Vulnerabilities (CVE)

Filtered by CWE-434
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-12615 2 Apache, Microsoft 2 Tomcat, Windows 2019-04-15 6.8 MEDIUM 8.1 HIGH
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
CVE-2018-19453 1 Kentico 1 Kentico Cms 2019-04-11 6.8 MEDIUM 8.8 HIGH
Kentico CMS before 11.0.45 allows unrestricted upload of a file with a dangerous type.
CVE-2019-10478 1 Glory-global 2 Rbw-100, Rbw-100 Firmware 2019-04-09 9.0 HIGH 7.2 HIGH
An issue was discovered on Glory RBW-100 devices with firmware ISP-K05-02 7.0.0. An unrestricted file upload vulnerability in the Front Circle Controller glytoolcgi/settingfile_upload.cgi allows attackers to upload supplied data. This can be used to place attacker controlled code on the filesystem that can be executed and can lead to a reverse root shell.
CVE-2019-9692 1 Cmsmadesimple 1 Cms Made Simple 2019-04-02 4.0 MEDIUM 6.5 MEDIUM
class.showtime2_image.php in CMS Made Simple (CMSMS) before 2.2.10 does not ensure that a watermark file has a standard image file extension (GIF, JPG, JPEG, or PNG).
CVE-2019-3489 1 Microfocus 1 Content Manager 2019-04-02 5.0 MEDIUM 7.5 HIGH
An unauthenticated file upload vulnerability has been identified in the Web Client component of Micro Focus Content Manager 9.1, 9.2, and 9.3 when configured to use the ADFS authentication method. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to arbitrary locations on the Content Manager server.
CVE-2019-10276 1 Cobub 1 Razor 2019-04-01 7.5 HIGH 9.8 CRITICAL
Western Bridge Cobub Razor 0.8.0 has a file upload vulnerability via the web/assets/swf/uploadify.php URI, as demonstrated by a .php file with the image/jpeg content type.
CVE-2019-10647 1 Zzzcms 1 Zzzphp 2019-04-01 7.5 HIGH 9.8 CRITICAL
ZZZCMS zzzphp v1.6.3 allows remote attackers to execute arbitrary PHP code via a .php URL in the plugins/ueditor/php/controller.php?action=catchimage source[] parameter because of a lack of inc/zzz_file.php restrictions. For example, source%5B%5D=http%3A%2F%2F192.168.0.1%2Ftest.php can be used if the 192.168.0.1 web server sends the contents of a .php file (i.e., it does not interpret a .php file).
CVE-2019-10652 1 Flatcore 1 Flatcore 2019-04-01 6.5 MEDIUM 7.2 HIGH
An issue was discovered in flatCore 1.4.7. acp/acp.php allows remote authenticated administrators to upload arbitrary .php files, related to the addons feature.
CVE-2018-11345 1 Asustor 2 As6202t, As6202t Firmware 2019-03-29 6.5 MEDIUM 8.8 HIGH
An unrestricted file upload vulnerability in upload.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data via the POST parameter filename. This can be used to place attacker controlled code on the file system that can then be executed. Further, the filename parameter is vulnerable to path traversal and allows the attacker to place the file anywhere on the system.
CVE-2017-15580 1 Osticket 1 Osticket 2019-03-26 7.5 HIGH 9.8 CRITICAL
osTicket 1.10.1 provides a functionality to upload 'html' files with associated formats. However, it does not properly validate the uploaded file's contents and thus accepts any type of file, such as with a tickets.php request that is modified with a .html extension changed to a .exe extension. An attacker can leverage this vulnerability to upload arbitrary files on the web application having malicious content.
CVE-2018-20526 1 Roxyfileman 1 Roxy Fileman 2019-03-22 7.5 HIGH 9.8 CRITICAL
Roxy Fileman 1.4.5 allows unrestricted file upload in upload.php.
CVE-2018-19514 1 Ens 1 Webgalamb 2019-03-21 7.5 HIGH 9.8 CRITICAL
In Webgalamb through 7.0, an arbitrary code execution vulnerability could be exploited remotely without authentication. Exploitation requires authentication bypass to access administrative functions of the site to upload a crafted CSV file with a malicious payload that becomes part of a PHP eval() expression in the subscriber.php file.
CVE-2018-11340 1 Asustor 2 As6202t, As6202t Firmware 2019-03-21 9.0 HIGH 7.2 HIGH
An unrestricted file upload vulnerability in importuser.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data to a specified filename. This can be used to place attacker controlled code on the file system that is then executed.
