Vulnerabilities (CVE)

Filtered by CWE-434
Total 2367 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-16370 1 Pescms 1 Pescms Team 2018-11-07 7.5 HIGH 9.8 CRITICAL
In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through /Public/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive.
CVE-2018-16287 1 Lg 1 Supersign Cms 2018-11-07 7.5 HIGH 9.8 CRITICAL
LG SuperSign CMS allows file upload via signEzUI/playlist/edit/upload/..%2f URIs.
CVE-2014-10074 1 Umbraco 1 Umbraco Cms 2018-11-06 7.5 HIGH 9.8 CRITICAL
Umbraco before 7.2.0 has a remote PHP code execution vulnerability because Umbraco.Web.UI/config/umbracoSettings.Release.config does not block the upload of .php files.
CVE-2015-9263 1 Idera 1 Uptime Infrastructure Monitor 2018-11-05 7.5 HIGH 9.8 CRITICAL
An issue was discovered in post2file.php in Up.Time Monitoring Station 7.5.0 (build 16) and 7.4.0 (build 13). It allows an attacker to upload an arbitrary file, such as a .php file that can execute arbitrary OS commands.
CVE-2018-15882 1 Joomla 1 Joomla\! 2018-11-05 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Joomla! before 3.8.12. Inadequate checks in the InputFilter class could allow specifically prepared phar files to pass the upload filter.
CVE-2018-16388 1 E107 1 E107 2018-11-02 6.5 MEDIUM 7.2 HIGH
e107_web/js/plupload/upload.php in e107 2.1.8 allows remote attackers to execute arbitrary PHP code by uploading a .php filename with the image/jpeg content type.
CVE-2018-16397 1 Limesurvey 1 Limesurvey 2018-10-31 4.0 MEDIUM 4.9 MEDIUM
In LimeSurvey before 3.14.7, an admin user can leverage a "file upload" question to read an arbitrary file,
CVE-2018-16731 1 Chshcms 1 Cscms 2018-10-30 7.5 HIGH 9.8 CRITICAL
CScms 4.1 allows arbitrary file upload by (for example) adding the php extension to the default filetype list (gif, jpg, png), and then providing a .php pathname within fileurl JSON data.
CVE-2018-16352 1 Weaselcms Project 1 Weaselcms 2018-10-29 7.5 HIGH 9.8 CRITICAL
There is a PHP code upload vulnerability in WeaselCMS 0.3.6 via index.php because code can be embedded at the end of a .png file when the image/png content type is used.
CVE-2018-1000658 1 Limesurvey 1 Limesurvey 2018-10-26 6.5 MEDIUM 8.8 HIGH
LimeSurvey version prior to 3.14.4 contains a file upload vulnerability in upload functionality that can result in an attacker gaining code execution via webshell. This attack appear to be exploitable via an authenticated user uploading a zip archive which can contains malicious php files that can be called under certain circumstances. This vulnerability appears to have been fixed in after commit 91d143230eb357260a19c8424b3005deb49a47f7 / version 3.14.4.
CVE-2018-16373 1 Frog Cms Project 1 Frog Cms 2018-10-25 4.0 MEDIUM 4.9 MEDIUM
Frog CMS 0.9.5 has an Upload vulnerability that can create files via /admin/?/plugin/file_manager/save.
CVE-2018-15137 1 Cela Link 2 Clr-m20, Clr-m20 Firmware 2018-10-23 10.0 HIGH 9.8 CRITICAL
CeLa Link CLR-M20 devices allow unauthorized users to upload any file (e.g., asp, aspx, cfm, html, jhtml, jsp, or shtml), which causes remote code execution as well. Because of the WebDAV feature, it is possible to upload arbitrary files by utilizing the PUT method.
CVE-2018-1000646 1 Librehealth 1 Librehealth Ehr 2018-10-16 6.5 MEDIUM 8.8 HIGH
LibreHealthIO LH-EHR version REL-2.0.0 contains an Authenticated Unrestricted File Write vulnerability in Import template that can result in write files with malicious content and may lead to remote code execution.
CVE-2018-12256 1 Litecart 1 Litecart 2018-10-12 6.5 MEDIUM 8.8 HIGH
admin/vqmods.app/vqmods.inc.php in LiteCart before 2.1.3 allows remote authenticated attackers to upload a malicious file (resulting in remote code execution) by using the text/xml or application/xml Content-Type in a public_html/admin/?app=vqmods&doc=vqmods request.
CVE-2018-14857 1 Ocsinventory-ng 1 Ocs Inventory Server 2018-10-10 6.5 MEDIUM 8.8 HIGH
Unrestricted file upload (with remote code execution) in require/mail/NotificationMail.php in Webconsole in OCS Inventory NG OCS Inventory Server through 2.5 allows a privileged user to gain access to the server via a template file containing PHP code, because file extensions other than .html are permitted.
CVE-2018-14911 1 Ukcms 1 Ukcms 2018-10-10 6.5 MEDIUM 7.2 HIGH
A file upload vulnerability exists in ukcms v1.1.7 and earlier. The vulnerability is due to the system not strictly filtering the file upload type. An attacker can exploit the vulnerability to upload a script Trojan to admin.php/admin/configset/index/group/upload.html to gain server control by composing a request for a .txt upload and then changing it to a .php upload. The attacker must have admin access to change the upload_file_ext (aka "Allow upload file suffix") setting, and must use "php,php" in this setting to bypass the "php" restriction.
CVE-2018-14028 1 Wordpress 1 Wordpress 2018-10-10 6.5 MEDIUM 7.2 HIGH
In WordPress 4.9.7, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uploads location, allowing for an attacker to then execute the file. This represents a security risk in limited scenarios where an attacker (who does have the required capabilities for plugin uploads) cannot simply place arbitrary PHP code into a valid plugin ZIP file and upload that plugin, because a machine's wp-content/plugins directory permissions were set up to block all new plugins.
CVE-2017-7357 1 Atlassian 1 Hipchat Server 2018-10-09 6.5 MEDIUM 9.1 CRITICAL
Hipchat Server before 2.2.3 allows remote authenticated users with Server Administrator level privileges to execute arbitrary code by importing a file.
CVE-2015-7571 1 Yeager 1 Yeager Cms 2018-10-09 6.8 MEDIUM 7.8 HIGH
Unrestricted file upload vulnerability in Yeager CMS 1.2.1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension.
CVE-2018-12940 1 Seeddms 1 Seeddms 2018-10-01 6.5 MEDIUM 8.8 HIGH
Unrestricted file upload vulnerability in "op/op.UploadChunks.php" in SeedDMS (formerly LetoDMS and MyDMS) before 5.1.8 allows remote attackers to execute arbitrary code by uploading a file with an executable extension specified by the "qqfile" parameter. This allows an authenticated attacker to upload a malicious file containing PHP code to execute operating system commands to the web root of the application.