Total
2367 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-16370 | 1 Pescms | 1 Pescms Team | 2018-11-07 | 7.5 HIGH | 9.8 CRITICAL |
In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through /Public/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive. | |||||
CVE-2018-16287 | 1 Lg | 1 Supersign Cms | 2018-11-07 | 7.5 HIGH | 9.8 CRITICAL |
LG SuperSign CMS allows file upload via signEzUI/playlist/edit/upload/..%2f URIs. | |||||
CVE-2014-10074 | 1 Umbraco | 1 Umbraco Cms | 2018-11-06 | 7.5 HIGH | 9.8 CRITICAL |
Umbraco before 7.2.0 has a remote PHP code execution vulnerability because Umbraco.Web.UI/config/umbracoSettings.Release.config does not block the upload of .php files. | |||||
CVE-2015-9263 | 1 Idera | 1 Uptime Infrastructure Monitor | 2018-11-05 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in post2file.php in Up.Time Monitoring Station 7.5.0 (build 16) and 7.4.0 (build 13). It allows an attacker to upload an arbitrary file, such as a .php file that can execute arbitrary OS commands. | |||||
CVE-2018-15882 | 1 Joomla | 1 Joomla\! | 2018-11-05 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in Joomla! before 3.8.12. Inadequate checks in the InputFilter class could allow specifically prepared phar files to pass the upload filter. | |||||
CVE-2018-16388 | 1 E107 | 1 E107 | 2018-11-02 | 6.5 MEDIUM | 7.2 HIGH |
e107_web/js/plupload/upload.php in e107 2.1.8 allows remote attackers to execute arbitrary PHP code by uploading a .php filename with the image/jpeg content type. | |||||
CVE-2018-16397 | 1 Limesurvey | 1 Limesurvey | 2018-10-31 | 4.0 MEDIUM | 4.9 MEDIUM |
In LimeSurvey before 3.14.7, an admin user can leverage a "file upload" question to read an arbitrary file, | |||||
CVE-2018-16731 | 1 Chshcms | 1 Cscms | 2018-10-30 | 7.5 HIGH | 9.8 CRITICAL |
CScms 4.1 allows arbitrary file upload by (for example) adding the php extension to the default filetype list (gif, jpg, png), and then providing a .php pathname within fileurl JSON data. | |||||
CVE-2018-16352 | 1 Weaselcms Project | 1 Weaselcms | 2018-10-29 | 7.5 HIGH | 9.8 CRITICAL |
There is a PHP code upload vulnerability in WeaselCMS 0.3.6 via index.php because code can be embedded at the end of a .png file when the image/png content type is used. | |||||
CVE-2018-1000658 | 1 Limesurvey | 1 Limesurvey | 2018-10-26 | 6.5 MEDIUM | 8.8 HIGH |
LimeSurvey version prior to 3.14.4 contains a file upload vulnerability in upload functionality that can result in an attacker gaining code execution via webshell. This attack appear to be exploitable via an authenticated user uploading a zip archive which can contains malicious php files that can be called under certain circumstances. This vulnerability appears to have been fixed in after commit 91d143230eb357260a19c8424b3005deb49a47f7 / version 3.14.4. | |||||
CVE-2018-16373 | 1 Frog Cms Project | 1 Frog Cms | 2018-10-25 | 4.0 MEDIUM | 4.9 MEDIUM |
Frog CMS 0.9.5 has an Upload vulnerability that can create files via /admin/?/plugin/file_manager/save. | |||||
CVE-2018-15137 | 1 Cela Link | 2 Clr-m20, Clr-m20 Firmware | 2018-10-23 | 10.0 HIGH | 9.8 CRITICAL |
CeLa Link CLR-M20 devices allow unauthorized users to upload any file (e.g., asp, aspx, cfm, html, jhtml, jsp, or shtml), which causes remote code execution as well. Because of the WebDAV feature, it is possible to upload arbitrary files by utilizing the PUT method. | |||||
CVE-2018-1000646 | 1 Librehealth | 1 Librehealth Ehr | 2018-10-16 | 6.5 MEDIUM | 8.8 HIGH |
LibreHealthIO LH-EHR version REL-2.0.0 contains an Authenticated Unrestricted File Write vulnerability in Import template that can result in write files with malicious content and may lead to remote code execution. | |||||
CVE-2018-12256 | 1 Litecart | 1 Litecart | 2018-10-12 | 6.5 MEDIUM | 8.8 HIGH |
admin/vqmods.app/vqmods.inc.php in LiteCart before 2.1.3 allows remote authenticated attackers to upload a malicious file (resulting in remote code execution) by using the text/xml or application/xml Content-Type in a public_html/admin/?app=vqmods&doc=vqmods request. | |||||
CVE-2018-14857 | 1 Ocsinventory-ng | 1 Ocs Inventory Server | 2018-10-10 | 6.5 MEDIUM | 8.8 HIGH |
Unrestricted file upload (with remote code execution) in require/mail/NotificationMail.php in Webconsole in OCS Inventory NG OCS Inventory Server through 2.5 allows a privileged user to gain access to the server via a template file containing PHP code, because file extensions other than .html are permitted. | |||||
CVE-2018-14911 | 1 Ukcms | 1 Ukcms | 2018-10-10 | 6.5 MEDIUM | 7.2 HIGH |
A file upload vulnerability exists in ukcms v1.1.7 and earlier. The vulnerability is due to the system not strictly filtering the file upload type. An attacker can exploit the vulnerability to upload a script Trojan to admin.php/admin/configset/index/group/upload.html to gain server control by composing a request for a .txt upload and then changing it to a .php upload. The attacker must have admin access to change the upload_file_ext (aka "Allow upload file suffix") setting, and must use "php,php" in this setting to bypass the "php" restriction. | |||||
CVE-2018-14028 | 1 Wordpress | 1 Wordpress | 2018-10-10 | 6.5 MEDIUM | 7.2 HIGH |
In WordPress 4.9.7, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uploads location, allowing for an attacker to then execute the file. This represents a security risk in limited scenarios where an attacker (who does have the required capabilities for plugin uploads) cannot simply place arbitrary PHP code into a valid plugin ZIP file and upload that plugin, because a machine's wp-content/plugins directory permissions were set up to block all new plugins. | |||||
CVE-2017-7357 | 1 Atlassian | 1 Hipchat Server | 2018-10-09 | 6.5 MEDIUM | 9.1 CRITICAL |
Hipchat Server before 2.2.3 allows remote authenticated users with Server Administrator level privileges to execute arbitrary code by importing a file. | |||||
CVE-2015-7571 | 1 Yeager | 1 Yeager Cms | 2018-10-09 | 6.8 MEDIUM | 7.8 HIGH |
Unrestricted file upload vulnerability in Yeager CMS 1.2.1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension. | |||||
CVE-2018-12940 | 1 Seeddms | 1 Seeddms | 2018-10-01 | 6.5 MEDIUM | 8.8 HIGH |
Unrestricted file upload vulnerability in "op/op.UploadChunks.php" in SeedDMS (formerly LetoDMS and MyDMS) before 5.1.8 allows remote attackers to execute arbitrary code by uploading a file with an executable extension specified by the "qqfile" parameter. This allows an authenticated attacker to upload a malicious file containing PHP code to execute operating system commands to the web root of the application. |