CVE-2018-1000094 1 Cmsmadesimple 1 Cms Made Simple 2019-03-19 6.5 MEDIUM 7.2 HIGH
CMS Made Simple version 2.2.5 contains a Remote Code Execution vulnerability in File Manager that can result in Allows an authenticated admin that has access to the file manager to execute code on the server. This attack appear to be exploitable via File upload -> copy to any extension.
CVE-2019-9825 1 Feifeicms 1 Feifeicms 2019-03-19 7.5 HIGH 9.8 CRITICAL
FeiFeiCMS 4.1.190209 allows remote attackers to upload and execute arbitrary PHP code by visiting index.php?s=Admin-Index to modify the set of allowable file extensions, as demonstrated by adding php to the default jpg,gif,png,jpeg setting, and then using the "add article" feature.
CVE-2017-9080 1 Playsms 1 Playsms 2019-03-15 6.5 MEDIUM 8.8 HIGH
PlaySMS 1.4 allows remote code execution because PHP code in the name of an uploaded .php file is executed. sendfromfile.php has a combination of Unrestricted File Upload and Code Injection.
CVE-2017-6090 1 Phpcollab 1 Phpcollab 2019-03-13 6.5 MEDIUM 8.8 HIGH
Unrestricted file upload vulnerability in clients/editclient.php in PhpCollab 2.5.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in logos_clients/.
CVE-2018-17418 1 Monstra 1 Monstra 2019-03-08 6.5 MEDIUM 7.2 HIGH
Monstra CMS 3.0.4 allows remote attackers to execute arbitrary PHP code via a mixed-case file extension, as demonstrated by the 123.PhP filename, because plugins\box\filesmanager\filesmanager.admin.php mishandles the forbidden_types variable.
CVE-2019-9572 1 Schoolcms 1 Schoolcms 2019-03-08 6.5 MEDIUM 7.2 HIGH
SchoolCMS version 2.3.1 allows file upload via the theme upload feature at admin.php?m=admin&c=theme&a=upload by using the .zip extension along with the _Static substring, changing the Content-Type to application/zip, and placing PHP code after the ZIP header. This ultimately allows execution of arbitrary PHP code in Public\Home\1_Static.php because of mishandling in the Application\Admin\Controller\ThemeController.class.php Upload() function.
CVE-2019-9609 1 Ofcms Project 1 Ofcms 2019-03-07 6.5 MEDIUM 8.8 HIGH
An issue was discovered in OFCMS before 1.1.3. Remote attackers can execute arbitrary code because blocking of .jsp and .jspx files does not consider (for example) file.jsp::$DATA to the admin/comn/service/editUploadImage URI.
CVE-2019-9623 1 Fengoffice 1 Feng Office 2019-03-07 7.5 HIGH 9.8 CRITICAL
Feng Office 3.7.0.5 allows remote attackers to execute arbitrary code via "<!--#exec cmd=" in a .shtml file to ck_upload_handler.php.
CVE-2019-9612 1 Ofcms Project 1 Ofcms 2019-03-07 6.5 MEDIUM 8.8 HIGH
An issue was discovered in OFCMS before 1.1.3. Remote attackers can execute arbitrary code because blocking of .jsp and .jspx files does not consider (for example) file.jsp::$DATA to the admin/comn/service/upload URI.
CVE-2019-9613 1 Ofcms Project 1 Ofcms 2019-03-07 6.5 MEDIUM 7.2 HIGH
An issue was discovered in OFCMS before 1.1.3. Remote attackers can execute arbitrary code because blocking of .jsp and .jspx files does not consider (for example) file.jsp::$DATA to the admin/ueditor/uploadVideo URI.
CVE-2019-9608 1 Ofcms Project 1 Ofcms 2019-03-07 6.5 MEDIUM 8.8 HIGH
An issue was discovered in OFCMS before 1.1.3. Remote attackers can execute arbitrary code because blocking of .jsp and .jspx files does not consider (for example) file.jsp::$DATA to the admin/ueditor/uploadImage URI.
CVE-2019-9617 1 Ofcms Project 1 Ofcms 2019-03-07 6.5 MEDIUM 8.8 HIGH
An issue was discovered in OFCMS before 1.1.3. Remote attackers can execute arbitrary code because blocking of .jsp and .jspx files does not consider (for example) file.jsp::$DATA to the admin/ueditor/uploadFile URI.
