerous Type vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows remote attackers to upload any files to the /tmp directory of the device through the webpage API. This can result in critical files being overwritten.
CVE-2021-33828 1 Owncloud 1 Files Antivirus 2024-11-21 6.5 MEDIUM 8.8 HIGH
The files_antivirus component before 1.0.0 for ownCloud mishandles the protection mechanism by which malicious files (that have been uploaded to a public share) are supposed to be deleted upon detection.
CVE-2021-33698 1 Sap 1 Business One 2024-11-21 6.5 MEDIUM 8.8 HIGH
SAP Business One, version - 10.0, allows an attacker with business authorization to upload any files (including script files) without the proper file format validation.
CVE-2021-33615 1 Rsa 1 Archer 2024-11-21 8.5 HIGH 7.5 HIGH
RSA Archer 6.8.00500.1003 P5 allows Unrestricted Upload of a File with a Dangerous Type.
CVE-2021-33352 1 Wyomind 1 Help Desk 2024-11-21 N/A 9.8 CRITICAL
An issue in Wyomind Help Desk Magento 2 extension v.1.3.6 and before fixed in v.1.3.7 allows attacker to execute arbitrary code via a phar file upload in the ticket message field.
CVE-2021-33224 1 Umbraco 1 Umbraco Forms 2024-11-21 N/A 9.8 CRITICAL
File upload vulnerability in Umbraco Forms v.8.7.0 allows unauthenticated attackers to execute arbitrary code via a crafted web.config and asp file.
CVE-2021-33009 1 Myscada 1 Mypro 2024-11-21 5.0 MEDIUM 7.5 HIGH
mySCADA myPRO versions prior to 8.20.0 allows an unauthenticated remote attacker to upload arbitrary files to the file system.
CVE-2021-32961 1 Auvesy-mdt 2 Autosave, Autosave For System Platform 2024-11-21 5.0 MEDIUM 7.5 HIGH
A getfile function in MDT AutoSave versions prior to v6.02.06 enables a user to supply an optional parameter, resulting in the processing of a request in a special manner. This can result in the execution of an unzip command and place a malicious .exe file in one of the locations the function looks for and get execution capabilities.
CVE-2021-32955 1 Deltaww 1 Diaenergie 2024-11-21 7.5 HIGH 9.8 CRITICAL
Delta Electronics DIAEnergie Version 1.7.5 and prior allows unrestricted file uploads, which may allow an attacker to remotely execute code.
CVE-2021-32661 1 Linuxfoundation 1 \@backstage\/plugin-techdocs 2024-11-21 4.9 MEDIUM 6.8 MEDIUM
Backstage is an open platform for building developer portals. In versions of Backstage's Techdocs Plugin (`@backstage/plugin-techdocs`) prior to 0.9.5, a malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. The vulnerability is patched in the `0.9.5` release of `@backstage/plugin-techdocs`.
CVE-2021-32660 1 Linuxfoundation 1 \@backstage\/techdocs-common 2024-11-21 5.8 MEDIUM 6.8 MEDIUM
Backstage is an open platform for building developer portals, and techdocs-common contains common functionalities for Backstage's TechDocs. In versions of `@backstage/tehdocs-common` prior to 0.6.4, a malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same origin as the Backstage app or other backend plugins, this may give access to sensitive data. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. The vulnerability is patched in the `0.6.4` release of `@backstage/techdocs-common`.
CVE-2021-32630 1 Admidio 1 Admidio 2024-11-21 6.5 MEDIUM 9.6 CRITICAL
Admidio is a free, open source user management system for websites of organizations and groups. In Admidio before version 4.0.4, there is an authenticated RCE via .phar file upload. A php web shell can be uploaded via the Documents & Files upload feature. Someone with upload permissions could rename the php shell with a .phar extension, visit the file, triggering the payload for a reverse/bind shell. This can be mitigated by excluding a .phar file extension to be uploaded (like you did with .php .phtml .php5 etc). The vulnerability is patched in version 4.0.4.
CVE-2021-32622 1 Matrix-react-sdk Project 1 Matrix-react-sdk 2024-11-21 4.4 MEDIUM 4.2 MEDIUM
Matrix-React-SDK is a react-based SDK for inserting a Matrix chat/voip client into a web page. Before version 3.21.0, when uploading a file, the local file preview can lead to execution of scripts embedded in the uploaded file. This can only occur after several user interactions to open the preview in a separate tab. This only impacts the local user while in the process of uploading. It cannot be exploited remotely or by other users. This vulnerability is patched in version 3.21.0.
CVE-2021-32594 1 Fortinet 1 Fortiportal 2024-11-21 5.5 MEDIUM 5.4 MEDIUM
An unrestricted file upload vulnerability in the web interface of FortiPortal 6.0.0 through 6.0.4, 5.3.0 through 5.3.5, 5.2.0 through 5.2.5, and 4.2.2 and earlier may allow a low-privileged user to potentially tamper with the underlying system's files via the upload of specifically crafted files.
CVE-2021-32538 1 Artware Cms Project 1 Artware Cms 2024-11-21 7.5 HIGH 9.8 CRITICAL
ARTWARE CMS parameter of image upload function does not filter the type of upload files which allows remote attackers can upload arbitrary files without logging in, and further execute code unrestrictedly.
CVE-2021-32243 1 Fogproject 1 Fogproject 2024-11-21 6.5 MEDIUM 8.8 HIGH
FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated).