Total
3290 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-1010209 | 1 Gorul | 1 Gourl | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
GoUrl.io GoURL Wordpress Plugin 1.4.13 and earlier is affected by: CWE-434. The impact is: unauthenticated/unzuthorized Attacker can upload executable file in website. The component is: gourl.php#L5637. The fixed version is: 1.4.14. | |||||
CVE-2019-1010123 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
MODX Revolution Gallery 1.7.0 is affected by: CWE-434: Unrestricted Upload of File with Dangerous Type. The impact is: Creating file with custom a filename and content. The component is: Filtering user parameters before passing them into phpthumb class. The attack vector is: web request via /assets/components/gallery/connector.php. | |||||
CVE-2019-1010062 | 1 Pluck-cms | 1 Pluckcms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
PluckCMS 4.7.4 and earlier is affected by: CWE-434 Unrestricted Upload of File with Dangerous Type. The impact is: get webshell. The component is: data/inc/images.php line36. The attack vector is: modify the MIME TYPE on HTTP request to upload a php file. The fixed version is: after commit 09f0ab871bf633973cfd9fc4fe59d4a912397cf8. | |||||
CVE-2019-0327 | 1 Sap | 1 Netweaver Application Server Java | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
SAP NetWeaver for Java Application Server - Web Container, (engineapi, versions 7.1, 7.2, 7.3, 7.31, 7.4 and 7.5), (servercode, versions 7.2, 7.3, 7.31, 7.4, 7.5), allows an attacker to upload files (including script files) without proper file format validation. | |||||
CVE-2019-0259 | 1 Sap | 1 Businessobjects | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
SAP BusinessObjects, versions 4.2 and 4.3, (Visual Difference) allows an attacker to upload any file (including script files) without proper file format validation. | |||||
CVE-2019-0017 | 1 Juniper | 1 Junos Space | 2024-11-21 | 6.5 MEDIUM | 6.5 MEDIUM |
The Junos Space application, which allows Device Image files to be uploaded, has insufficient validity checking which may allow uploading of malicious images or scripts, or other content types. Affected releases are Juniper Networks Junos Space versions prior to 18.3R1. | |||||
CVE-2018-9209 | 1 Fineuploader | 1 Php-traditional-server | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Unauthenticated arbitrary file upload vulnerability in FineUploader php-traditional-server <= v1.2.2 | |||||
CVE-2018-9208 | 1 Tuyoshi | 1 Jquery Picture Cut | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Unauthenticated arbitrary file upload vulnerability in jQuery Picture Cut <= v1.1Beta | |||||
CVE-2018-9207 | 1 Hayageek | 1 Jquery Upload File | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Arbitrary file upload in jQuery Upload File <= 4.0.2 | |||||
CVE-2018-9206 | 1 Jquery File Upload Project | 1 Jquery File Upload | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0 | |||||
CVE-2018-9157 | 1 Axis | 2 M1033-w, M1033-w Firmware | 2024-11-21 | 7.6 HIGH | 7.5 HIGH |
An issue was discovered on AXIS M1033-W (IP camera) Firmware version 5.40.5.1 devices. The upload web page doesn't verify the file type, and an attacker can upload a webshell by making a fileUpload.shtml request for a custom .shtml file, which is interpreted by the Apache HTTP Server mod_include module with "<!--#exec cmd=" support. The file needs to include a specific string to meet the internal system architecture. After the webshell upload, an attacker can use the webshell to perform remote code execution such as running a system command (ls, ping, cat /etc/passwd, etc.). NOTE: the vendor reportedly indicates that this is an intended feature or functionality | |||||
CVE-2018-9156 | 1 Axis | 2 P1354, P1354 Firmware | 2024-11-21 | 7.6 HIGH | 7.5 HIGH |
An issue was discovered on AXIS P1354 (IP camera) Firmware version 5.90.1.1 devices. The upload web page doesn't verify the file type, and an attacker can upload a webshell by making a fileUpload.shtml request for a custom .shtml file, which is interpreted by the Apache HTTP Server mod_include module with "<!--#exec cmd=" support. The file needs to include a specific string to meet the internal system architecture. After the webshell upload, an attacker can use the webshell to perform remote code execution such as running a system command (ls, ping, cat /etc/passwd, etc.). NOTE: the vendor reportedly indicates that this is an intended feature or functionality | |||||
CVE-2018-9153 | 1 Zblogcn | 1 Z-blogphp | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The plugin upload component in Z-BlogPHP 1.5.1 allows remote attackers to execute arbitrary PHP code via the app_id parameter to zb_users/plugin/AppCentre/plugin_edit.php because of an unanchored regular expression, a different vulnerability than CVE-2018-8893. The component must be accessed directly by an administrator, or through CSRF. | |||||
CVE-2018-9037 | 1 Monstra | 1 Monstra | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Monstra CMS 3.0.4 allows remote code execution via an upload_file request for a .zip file, which is automatically extracted and may contain .php files. | |||||
CVE-2018-8944 | 1 Phpok | 1 Phpok | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
PHPOK 4.8.338 has an arbitrary file upload vulnerability. | |||||
CVE-2018-8766 | 1 Joyplus-cms Project | 1 Joyplus-cms | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
joyplus-cms 1.6.0 allows Remote Code Execution because of an Arbitrary File Upload issue in manager/editor/upload.php, related to manager/admin_vod.php?action=add. | |||||
CVE-2018-7836 | 1 Schneider-electric | 1 Iiot Monitor | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An unrestricted Upload of File with Dangerous Type vulnerability exists on numerous methods of the IIoT Monitor 3.1.38 software that could allow upload and execution of malicious files. | |||||
CVE-2018-7665 | 1 Clip-bucket | 1 Clipbucket | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
An issue was discovered in ClipBucket before 4.0.0 Release 4902. A malicious file can be uploaded via the name parameter to actions/beats_uploader.php or actions/photo_uploader.php, or the coverPhoto parameter to edit_account.php. | |||||
CVE-2018-7567 | 1 Otrs | 1 Otrs | 2024-11-21 | 9.0 HIGH | 7.2 HIGH |
In the Admin Package Manager in Open Ticket Request System (OTRS) 5.0.0 through 5.0.24 and 6.0.0 through 6.0.1, authenticated admins are able to exploit a Blind Remote Code Execution vulnerability by loading a crafted opm file with an embedded CodeInstall element to execute a command on the server during package installation. NOTE: the vendor disputes this issue stating "the behaviour is as designed and needed for different packages to be installed", "there is a security warning if the package is not verified by OTRS Group", and "there is the possibility and responsibility of an admin to check packages before installation which is possible as they are not binary. | |||||
CVE-2018-7562 | 1 Glpi-project | 1 Glpi | 2024-11-21 | 6.0 MEDIUM | 7.5 HIGH |
A remote code execution issue was discovered in GLPI through 9.2.1. There is a race condition that allows temporary access to an uploaded executable file that will be disallowed. The application allows an authenticated user to upload a file when he/she creates a new ticket via front/fileupload.php. This feature is protected using different types of security features like the check on the file's extension. However, the application uploads and creates a file, though this file is not allowed, and then deletes the file in the uploadFiles method in inc/glpiuploaderhandler.class.php. |