Vulnerabilities (CVE)

Filtered by CWE-434
Total 2654 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-15645 1 Marvell 1 Qconvergeconsole 2024-11-21 9.0 HIGH 8.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the getFileFromURL method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10553.
CVE-2020-15488 1 Re-desk 1 Re\ 2024-11-21 5.0 MEDIUM 7.5 HIGH
Re:Desk 2.3 allows insecure file upload.
CVE-2020-15277 1 Basercms 1 Basercms 2024-11-21 6.5 MEDIUM 7.2 HIGH
baserCMS before version 4.4.1 is affected by Remote Code Execution (RCE). Code may be executed by logging in as a system administrator and uploading an executable script file such as a PHP file. The Edit template component is vulnerable. The issue is fixed in version 4.4.1.
CVE-2020-15189 1 Brassica 1 Soy Cms 2024-11-21 6.5 MEDIUM 6.8 MEDIUM
SOY CMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was used in CVE-2020-15183 can be used to increase impact by redirecting the administrator to access a specially crafted page. This vulnerability is caused by insecure configuration in elFinder. This is fixed in version 3.0.2.328.
CVE-2020-14488 1 Freemedsoftware 1 Openclinic Ga 2024-11-21 9.0 HIGH 8.8 HIGH
OpenClinic GA 5.09.02 and 5.89.05b does not properly verify uploaded files, which may allow a low-privilege user to upload and execute arbitrary files on the system.
CVE-2020-14209 1 Dolibarr 1 Dolibarr 2024-11-21 6.5 MEDIUM 8.8 HIGH
Dolibarr before 11.0.5 allows low-privilege users to upload files of dangerous types, leading to arbitrary code execution. This occurs because .pht and .phar files can be uploaded. Also, a .htaccess file can be uploaded to reconfigure access control (e.g., to let .noexe files be executed as PHP code to defeat the .noexe protection mechanism).
CVE-2020-14067 1 Naviwebs 1 Navigatecms 2024-11-21 7.5 HIGH 9.8 CRITICAL
The install_from_hash functionality in Navigate CMS 2.9 does not consider the .phtml extension when examining files within a ZIP archive that may contain PHP code, in check_upload in lib/packages/extensions/extension.class.php and lib/packages/themes/theme.class.php.
CVE-2020-14066 1 Icewarp 1 Mail Server 2024-11-21 6.5 MEDIUM 8.8 HIGH
IceWarp Email Server 12.3.0.1 allows remote attackers to upload JavaScript files that are dangerous for clients to access.
CVE-2020-14065 1 Icewarp 1 Mail Server 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
IceWarp Email Server 12.3.0.1 allows remote attackers to upload files and consume disk space.
CVE-2020-14022 1 Ozeki 1 Ozeki Ng Sms Gateway 2024-11-21 9.0 HIGH 8.8 HIGH
Ozeki NG SMS Gateway 4.17.1 through 4.17.6 does not check the file type when bulk importing new contacts ("Import Contacts" functionality) from a file. It is possible to upload an executable or .bat file that can be executed with the help of a functionality (E.g. the "Application Starter" module) within the application.
CVE-2020-14008 1 Zohocorp 1 Manageengine Applications Manager 2024-11-21 6.5 MEDIUM 7.2 HIGH
Zoho ManageEngine Applications Manager 14710 and before allows an authenticated admin user to upload a vulnerable jar in a specific location, which leads to remote code execution.
CVE-2020-13994 1 Mods-for-hesk 1 Mods For Hesk 2024-11-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Mods for HESK 3.1.0 through 2019.1.0. A privileged user can achieve code execution on the server via a ticket because of improper access control of uploaded resources. This might be exploitable in conjunction with CVE-2020-13992 by an unauthenticated attacker.
CVE-2020-13887 1 Kordil Edms Project 1 Kordil Edms 2024-11-21 6.5 MEDIUM 8.8 HIGH
documents_add.php in Kordil EDMS through 2.2.60rc3 allows Remote Command Execution because .php files can be uploaded to the documents folder.
CVE-2020-13855 1 Pandorafms 1 Pandora Fms 2024-11-21 9.0 HIGH 7.2 HIGH
Artica Pandora FMS 7.44 allows arbitrary file upload (leading to remote command execution) via the File Repository Manager feature.
CVE-2020-13852 1 Pandorafms 1 Pandora Fms 2024-11-21 9.0 HIGH 7.2 HIGH
Artica Pandora FMS 7.44 allows arbitrary file upload (leading to remote command execution) via the File Manager feature.
CVE-2020-13774 1 Ivanti 1 Endpoint Manager 2024-11-21 9.0 HIGH 9.9 CRITICAL
An unrestricted file-upload issue in EditLaunchPadDialog.aspx in Ivanti Endpoint Manager 2019.1 and 2020.1 allows an authenticated attacker to gain remote code execution by uploading a malicious aspx file. The issue is caused by insufficient file extension validation and insecure file operations on the uploaded image, which upon failure will leave the temporarily created files in an accessible location on the server.
CVE-2020-13675 1 Drupal 1 Drupal 2024-11-21 7.5 HIGH 9.8 CRITICAL
Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.
CVE-2020-13671 2 Drupal, Fedoraproject 2 Drupal, Fedora 2024-11-21 6.5 MEDIUM 8.8 HIGH
Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.
CVE-2020-13443 1 Expressionengine 1 Expressionengine 2024-11-21 6.5 MEDIUM 8.8 HIGH
ExpressionEngine before 5.3.2 allows remote attackers to upload and execute arbitrary code in a .php%20 file via Compose Msg, Add attachment, and Save As Draft actions. A user with low privileges (member) is able to upload this. It is possible to bypass the MIME type check and file-extension check while uploading new files. Short aliases are not used for an attachment; instead, direct access is allowed to the uploaded files. It is possible to upload PHP only if one has member access, or registration/forum is enabled and one can create a member with the default group id of 5. To exploit this, one must to be able to send and compose messages (at least).
CVE-2020-13442 1 Dext5 1 Dext5 2024-11-21 7.5 HIGH 9.8 CRITICAL
A Remote code execution vulnerability exists in DEXT5Upload in DEXT5 through 2.7.1402870. An attacker can upload a PHP file via dext5handler.jsp handler because the uploaded file is stored under dext5uploadeddata/.