CVE-2018-20063 1 Gurock 1 Testrail 2019-02-27 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Gurock TestRail 5.6.0.3853. An "Unrestricted Upload of File" vulnerability exists in the image-upload form (available in the description editor), allowing remote authenticated users to execute arbitrary code by uploading an image file with an executable extension but a safe Content-Type value, and then accessing it via a direct request to the file in the file-upload directory (if it's accessible according to the server configuration).
CVE-2019-9181 1 Schoolcms 1 Schoolcms 2019-02-26 6.5 MEDIUM 7.2 HIGH
SchoolCMS version 2.3.1 allows file upload via the logo upload feature at admin.php?m=admin&c=site&a=save by using the .jpg extension, changing the Content-Type to image/php, and placing PHP code after the JPEG data. This ultimately allows execution of arbitrary PHP code.
CVE-2019-8394 1 Zohocorp 1 Manageengine Servicedesk Plus 2019-02-26 4.0 MEDIUM 6.5 MEDIUM
Zoho ManageEngine ServiceDesk Plus (SDP) before 10.0 build 10012 allows remote attackers to upload arbitrary files via login page customization.
CVE-2019-9050 1 Pluck-cms 1 Pluck 2019-02-25 6.5 MEDIUM 7.2 HIGH
An issue was discovered in Pluck 4.7.9-dev1. It allows administrators to execute arbitrary code by using action=installmodule to upload a ZIP archive, which is then extracted and executed.
CVE-2019-7684 1 Inxedu 1 Inxedu 2019-02-22 10.0 HIGH 9.8 CRITICAL
inxedu through 2018-12-24 has a vulnerability that can lead to the upload of a malicious JSP file. The vulnerable code location is com.inxedu.os.common.controller.VideoUploadController#gok4 (com/inxedu/os/common/controller/VideoUploadController.java). The attacker uses the /video/uploadvideo fileType parameter to change the list of acceptable extensions from jpg,gif,png,jpeg to jpg,gif,png,jsp,jpeg.
CVE-2019-8933 1 Dedecms 1 Dedecms 2019-02-20 6.5 MEDIUM 8.8 HIGH
In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on New Template, and modifying the filename from ../index.html to ../index.php.
CVE-2019-0259 1 Sap 1 Businessobjects 2019-02-20 7.5 HIGH 9.8 CRITICAL
SAP BusinessObjects, versions 4.2 and 4.3, (Visual Difference) allows an attacker to upload any file (including script files) without proper file format validation.
CVE-2019-8433 1 Jtbc 1 Jtbc Php 2019-02-20 5.0 MEDIUM 7.5 HIGH
JTBC(PHP) 3.0.1.8 allows Arbitrary File Upload via the console/#/console/file/manage.php?type=list URI, as demonstrated by a .php file.
CVE-2019-8362 1 Dedecms 1 Dedecms 2019-02-20 5.0 MEDIUM 7.5 HIGH
DedeCMS through V5.7SP2 allows arbitrary file upload in dede/album_edit.php or dede/album_add.php, as demonstrated by a dede/album_edit.php?dopost=save&formzip=1 request with a ZIP archive that contains a file such as "1.jpg.php" (because input validation only checks that .jpg, .png, or .gif is present as a substring, and does not otherwise check the file name or content).
CVE-2018-5204 1 Infraware-global 1 Ml Report 2019-02-11 7.5 HIGH 9.8 CRITICAL
ML Report version Between 2.00.000.0000 and 2.18.628.5980 contains a vulnerability that could allow remote attacker to download and execute remote arbitrary file by setting the arguments to the activex method. this can be leveraged for code execution.
CVE-2019-7721 1 Nconsulting 1 Nc-cms 2019-02-11 5.0 MEDIUM 7.5 HIGH
lib/NCCms.class.php in nc-cms 3.5 allows upload of .php files via the index.php?action=save name and editordata parameters.
CVE-2018-7836 1 Schneider-electric 1 Iiot Monitor 2019-02-06 7.5 HIGH 9.8 CRITICAL
An unrestricted Upload of File with Dangerous Type vulnerability exists on numerous methods of the IIoT Monitor 3.1.38 software that could allow upload and execution of malicious files.
