Total
2367 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-9080 | 1 Playsms | 1 Playsms | 2019-03-15 | 6.5 MEDIUM | 8.8 HIGH |
PlaySMS 1.4 allows remote code execution because PHP code in the name of an uploaded .php file is executed. sendfromfile.php has a combination of Unrestricted File Upload and Code Injection. | |||||
CVE-2017-6090 | 1 Phpcollab | 1 Phpcollab | 2019-03-13 | 6.5 MEDIUM | 8.8 HIGH |
Unrestricted file upload vulnerability in clients/editclient.php in PhpCollab 2.5.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in logos_clients/. | |||||
CVE-2018-17418 | 1 Monstra | 1 Monstra | 2019-03-08 | 6.5 MEDIUM | 7.2 HIGH |
Monstra CMS 3.0.4 allows remote attackers to execute arbitrary PHP code via a mixed-case file extension, as demonstrated by the 123.PhP filename, because plugins\box\filesmanager\filesmanager.admin.php mishandles the forbidden_types variable. | |||||
CVE-2019-9572 | 1 Schoolcms | 1 Schoolcms | 2019-03-08 | 6.5 MEDIUM | 7.2 HIGH |
SchoolCMS version 2.3.1 allows file upload via the theme upload feature at admin.php?m=admin&c=theme&a=upload by using the .zip extension along with the _Static substring, changing the Content-Type to application/zip, and placing PHP code after the ZIP header. This ultimately allows execution of arbitrary PHP code in Public\Home\1_Static.php because of mishandling in the Application\Admin\Controller\ThemeController.class.php Upload() function. | |||||
CVE-2019-9609 | 1 Ofcms Project | 1 Ofcms | 2019-03-07 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in OFCMS before 1.1.3. Remote attackers can execute arbitrary code because blocking of .jsp and .jspx files does not consider (for example) file.jsp::$DATA to the admin/comn/service/editUploadImage URI. | |||||
CVE-2019-9623 | 1 Fengoffice | 1 Feng Office | 2019-03-07 | 7.5 HIGH | 9.8 CRITICAL |
Feng Office 3.7.0.5 allows remote attackers to execute arbitrary code via "<!--#exec cmd=" in a .shtml file to ck_upload_handler.php. | |||||
CVE-2019-9612 | 1 Ofcms Project | 1 Ofcms | 2019-03-07 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in OFCMS before 1.1.3. Remote attackers can execute arbitrary code because blocking of .jsp and .jspx files does not consider (for example) file.jsp::$DATA to the admin/comn/service/upload URI. | |||||
CVE-2019-9613 | 1 Ofcms Project | 1 Ofcms | 2019-03-07 | 6.5 MEDIUM | 7.2 HIGH |
An issue was discovered in OFCMS before 1.1.3. Remote attackers can execute arbitrary code because blocking of .jsp and .jspx files does not consider (for example) file.jsp::$DATA to the admin/ueditor/uploadVideo URI. | |||||
CVE-2019-9608 | 1 Ofcms Project | 1 Ofcms | 2019-03-07 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in OFCMS before 1.1.3. Remote attackers can execute arbitrary code because blocking of .jsp and .jspx files does not consider (for example) file.jsp::$DATA to the admin/ueditor/uploadImage URI. | |||||
CVE-2019-9617 | 1 Ofcms Project | 1 Ofcms | 2019-03-07 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in OFCMS before 1.1.3. Remote attackers can execute arbitrary code because blocking of .jsp and .jspx files does not consider (for example) file.jsp::$DATA to the admin/ueditor/uploadFile URI. | |||||
CVE-2019-9181 | 1 Schoolcms | 1 Schoolcms | 2019-02-26 | 6.5 MEDIUM | 7.2 HIGH |
SchoolCMS version 2.3.1 allows file upload via the logo upload feature at admin.php?m=admin&c=site&a=save by using the .jpg extension, changing the Content-Type to image/php, and placing PHP code after the JPEG data. This ultimately allows execution of arbitrary PHP code. | |||||
CVE-2019-8394 | 1 Zohocorp | 1 Manageengine Servicedesk Plus | 2019-02-26 | 4.0 MEDIUM | 6.5 MEDIUM |
Zoho ManageEngine ServiceDesk Plus (SDP) before 10.0 build 10012 allows remote attackers to upload arbitrary files via login page customization. | |||||
CVE-2019-9050 | 1 Pluck-cms | 1 Pluck | 2019-02-25 | 6.5 MEDIUM | 7.2 HIGH |
An issue was discovered in Pluck 4.7.9-dev1. It allows administrators to execute arbitrary code by using action=installmodule to upload a ZIP archive, which is then extracted and executed. | |||||
CVE-2019-7684 | 1 Inxedu | 1 Inxedu | 2019-02-22 | 10.0 HIGH | 9.8 CRITICAL |
inxedu through 2018-12-24 has a vulnerability that can lead to the upload of a malicious JSP file. The vulnerable code location is com.inxedu.os.common.controller.VideoUploadController#gok4 (com/inxedu/os/common/controller/VideoUploadController.java). The attacker uses the /video/uploadvideo fileType parameter to change the list of acceptable extensions from jpg,gif,png,jpeg to jpg,gif,png,jsp,jpeg. | |||||
CVE-2019-8933 | 1 Dedecms | 1 Dedecms | 2019-02-20 | 6.5 MEDIUM | 8.8 HIGH |
In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on New Template, and modifying the filename from ../index.html to ../index.php. | |||||
CVE-2019-0259 | 1 Sap | 1 Businessobjects | 2019-02-20 | 7.5 HIGH | 9.8 CRITICAL |
SAP BusinessObjects, versions 4.2 and 4.3, (Visual Difference) allows an attacker to upload any file (including script files) without proper file format validation. | |||||
CVE-2019-8433 | 1 Jtbc | 1 Jtbc Php | 2019-02-20 | 5.0 MEDIUM | 7.5 HIGH |
JTBC(PHP) 3.0.1.8 allows Arbitrary File Upload via the console/#/console/file/manage.php?type=list URI, as demonstrated by a .php file. | |||||
CVE-2019-8362 | 1 Dedecms | 1 Dedecms | 2019-02-20 | 5.0 MEDIUM | 7.5 HIGH |
DedeCMS through V5.7SP2 allows arbitrary file upload in dede/album_edit.php or dede/album_add.php, as demonstrated by a dede/album_edit.php?dopost=save&formzip=1 request with a ZIP archive that contains a file such as "1.jpg.php" (because input validation only checks that .jpg, .png, or .gif is present as a substring, and does not otherwise check the file name or content). | |||||
CVE-2018-5204 | 1 Infraware-global | 1 Ml Report | 2019-02-11 | 7.5 HIGH | 9.8 CRITICAL |
ML Report version Between 2.00.000.0000 and 2.18.628.5980 contains a vulnerability that could allow remote attacker to download and execute remote arbitrary file by setting the arguments to the activex method. this can be leveraged for code execution. | |||||
CVE-2019-7721 | 1 Nconsulting | 1 Nc-cms | 2019-02-11 | 5.0 MEDIUM | 7.5 HIGH |
lib/NCCms.class.php in nc-cms 3.5 allows upload of .php files via the index.php?action=save name and editordata parameters. |