CVE-2018-6152 3 Debian, Google, Redhat 5 Debian Linux, Chrome, Enterprise Linux Desktop and 2 more 2019-02-05 6.8 MEDIUM 9.6 CRITICAL
The implementation of the Page.downloadBehavior backend unconditionally marked downloaded files as safe, regardless of file type in Google Chrome prior to 66.0.3359.117 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page and user interaction.
CVE-2018-1000839 1 Librehealth 1 Librehealth Ehr 2019-02-01 6.5 MEDIUM 8.8 HIGH
LH-EHR version REL-2_0_0 contains a Arbitrary File Upload vulnerability in Profile picture upload that can result in Remote Code Execution. This attack appear to be exploitable via Uploading a PHP file with image MIME type.
CVE-2018-15537 1 Ocsinventory-ng 1 Ocsinventory Ng 2019-01-31 6.5 MEDIUM 8.8 HIGH
Unrestricted file upload (with remote code execution) in OCS Inventory NG ocsreports allows a privileged user to gain access to the server via crafted HTTP requests.
CVE-2018-20166 1 Rukovoditel 1 Rukovoditel 2019-01-31 6.5 MEDIUM 8.8 HIGH
A file-upload vulnerability exists in Rukovoditel 2.3.1. index.php?module=configuration/save allows the user to upload a background image, and mishandles extension checking. It accepts uploads of PHP content if the first few characters match GIF data, and the filename ends in ".php" with mixed case, such as the .pHp extension.
CVE-2018-18888 1 Laravelcms Project 1 Laravelcms 2019-01-29 7.5 HIGH 9.8 CRITICAL
An issue was discovered in laravelCMS through 2018-04-02. \app\Http\Controllers\Backend\ProfileController.php allows upload of arbitrary PHP files because the file extension is not properly checked and uploaded files are not properly renamed.
CVE-2018-16169 1 Cybozu 1 Remote Service Manager 2019-01-14 6.5 MEDIUM 8.8 HIGH
Cybozu Remote Service 3.0.0 to 3.1.0 allows remote authenticated attackers to upload and execute Java code file on the server via unspecified vectors.
CVE-2018-18315 1 Mossle 1 Lemon 2019-01-11 5.0 MEDIUM 7.5 HIGH
com/mossle/cdn/CdnController.java in lemon 1.9.0 allows attackers to upload arbitrary files because the copyMultipartFileToFile method in CdnUtils only checks for a ../ substring, and does not validate the file type and spaceName parameter.
CVE-2018-1000811 1 Bludit 1 Bludit 2019-01-07 6.5 MEDIUM 8.8 HIGH
bludit version 3.0.0 contains a Unrestricted Upload of File with Dangerous Type vulnerability in Content Upload in Pages Editor that can result in Remote Command Execution. This attack appear to be exploitable via malicious user have to upload a crafted payload containing PHP code.
CVE-2018-16097 1 Lenovo 1 Xclarity Integrator 2018-12-28 4.0 MEDIUM 6.5 MEDIUM
LXCI for VMware versions prior to 5.5 and LXCI for Microsoft System Center versions prior to 3.5, allow an authenticated user to write to any system file due to insufficient sanitization during the upload of a certificate.
CVE-2018-16093 1 Lenovo 1 Xclarity Integrator 2018-12-28 4.0 MEDIUM 6.5 MEDIUM
In versions prior to 5.5, LXCI for VMware allows an authenticated user to write to any system file due to insufficient sanitization during the upload of a backup file.
CVE-2018-19537 1 Tp-link 2 Archer C5, Archer C5 Firmware 2018-12-28 9.0 HIGH 7.2 HIGH
TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF key and uploaded through the web GUI by using the web admin account. The default password of admin may be used in some cases.
CVE-2018-19421 1 Get-simple 1 Getsimple Cms 2018-12-28 4.0 MEDIUM 3.8 LOW
In GetSimpleCMS 3.3.15, admin/upload.php blocks .html uploads but Internet Explorer render HTML elements in a .eml file, because of admin/upload-uploadify.php, and validate_safe_file in admin/inc/security_functions.php.
CVE-2018-19420 1 Get-simple 1 Getsimple Cms 2018-12-28 4.0 MEDIUM 3.8 LOW
In GetSimpleCMS 3.3.15, admin/upload.php blocks .html uploads but there are several alternative cases in which HTML can be executed, such as a file with no extension or an unrecognized extension (e.g., the test or test.asdf filename), because of admin/upload-uploadify.php, and validate_safe_file in admin/inc/security_functions.php.